Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PlusPrivStoreAtt116.exe

Overview

General Information

Sample name:PlusPrivStoreAtt116.exe
Analysis ID:1590901
MD5:d4a125241862eb0a4bd1afcf362d914f
SHA1:c3c418450fe4cd0768e214a270374f6e1c8e37f3
SHA256:29c141ee54b805226e0fe7eafe994ec3b461a648861497964acff28d35ba78b8
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • PlusPrivStoreAtt116.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\PlusPrivStoreAtt116.exe" MD5: D4A125241862EB0A4BD1AFCF362D914F)
    • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7676 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7728 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7832 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7848 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7876 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7896 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7936 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7952 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7968 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7984 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7996 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 8020 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8036 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8064 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8080 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8116 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8132 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8164 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 8176 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7196 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1200 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6660 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3088 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6836 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5528 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4308 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1552 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3256 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1888 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1988 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 316 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2168 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3380 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PlusPrivStoreAtt116.exeVirustotal: Detection: 41%Perma Link
Source: PlusPrivStoreAtt116.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.2% probability
Source: PlusPrivStoreAtt116.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406A84D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,1_2_00007FF7A406A84D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A408D750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,1_2_00007FF7A408D750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A408F840 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,1_2_00007FF7A408F840
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40863E0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,1_2_00007FF7A40863E0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406CAD0 CryptAcquireContextA,CryptCreateHash,1_2_00007FF7A406CAD0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406CB30 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,1_2_00007FF7A406CB30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406CB20 CryptHashData,1_2_00007FF7A406CB20
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4069B40 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,1_2_00007FF7A4069B40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4069C10 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,1_2_00007FF7A4069C10
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4086D00 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,1_2_00007FF7A4086D00
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: -----BEGIN PUBLIC KEY-----1_2_00007FF7A404F9F0
Source: PlusPrivStoreAtt116.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: mov dword ptr [rbp+04h], 424D53FFh1_2_00007FF7A4079410
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49759 version: TLS 1.2
Source: PlusPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: Binary string: .D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4056600 recv,WSAGetLastError,1_2_00007FF7A4056600
Source: global trafficDNS traffic detected: DNS query: time.windows.com
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plusattnewhvcionprivate.exe
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plusattnewhvcionprivate.exeC:
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:
Source: PlusPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: PlusPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: PlusPrivStoreAtt116.exe, 00000001.00000003.1520531906.0000016AF330B000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000001.00000003.1520643858.0000016AF3327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/og5e
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/pace
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmp, PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/6)
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49759 version: TLS 1.2
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A408D750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,1_2_00007FF7A408D750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40585D01_2_00007FF7A40585D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406A84D1_2_00007FF7A406A84D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40592901_2_00007FF7A4059290
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40572901_2_00007FF7A4057290
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4041E401_2_00007FF7A4041E40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A405FEA01_2_00007FF7A405FEA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4041AA01_2_00007FF7A4041AA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403956D1_2_00007FF7A403956D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40685D01_2_00007FF7A40685D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A408D7501_2_00007FF7A408D750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403974B1_2_00007FF7A403974B
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40417501_2_00007FF7A4041750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A408F7D01_2_00007FF7A408F7D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406A90C1_2_00007FF7A406A90C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406A9151_2_00007FF7A406A915
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A405A1501_2_00007FF7A405A150
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40631A01_2_00007FF7A40631A0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40492A01_2_00007FF7A40492A0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403D3101_2_00007FF7A403D310
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40753001_2_00007FF7A4075300
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40863E01_2_00007FF7A40863E0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4079E301_2_00007FF7A4079E30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4080E901_2_00007FF7A4080E90
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403DEA01_2_00007FF7A403DEA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4081EC01_2_00007FF7A4081EC0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A406CEE01_2_00007FF7A406CEE0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4050F101_2_00007FF7A4050F10
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A40310001_2_00007FF7A4031000
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A407DB301_2_00007FF7A407DB30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403AC0D1_2_00007FF7A403AC0D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A403EC301_2_00007FF7A403EC30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4053C401_2_00007FF7A4053C40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4065CF01_2_00007FF7A4065CF0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4056280 appears 380 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4059790 appears 36 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A405ABB0 appears 37 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A405AC40 appears 33 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4056400 appears 326 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A40596C0 appears 46 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4050B50 appears 70 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4090B6C appears 47 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A405AD20 appears 34 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF7A4043940 appears 49 times
Source: classification engineClassification label: mal56.evad.winEXE@68/18@2/2
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4042620 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,1_2_00007FF7A4042620
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
Source: PlusPrivStoreAtt116.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PlusPrivStoreAtt116.exeVirustotal: Detection: 41%
Source: PlusPrivStoreAtt116.exeReversingLabs: Detection: 65%
Source: PlusPrivStoreAtt116.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\PlusPrivStoreAtt116.exe "C:\Users\user\Desktop\PlusPrivStoreAtt116.exe"
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: PlusPrivStoreAtt116.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PlusPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: Binary string: .D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4059290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,1_2_00007FF7A4059290
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeWindow / User API: threadDelayed 2690Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 2257Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-47790
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exe TID: 7672Thread sleep time: -134500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeLast function: Thread delayed
Source: PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A409067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7A409067C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4090A18 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,1_2_00007FF7A4090A18
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4059290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,1_2_00007FF7A4059290
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A409067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7A409067C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4090824 SetUnhandledExceptionFilter,1_2_00007FF7A4090824
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4090384 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF7A4090384
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4090894 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF7A4090894
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4065370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,1_2_00007FF7A4065370
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4075300 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,1_2_00007FF7A4075300
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A407BE00 calloc,calloc,calloc,bind,WSAGetLastError,1_2_00007FF7A407BE00
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A4057F40 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,1_2_00007FF7A4057F40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 1_2_00007FF7A407C060 calloc,calloc,calloc,bind,WSAGetLastError,1_2_00007FF7A407C060
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590901 Sample: PlusPrivStoreAtt116.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 56 33 time.windows.com 2->33 35 shed.dual-low.s-part-0017.t-0009.t-msedge.net 2->35 37 3 other IPs or domains 2->37 43 Multi AV Scanner detection for submitted file 2->43 45 Machine Learning detection for sample 2->45 47 AI detected suspicious sample 2->47 8 PlusPrivStoreAtt116.exe 1 2->8         started        signatures3 process4 dnsIp5 39 keyauth.win 104.26.1.5, 443, 49759 CLOUDFLARENETUS United States 8->39 41 127.0.0.1 unknown unknown 8->41 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 16 other processes 8->17 process6 process7 19 taskkill.exe 1 11->19         started        21 taskkill.exe 1 13->21         started        23 taskkill.exe 1 15->23         started        25 taskkill.exe 1 17->25         started        27 taskkill.exe 1 17->27         started        29 taskkill.exe 1 17->29         started        31 9 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PlusPrivStoreAtt116.exe42%VirustotalBrowse
PlusPrivStoreAtt116.exe66%ReversingLabsWin64.Trojan.Lazy
PlusPrivStoreAtt116.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe0%Avira URL Cloudsafe
http://167.114.85.75/plusattnewhvcionprivate.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/plusattnewhvcionprivate.exe0%Avira URL Cloudsafe
http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    high
    s-part-0017.t-0009.fb-t-msedge.net
    13.107.253.45
    truefalse
      high
      time.windows.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://keyauth.win/api/1.1/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://167.114.85.75/plusattnewhvcionprivate.exePlusPrivStoreAtt116.exefalse
          • Avira URL Cloud: safe
          unknown
          http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:PlusPrivStoreAtt116.exefalse
          • Avira URL Cloud: safe
          unknown
          http://167.114.85.75/plushvcioffbronkzatualizadoh79.exePlusPrivStoreAtt116.exefalse
          • Avira URL Cloud: safe
          unknown
          https://keyauth.win/api/1.1/pacePlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://167.114.85.75/plusattnewhvcionprivate.exeC:PlusPrivStoreAtt116.exefalse
            • Avira URL Cloud: safe
            unknown
            https://keyauth.win/api/1.1/og5ePlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://curl.haxx.se/docs/http-cookies.htmlPlusPrivStoreAtt116.exefalse
                high
                https://curl.haxx.se/docs/http-cookies.html#PlusPrivStoreAtt116.exefalse
                  high
                  https://keyauth.cc/panel/bronkzware/LoaderPlusPrivStoreAtt116.exe, 00000001.00000003.1520531906.0000016AF330B000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000001.00000003.1520643858.0000016AF3327000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://keyauth.win/api/1.2/PlusPrivStoreAtt116.exe, 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmp, PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://keyauth.win/api/1.2/6)PlusPrivStoreAtt116.exe, 00000001.00000002.3300477205.0000016AF32CC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.1.5
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:42.0.0 Malachite
                      Analysis ID:1590901
                      Start date and time:2025-01-14 16:52:37 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 49s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:41
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:PlusPrivStoreAtt116.exe
                      Detection:MAL
                      Classification:mal56.evad.winEXE@68/18@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 48
                      • Number of non-executed functions: 223
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                      • Excluded IPs from analysis (whitelisted): 51.145.123.29, 13.107.253.45, 172.202.163.200
                      • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.1.5tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                            dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winEspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                        • 104.26.0.5
                                        Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        s-part-0017.t-0009.fb-t-msedge.nethttps://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                        • 13.107.253.45
                                        q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                        • 13.107.253.45
                                        https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fjobuli.in%2Fwinner%2FsXtxg%2FbWFyc2hhLnJvd2xhbmRAY2hlcm9rZWVicmljay5jb20=?0s57db=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 hashmaliciousHTMLPhisherBrowse
                                        • 13.107.253.45
                                        https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                        • 13.107.253.45
                                        P-04071A.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.45
                                        P-04071A.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.45
                                        1736856908fb16676aec3e4c808c4bd5cde8e123cc70360266f85ec0ed17050bca6456c9dd274.dat-decoded.exeGet hashmaliciousXWormBrowse
                                        • 13.107.253.45
                                        pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                        • 13.107.253.45
                                        RFQ____PC25-1301.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.45
                                        https://Rtasia-sharepoint.zonivarnoth.ru/ITb4aThU/#Deddie.chan@rtasia.com.hkGet hashmaliciousUnknownBrowse
                                        • 13.107.253.45
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUShttp://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.74.152
                                        EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        email.emlGet hashmaliciousunknownBrowse
                                        • 172.64.41.3
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        http://brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.64.1
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eEspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.26.1.5
                                        Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                        • 104.26.1.5
                                        http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        No context
                                        Process:C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):304
                                        Entropy (8bit):3.644169459123466
                                        Encrypted:false
                                        SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXWWxbF2To3G3oJXWWxbFWXqowvxOwVGt:H041lxwhHawhwcV4
                                        MD5:DF552214087F20ACF423B1FA912CAF62
                                        SHA1:4CB23050703E757BFE05C0E4B28314D673B08693
                                        SHA-256:98F76FD5FEA096224BD97E3EA6A315E01A5218E57EE59ADD7DD8F691F4FCCA51
                                        SHA-512:07754C89FDDC1391628BFBC470B8B67ED73583EAACBA4F30E0F3F17FBCFCD148E06620E3698666CA2BA068F9FE0A2F913322DFF9C1B11B106FB89B779F9A777A
                                        Malicious:false
                                        Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant Plus (HVCI DESLIGADO): ..[2] Iniciar Valorant Plus (HVCI HABILITADO): ....[+] Selecione a opcao:
                                        Process:C:\Windows\System32\cmd.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):44
                                        Entropy (8bit):4.003997527334849
                                        Encrypted:false
                                        SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                        MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                        SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                        SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                        SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                        Malicious:false
                                        Preview:The system cannot find the file specified...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):6.420350102147237
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:PlusPrivStoreAtt116.exe
                                        File size:510'464 bytes
                                        MD5:d4a125241862eb0a4bd1afcf362d914f
                                        SHA1:c3c418450fe4cd0768e214a270374f6e1c8e37f3
                                        SHA256:29c141ee54b805226e0fe7eafe994ec3b461a648861497964acff28d35ba78b8
                                        SHA512:0e860929f32f69fd1bc89799fd84ac64b96516fed0123ab9c5a2afbef1e87de6c51f90b9cf0d5d1f6dd1726fc26e6118bc780a8bd43ea54a215689959bfa53f0
                                        SSDEEP:12288:GKYt4C6iIzrAjqDKE22zDzN5ofEwN/PXMk:Gt4C63zriea2zHNyEwpXMk
                                        TLSH:45B47D56A7A817E9D1A7C03CC547C603E7B6B4991311DBDB43A0CA792F237E26E3A710
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x140060368
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x677DDEDD [Wed Jan 8 02:11:41 2025 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:551e5f19de2baa264d46ee5c6718793c
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007FED14938288h
                                        dec eax
                                        add esp, 28h
                                        jmp 00007FED14937BD7h
                                        int3
                                        int3
                                        jmp 00007FED1493853Eh
                                        int3
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov ebx, ecx
                                        xor ecx, ecx
                                        call dword ptr [00001D9Bh]
                                        dec eax
                                        mov ecx, ebx
                                        call dword ptr [00001D8Ah]
                                        call dword ptr [00001DE4h]
                                        dec eax
                                        mov ecx, eax
                                        mov edx, C0000409h
                                        dec eax
                                        add esp, 20h
                                        pop ebx
                                        dec eax
                                        jmp dword ptr [00001DE0h]
                                        dec eax
                                        mov dword ptr [esp+08h], ecx
                                        dec eax
                                        sub esp, 38h
                                        mov ecx, 00000017h
                                        call dword ptr [00001DD4h]
                                        test eax, eax
                                        je 00007FED14937D69h
                                        mov ecx, 00000002h
                                        int 29h
                                        dec eax
                                        lea ecx, dword ptr [00019492h]
                                        call 00007FED14937F2Eh
                                        dec eax
                                        mov eax, dword ptr [esp+38h]
                                        dec eax
                                        mov dword ptr [00019579h], eax
                                        dec eax
                                        lea eax, dword ptr [esp+38h]
                                        dec eax
                                        add eax, 08h
                                        dec eax
                                        mov dword ptr [00019509h], eax
                                        dec eax
                                        mov eax, dword ptr [00019562h]
                                        dec eax
                                        mov dword ptr [000193D3h], eax
                                        dec eax
                                        mov eax, dword ptr [esp+40h]
                                        dec eax
                                        mov dword ptr [000194D7h], eax
                                        mov dword ptr [000193ADh], C0000409h
                                        mov dword ptr [000193A7h], 00000001h
                                        mov dword ptr [000000B1h], 00000000h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x710900x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f500x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x606e80x60800f6be6f4c0ca7f222fea58e8729dc8f93False0.5324744980569949data6.334595345552807IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x620000x16ec40x170005baa9e49913892291fedbb67715bfaf7False0.379585597826087data5.59957998743783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x790000xe080x400cef7bcba2c4bb58f5386ec5b3ae9f7f8False0.2138671875data2.4461568678801138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x7a0000x405c0x42001f44589aeb34f25d94952a45d7939e4fFalse0.47407670454545453data5.699721075250355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x800000x4ec0x600cac0ac8c6a84a9b40000852c8a3bff36False0.5149739583333334data4.845798537474806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                        USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                        ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                        SHELL32.dllShellExecuteA
                                        MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                        urlmon.dllURLDownloadToFileA
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                        WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                        VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                        api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                        api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                        api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                        api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                        api-ms-win-crt-utility-l1-1-0.dllqsort
                                        api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 16:54:00.501523972 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:00.501549006 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:00.501883984 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:00.540780067 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:00.540796041 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:00.997945070 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:00.998097897 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:01.004832029 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:01.004844904 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:01.005090952 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:01.010730028 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:01.051330090 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:01.185031891 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:01.185116053 CET44349759104.26.1.5192.168.2.7
                                        Jan 14, 2025 16:54:01.185210943 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:01.204555035 CET49759443192.168.2.7104.26.1.5
                                        Jan 14, 2025 16:54:01.204571962 CET44349759104.26.1.5192.168.2.7
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 16:53:40.246463060 CET4937053192.168.2.71.1.1.1
                                        Jan 14, 2025 16:54:00.453460932 CET5577553192.168.2.71.1.1.1
                                        Jan 14, 2025 16:54:00.460644007 CET53557751.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 14, 2025 16:53:40.246463060 CET192.168.2.71.1.1.10x249bStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:00.453460932 CET192.168.2.71.1.1.10x87f2Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 14, 2025 16:53:40.253575087 CET1.1.1.1192.168.2.70x249bNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                        Jan 14, 2025 16:53:50.955216885 CET1.1.1.1192.168.2.70x7f45No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                        Jan 14, 2025 16:53:50.955216885 CET1.1.1.1192.168.2.70x7f45No error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Jan 14, 2025 16:53:50.955216885 CET1.1.1.1192.168.2.70x7f45No error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:00.460644007 CET1.1.1.1192.168.2.70x87f2No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:00.460644007 CET1.1.1.1192.168.2.70x87f2No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:00.460644007 CET1.1.1.1192.168.2.70x87f2No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749759104.26.1.54437560C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 15:54:01 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                        Host: keyauth.win
                                        Accept: */*
                                        Content-Length: 74
                                        Content-Type: application/x-www-form-urlencoded
                                        2025-01-14 15:54:01 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                        Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                        2025-01-14 15:54:01 UTC1323INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 15:54:01 GMT
                                        Content-Type: application/json; charset=UTF-8
                                        Content-Length: 475
                                        Connection: close
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NJM8LArUobaV58EZQPxqlCXhkjnCO5PkHe7AsjVuls4482Hbjr59llpk%2F5DTU%2FNTNiFrbzjSmQJC74y7iF6Sham8iYK5ZvLzRfkuO7D0%2BMMEYjaBcUdm0s%2FripDt"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Acknowledge: Credit to VaultCord.com
                                        X-Powered-By: VaultCord.com
                                        content-security-policy: upgrade-insecure-requests
                                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                        referrer-policy: strict-origin-when-cross-origin
                                        strict-transport-security: max-age=31536000; includeSubDomains
                                        x-content-security-policy: img-src *; media-src * data:;
                                        x-content-type-options: nosniff
                                        x-frame-options: DENY
                                        x-xss-protection: 1; mode=block
                                        Access-Control-Allow-Headers: *
                                        Access-Control-Allow-Methods: *
                                        Access-Control-Allow-Origin: *
                                        Server: cloudflare
                                        CF-RAY: 901ecd5cbb180f43-EWR
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1550&min_rtt=1532&rtt_var=587&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2346&recv_bytes=862&delivery_rate=1906005&cwnd=32&unsent_bytes=0&cid=23987d8a36dea621&ts=197&x=0"
                                        2025-01-14 15:54:01 UTC46INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69 7a
                                        Data Ascii: {"success":true,"code":68,"message":"Initializ
                                        2025-01-14 15:54:01 UTC429INData Raw: 65 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 38 61 33 31 32 39 33 39 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73 74 6f 6d
                                        Data Ascii: ed","sessionid":"8a312939","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","custom


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:1
                                        Start time:10:53:52
                                        Start date:14/01/2025
                                        Path:C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\PlusPrivStoreAtt116.exe"
                                        Imagebase:0x7ff7a4030000
                                        File size:510'464 bytes
                                        MD5 hash:D4A125241862EB0A4BD1AFCF362D914F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:2
                                        Start time:10:53:52
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff75da10000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:3
                                        Start time:10:53:53
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:10:53:53
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:5
                                        Start time:10:53:54
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:10:53:54
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:7
                                        Start time:10:53:54
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:10:53:55
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:9
                                        Start time:10:53:56
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:10:53:56
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:10:53:56
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:10:53:56
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:10:53:56
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:10:53:57
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:10:53:57
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:10:53:58
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:10:53:58
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:10:53:58
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:10:53:58
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:10:53:59
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:10:53:59
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:10:53:59
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:10:54:00
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:10:54:00
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff777230000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:10:54:01
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:35
                                        Start time:10:54:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff642ad0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:36
                                        Start time:10:54:02
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff78c7d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:4.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:23.1%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:98
                                          execution_graph 47288 7ff7a4048708 47289 7ff7a4048721 47288->47289 47290 7ff7a40487af 47289->47290 47293 7ff7a4048984 47289->47293 47329 7ff7a405ce20 47290->47329 47413 7ff7a4046100 17 API calls 47293->47413 47296 7ff7a40487d4 47297 7ff7a4048870 47296->47297 47299 7ff7a40487de 47296->47299 47305 7ff7a4048805 47296->47305 47298 7ff7a4048921 47297->47298 47304 7ff7a4048878 47297->47304 47318 7ff7a4047b8b 47298->47318 47412 7ff7a4046100 17 API calls 47298->47412 47302 7ff7a4047610 292 API calls 47299->47302 47300 7ff7a4048db0 17 API calls 47300->47318 47302->47318 47304->47305 47306 7ff7a40488fb free 47304->47306 47307 7ff7a404888e 47304->47307 47308 7ff7a4047610 292 API calls 47305->47308 47306->47305 47312 7ff7a404889b free 47307->47312 47307->47318 47311 7ff7a4048823 47308->47311 47309 7ff7a4048c32 47310 7ff7a4048c23 47440 7ff7a4056280 19 API calls 47310->47440 47410 7ff7a405c6e0 28 API calls 47311->47410 47411 7ff7a405c6e0 28 API calls 47312->47411 47316 7ff7a40488c3 free 47316->47318 47319 7ff7a40488d9 47316->47319 47317 7ff7a4048832 47321 7ff7a4048854 free 47317->47321 47318->47300 47318->47309 47318->47310 47326 7ff7a4047c2e 47318->47326 47368 7ff7a4057b00 47318->47368 47374 7ff7a4056280 19 API calls 47318->47374 47375 7ff7a4047610 47318->47375 47414 7ff7a4051d40 47318->47414 47438 7ff7a4046330 15 API calls 47318->47438 47439 7ff7a4065af0 22 API calls 47318->47439 47323 7ff7a4047610 292 API calls 47319->47323 47321->47318 47323->47318 47325 7ff7a4056280 19 API calls 47325->47326 47326->47318 47326->47325 47330 7ff7a405ce71 47329->47330 47331 7ff7a405cebf 47330->47331 47441 7ff7a40668f0 47330->47441 47332 7ff7a405cedd 47331->47332 47333 7ff7a405cec6 47331->47333 47336 7ff7a405cf09 47332->47336 47465 7ff7a405d530 47332->47465 47498 7ff7a4056280 19 API calls 47333->47498 47337 7ff7a405cf3e 47336->47337 47338 7ff7a405cf26 47336->47338 47358 7ff7a40487c3 47336->47358 47500 7ff7a405e0c0 47337->47500 47499 7ff7a405dc80 90 API calls 47338->47499 47342 7ff7a405cf36 47342->47337 47342->47358 47343 7ff7a405cfb8 47513 7ff7a4065af0 22 API calls 47343->47513 47345 7ff7a405cfc0 47345->47358 47514 7ff7a4066c60 23 API calls 47345->47514 47347 7ff7a405cf48 47347->47343 47503 7ff7a4056400 47347->47503 47348 7ff7a405cfde 47349 7ff7a405d072 47348->47349 47350 7ff7a405cff2 47348->47350 47348->47358 47353 7ff7a405d0d9 47349->47353 47357 7ff7a405d0b0 47349->47357 47359 7ff7a405d097 47349->47359 47352 7ff7a4057b00 10 API calls 47350->47352 47354 7ff7a405d001 47352->47354 47519 7ff7a4065af0 22 API calls 47353->47519 47356 7ff7a405d00a 47354->47356 47354->47358 47364 7ff7a405d05c 47356->47364 47365 7ff7a405d041 47356->47365 47357->47353 47360 7ff7a405d0c3 47357->47360 47358->47296 47409 7ff7a405d120 24 API calls 47358->47409 47517 7ff7a4056280 19 API calls 47359->47517 47518 7ff7a4056280 19 API calls 47360->47518 47363 7ff7a405ced5 47363->47358 47516 7ff7a4056280 19 API calls 47364->47516 47515 7ff7a4056280 19 API calls 47365->47515 47369 7ff7a4057b4a 47368->47369 47370 7ff7a405e0c0 2 API calls 47369->47370 47371 7ff7a4057b6a 47369->47371 47370->47371 47372 7ff7a408ff10 8 API calls 47371->47372 47373 7ff7a4057bfe 47372->47373 47373->47318 47374->47318 47376 7ff7a404764c 47375->47376 47387 7ff7a4047722 47375->47387 47815 7ff7a404b860 47376->47815 47378 7ff7a408ff10 8 API calls 47380 7ff7a4047757 47378->47380 47379 7ff7a4047657 free free 47381 7ff7a4047687 47379->47381 47380->47318 47382 7ff7a40476c5 47381->47382 47843 7ff7a40655d0 22 API calls 47381->47843 47833 7ff7a4048db0 47382->47833 47385 7ff7a40476df 47386 7ff7a404778c 47385->47386 47385->47387 47844 7ff7a405f7f0 free free free free 47385->47844 47837 7ff7a405ee30 47386->47837 47387->47378 47391 7ff7a40477bb 47392 7ff7a40477c0 free 47391->47392 47392->47392 47393 7ff7a40477de 47392->47393 47394 7ff7a404790b 47393->47394 47396 7ff7a4047847 47393->47396 47395 7ff7a4051d40 90 API calls 47394->47395 47398 7ff7a404793d 47395->47398 47397 7ff7a4059790 13 API calls 47396->47397 47399 7ff7a40478a6 47397->47399 47848 7ff7a4051ec0 292 API calls 47398->47848 47845 7ff7a404f050 92 API calls 47399->47845 47402 7ff7a40478c7 47403 7ff7a40478cb 47402->47403 47404 7ff7a40478f5 47402->47404 47405 7ff7a4056400 15 API calls 47403->47405 47847 7ff7a4051ec0 292 API calls 47404->47847 47407 7ff7a40478e6 47405->47407 47846 7ff7a4051ec0 292 API calls 47407->47846 47409->47296 47410->47317 47411->47316 47412->47318 47413->47318 47415 7ff7a4051e7c 47414->47415 47417 7ff7a4051d62 47414->47417 47415->47318 47416 7ff7a4051d8f 47419 7ff7a405ee30 9 API calls 47416->47419 47417->47415 47417->47416 47857 7ff7a405f7f0 free free free free 47417->47857 47420 7ff7a4051da2 47419->47420 47854 7ff7a4081620 47420->47854 47438->47318 47439->47318 47440->47309 47442 7ff7a4066937 47441->47442 47446 7ff7a406696b 47441->47446 47443 7ff7a4066941 47442->47443 47442->47446 47444 7ff7a406695b Sleep 47443->47444 47445 7ff7a4066948 WSASetLastError 47443->47445 47464 7ff7a4066964 47443->47464 47444->47464 47445->47464 47449 7ff7a4066ae3 select 47446->47449 47451 7ff7a4066ab5 47446->47451 47454 7ff7a4066aba 47449->47454 47452 7ff7a4066ac3 WSASetLastError 47451->47452 47453 7ff7a4066ad6 Sleep 47451->47453 47451->47454 47452->47454 47453->47454 47455 7ff7a4066bac 47454->47455 47456 7ff7a4066b82 __WSAFDIsSet __WSAFDIsSet 47454->47456 47454->47464 47457 7ff7a4066bdb 47455->47457 47458 7ff7a4066bb4 __WSAFDIsSet 47455->47458 47456->47455 47459 7ff7a4066be3 __WSAFDIsSet 47457->47459 47457->47464 47460 7ff7a4066bc7 47458->47460 47461 7ff7a4066bca __WSAFDIsSet 47458->47461 47462 7ff7a4066bf9 __WSAFDIsSet 47459->47462 47463 7ff7a4066bf6 47459->47463 47460->47461 47461->47457 47462->47464 47463->47462 47520 7ff7a408ff10 47464->47520 47482 7ff7a405d580 47465->47482 47468 7ff7a405daba 47471 7ff7a4056400 15 API calls 47468->47471 47491 7ff7a405dad3 47468->47491 47469 7ff7a405e0c0 2 API calls 47469->47482 47471->47491 47472 7ff7a405da97 47472->47468 47474 7ff7a4056400 15 API calls 47472->47474 47473 7ff7a405d810 47473->47482 47538 7ff7a40561c0 fwrite fwrite 47473->47538 47539 7ff7a40561c0 fwrite fwrite 47473->47539 47474->47468 47478 7ff7a405db51 47480 7ff7a405db6d 47478->47480 47481 7ff7a405db56 47478->47481 47479 7ff7a4056400 15 API calls 47479->47482 47544 7ff7a4056280 19 API calls 47480->47544 47543 7ff7a4056280 19 API calls 47481->47543 47482->47468 47482->47469 47482->47472 47482->47473 47482->47478 47482->47479 47483 7ff7a405dabf 47482->47483 47482->47491 47492 7ff7a405d7ec 47482->47492 47495 7ff7a40561a0 23 API calls 47482->47495 47531 7ff7a4056570 47482->47531 47534 7ff7a40659a0 47482->47534 47537 7ff7a40631a0 192 API calls 47482->47537 47540 7ff7a4082ea0 23 API calls 47482->47540 47541 7ff7a406f9c0 23 API calls 47482->47541 47485 7ff7a405dac7 47483->47485 47486 7ff7a405daf3 47483->47486 47488 7ff7a4056400 15 API calls 47485->47488 47542 7ff7a4056280 19 API calls 47486->47542 47487 7ff7a405daff 47487->47491 47488->47491 47491->47336 47493 7ff7a4056400 15 API calls 47492->47493 47494 7ff7a405db18 47493->47494 47497 7ff7a4056400 15 API calls 47494->47497 47495->47482 47497->47491 47498->47363 47499->47342 47501 7ff7a405e10d GetTickCount 47500->47501 47502 7ff7a405e0d2 QueryPerformanceCounter 47500->47502 47501->47347 47502->47347 47504 7ff7a4056409 47503->47504 47505 7ff7a405655e 47503->47505 47512 7ff7a40564d9 47504->47512 47810 7ff7a4059890 13 API calls 47504->47810 47505->47343 47507 7ff7a408ff10 8 API calls 47507->47505 47508 7ff7a40564c1 47509 7ff7a405650e fwrite fwrite 47508->47509 47508->47512 47509->47512 47510 7ff7a405645c 47510->47508 47811 7ff7a4059790 47510->47811 47512->47507 47513->47345 47514->47348 47515->47363 47516->47363 47517->47363 47518->47363 47519->47358 47521 7ff7a408ff19 47520->47521 47522 7ff7a4066c1e 47521->47522 47523 7ff7a40903b8 IsProcessorFeaturePresent 47521->47523 47522->47331 47524 7ff7a40903d0 47523->47524 47529 7ff7a40905ac RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47524->47529 47526 7ff7a40903e3 47530 7ff7a4090384 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47526->47530 47529->47526 47545 7ff7a406bed0 47531->47545 47535 7ff7a405e0c0 2 API calls 47534->47535 47536 7ff7a40659ba 47535->47536 47536->47482 47537->47482 47538->47473 47539->47482 47540->47482 47541->47482 47542->47487 47543->47487 47544->47487 47546 7ff7a406bf6e 47545->47546 47547 7ff7a406bf4f 47545->47547 47549 7ff7a406bf75 47546->47549 47550 7ff7a406bf92 47546->47550 47547->47546 47548 7ff7a406bf55 47547->47548 47551 7ff7a4056400 15 API calls 47548->47551 47552 7ff7a4056400 15 API calls 47549->47552 47553 7ff7a406bf98 47550->47553 47555 7ff7a406bfb1 47550->47555 47559 7ff7a406bf64 47551->47559 47552->47559 47554 7ff7a4056400 15 API calls 47553->47554 47554->47559 47556 7ff7a406bfe0 realloc 47555->47556 47557 7ff7a406c02e 47555->47557 47579 7ff7a406c0a9 47555->47579 47556->47557 47558 7ff7a406c00d 47556->47558 47591 7ff7a4056600 recv 47557->47591 47594 7ff7a4056280 19 API calls 47558->47594 47560 7ff7a406c406 47559->47560 47613 7ff7a4059110 47559->47613 47561 7ff7a406c505 memcpy memcpy 47560->47561 47564 7ff7a406c54b 47560->47564 47561->47564 47568 7ff7a408ff10 8 API calls 47564->47568 47565 7ff7a406c024 47565->47559 47566 7ff7a406c077 47572 7ff7a406c09d 47566->47572 47573 7ff7a406c26e 47566->47573 47566->47579 47571 7ff7a40565cb 47568->47571 47570 7ff7a4056400 15 API calls 47570->47579 47571->47482 47575 7ff7a4056400 15 API calls 47572->47575 47576 7ff7a4056400 15 API calls 47573->47576 47574 7ff7a4056400 15 API calls 47574->47560 47575->47579 47576->47579 47577 7ff7a4056400 15 API calls 47577->47559 47579->47559 47579->47570 47580 7ff7a406c1b0 realloc 47579->47580 47581 7ff7a406c417 47579->47581 47584 7ff7a406c38e 47579->47584 47585 7ff7a406c1fb memcpy 47579->47585 47587 7ff7a406c24b memcpy 47579->47587 47595 7ff7a406a390 47579->47595 47580->47579 47582 7ff7a406c476 47580->47582 47583 7ff7a406c446 47581->47583 47581->47584 47622 7ff7a4056280 19 API calls 47582->47622 47621 7ff7a4042620 22 API calls 47583->47621 47584->47559 47584->47577 47585->47579 47587->47579 47589 7ff7a406c45f 47590 7ff7a4056400 15 API calls 47589->47590 47590->47559 47592 7ff7a405661b WSAGetLastError 47591->47592 47593 7ff7a4056642 47591->47593 47592->47566 47593->47566 47594->47565 47596 7ff7a406a3e4 47595->47596 47600 7ff7a406a3d9 47595->47600 47598 7ff7a4057b00 10 API calls 47596->47598 47609 7ff7a406a40b 47596->47609 47597 7ff7a406a502 47597->47600 47746 7ff7a406baf0 69 API calls 47597->47746 47601 7ff7a406a3f7 47598->47601 47599 7ff7a4057b00 10 API calls 47599->47609 47600->47579 47603 7ff7a406a4ec 47601->47603 47623 7ff7a406a580 47601->47623 47745 7ff7a4056280 19 API calls 47603->47745 47606 7ff7a406a4e5 47606->47600 47607 7ff7a40668f0 19 API calls 47607->47609 47609->47597 47609->47599 47609->47600 47609->47603 47609->47607 47610 7ff7a406a4cd WSAGetLastError 47609->47610 47612 7ff7a406a4bc 47609->47612 47678 7ff7a406b360 47609->47678 47744 7ff7a4056280 19 API calls 47610->47744 47612->47600 47612->47603 47614 7ff7a405913d 47613->47614 47615 7ff7a40591ef VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47614->47615 47618 7ff7a4059155 47614->47618 47616 7ff7a4059244 VerifyVersionInfoA 47615->47616 47617 7ff7a4059232 VerSetConditionMask 47615->47617 47616->47618 47617->47616 47619 7ff7a408ff10 8 API calls 47618->47619 47620 7ff7a405927b 47619->47620 47620->47560 47620->47574 47621->47589 47622->47565 47624 7ff7a406a5f2 47623->47624 47625 7ff7a4059110 14 API calls 47624->47625 47626 7ff7a406a62e 47625->47626 47627 7ff7a406a641 47626->47627 47628 7ff7a4056400 15 API calls 47626->47628 47629 7ff7a406a64a GetModuleHandleA GetProcAddress 47627->47629 47633 7ff7a406a688 47627->47633 47628->47627 47630 7ff7a406a66c 47629->47630 47629->47633 47631 7ff7a4059110 14 API calls 47630->47631 47632 7ff7a406a680 47631->47632 47632->47633 47634 7ff7a4059110 14 API calls 47633->47634 47646 7ff7a406a6e5 47633->47646 47635 7ff7a406a6e1 47634->47635 47636 7ff7a406a6f2 47635->47636 47635->47646 47764 7ff7a4056280 19 API calls 47636->47764 47638 7ff7a406b017 47747 7ff7a4068210 47638->47747 47640 7ff7a406b166 47642 7ff7a408ff10 8 API calls 47640->47642 47641 7ff7a406b02c 47643 7ff7a406b03f 47641->47643 47647 7ff7a4068210 13 API calls 47641->47647 47644 7ff7a406b31c 47642->47644 47648 7ff7a4056400 15 API calls 47643->47648 47650 7ff7a406b052 47643->47650 47644->47609 47645 7ff7a406a7a8 47765 7ff7a4056280 19 API calls 47645->47765 47646->47638 47646->47645 47647->47643 47648->47650 47653 7ff7a4056400 15 API calls 47650->47653 47655 7ff7a406b09b 47650->47655 47652 7ff7a406a701 47652->47640 47653->47655 47654 7ff7a406b0fd calloc 47656 7ff7a406b157 47654->47656 47657 7ff7a406b170 47654->47657 47655->47654 47766 7ff7a4056280 19 API calls 47656->47766 47657->47640 47659 7ff7a406b27c 47657->47659 47660 7ff7a406b1d9 free 47657->47660 47761 7ff7a4056b40 47659->47761 47661 7ff7a406b20a 47660->47661 47662 7ff7a406b256 47660->47662 47665 7ff7a406b212 47661->47665 47666 7ff7a406b230 47661->47666 47771 7ff7a4042620 22 API calls 47662->47771 47767 7ff7a4042620 22 API calls 47665->47767 47769 7ff7a4042620 22 API calls 47666->47769 47668 7ff7a406b260 47772 7ff7a4056280 19 API calls 47668->47772 47672 7ff7a406b219 47768 7ff7a4056280 19 API calls 47672->47768 47673 7ff7a406b23a 47770 7ff7a4056280 19 API calls 47673->47770 47676 7ff7a406b2f9 47773 7ff7a4056280 19 API calls 47676->47773 47680 7ff7a406b3d0 47678->47680 47679 7ff7a406bacf 47680->47679 47681 7ff7a406b472 47680->47681 47682 7ff7a406b432 malloc 47680->47682 47683 7ff7a406b478 malloc 47681->47683 47684 7ff7a406b4c3 47681->47684 47682->47679 47682->47681 47683->47679 47683->47684 47685 7ff7a406b530 47684->47685 47686 7ff7a406b4d6 realloc 47684->47686 47689 7ff7a4056600 2 API calls 47685->47689 47691 7ff7a406b575 47685->47691 47686->47685 47687 7ff7a406b4f2 47686->47687 47795 7ff7a4056280 19 API calls 47687->47795 47689->47691 47690 7ff7a406b5ba malloc 47690->47679 47692 7ff7a406b657 memcpy 47690->47692 47691->47690 47699 7ff7a406b501 47691->47699 47722 7ff7a406b7ca 47691->47722 47693 7ff7a406b677 free 47692->47693 47692->47699 47698 7ff7a406b6e9 47693->47698 47693->47699 47694 7ff7a408ff10 8 API calls 47695 7ff7a406b51d 47694->47695 47695->47609 47700 7ff7a406ba5c 47698->47700 47702 7ff7a406b80d 47698->47702 47718 7ff7a406b708 47698->47718 47699->47694 47700->47699 47701 7ff7a406ba6a 47700->47701 47808 7ff7a4042620 22 API calls 47701->47808 47705 7ff7a406b816 47702->47705 47706 7ff7a406b854 47702->47706 47704 7ff7a406ba7f 47809 7ff7a4056280 19 API calls 47704->47809 47705->47701 47707 7ff7a406b823 47705->47707 47799 7ff7a4042620 22 API calls 47706->47799 47797 7ff7a4042620 22 API calls 47707->47797 47711 7ff7a406b774 47720 7ff7a406b7a0 memcpy 47711->47720 47725 7ff7a406b8a8 47711->47725 47712 7ff7a406b86b 47800 7ff7a4056280 19 API calls 47712->47800 47713 7ff7a4056b40 48 API calls 47713->47718 47714 7ff7a406b7e5 47714->47699 47715 7ff7a406b838 47798 7ff7a4056280 19 API calls 47715->47798 47718->47711 47718->47713 47719 7ff7a406b882 47718->47719 47801 7ff7a4056280 19 API calls 47719->47801 47720->47722 47720->47725 47796 7ff7a4056280 19 API calls 47722->47796 47723 7ff7a406ba30 47723->47699 47724 7ff7a406ba4b 47723->47724 47807 7ff7a40863e0 91 API calls 47724->47807 47725->47699 47725->47723 47727 7ff7a406ba03 47725->47727 47729 7ff7a406b959 47725->47729 47805 7ff7a4042620 22 API calls 47727->47805 47731 7ff7a406b9cb 47729->47731 47735 7ff7a406b967 memset 47729->47735 47730 7ff7a406ba17 47806 7ff7a4056280 19 API calls 47730->47806 47733 7ff7a406b9da CertFreeCertificateContext 47731->47733 47734 7ff7a406b9e0 47731->47734 47733->47734 47734->47723 47737 7ff7a406b9e4 47734->47737 47738 7ff7a406b98c 47735->47738 47736 7ff7a406ba29 47736->47731 47804 7ff7a4056280 19 API calls 47737->47804 47738->47731 47740 7ff7a406b99c 47738->47740 47743 7ff7a406b9b6 47738->47743 47740->47743 47802 7ff7a404f9f0 255 API calls 47740->47802 47743->47731 47803 7ff7a4056280 19 API calls 47743->47803 47744->47606 47745->47606 47746->47600 47748 7ff7a406821c 47747->47748 47754 7ff7a4068246 47747->47754 47749 7ff7a4068221 _errno 47748->47749 47759 7ff7a4068237 47748->47759 47749->47641 47750 7ff7a4068307 47750->47641 47751 7ff7a40682a0 strchr 47751->47754 47752 7ff7a406845d 47755 7ff7a408ff10 8 API calls 47752->47755 47753 7ff7a40683b0 strchr 47756 7ff7a40683d0 strchr 47753->47756 47753->47759 47754->47750 47754->47751 47757 7ff7a4068516 47755->47757 47756->47759 47757->47641 47758 7ff7a40684c5 47758->47752 47774 7ff7a4068260 strchr 47758->47774 47759->47752 47759->47753 47759->47758 47775 7ff7a40567e0 47761->47775 47764->47652 47765->47652 47766->47640 47767->47672 47768->47652 47769->47673 47770->47652 47771->47668 47772->47652 47773->47640 47774->47752 47776 7ff7a40568e7 send 47775->47776 47777 7ff7a405684f 47775->47777 47778 7ff7a4056914 47776->47778 47779 7ff7a4056905 WSAGetLastError 47776->47779 47777->47776 47781 7ff7a40668f0 19 API calls 47777->47781 47782 7ff7a408ff10 8 API calls 47778->47782 47779->47778 47780 7ff7a4056920 47779->47780 47793 7ff7a4042e10 27 API calls 47780->47793 47787 7ff7a4056883 47781->47787 47784 7ff7a4056967 47782->47784 47784->47640 47784->47676 47785 7ff7a4056932 47794 7ff7a4056280 19 API calls 47785->47794 47787->47776 47789 7ff7a405688c 47787->47789 47788 7ff7a4056944 47788->47778 47790 7ff7a4056894 malloc 47789->47790 47791 7ff7a40568c0 recv 47789->47791 47790->47791 47792 7ff7a40568dd 47790->47792 47791->47776 47791->47792 47792->47776 47793->47785 47794->47788 47795->47699 47796->47714 47797->47715 47798->47714 47799->47712 47800->47714 47801->47714 47802->47743 47803->47731 47804->47714 47805->47730 47806->47736 47807->47714 47808->47704 47809->47714 47810->47510 47814 7ff7a405a150 13 API calls 47811->47814 47813 7ff7a40597c3 47813->47508 47814->47813 47816 7ff7a404b887 47815->47816 47817 7ff7a404b875 47815->47817 47820 7ff7a404b998 EnterCriticalSection LeaveCriticalSection 47816->47820 47821 7ff7a404ba24 free 47816->47821 47817->47816 47818 7ff7a404b87b 47817->47818 47849 7ff7a40696b0 WaitForSingleObjectEx CloseHandle 47818->47849 47823 7ff7a404b9db 47820->47823 47824 7ff7a404b9d1 CloseHandle 47820->47824 47821->47379 47822 7ff7a404b880 47822->47816 47826 7ff7a404b9e9 47823->47826 47827 7ff7a404b9e1 47823->47827 47825 7ff7a404b9fc 47824->47825 47828 7ff7a404ba11 closesocket 47825->47828 47852 7ff7a4046410 free 47825->47852 47851 7ff7a404ba40 7 API calls 47826->47851 47850 7ff7a40696b0 WaitForSingleObjectEx CloseHandle 47827->47850 47828->47821 47832 7ff7a404b9f2 free 47832->47825 47834 7ff7a4048e00 47833->47834 47835 7ff7a4048dc7 47833->47835 47834->47385 47853 7ff7a4046100 17 API calls 47835->47853 47838 7ff7a405eeaa 47837->47838 47842 7ff7a405ee51 47837->47842 47839 7ff7a408ff10 8 API calls 47838->47839 47840 7ff7a404779b free 47839->47840 47840->47391 47840->47393 47841 7ff7a405ee73 _time64 47841->47838 47842->47838 47842->47841 47843->47382 47844->47386 47845->47402 47849->47822 47850->47826 47851->47832 47852->47828 47853->47834 47858 7ff7a4084ba0 8 API calls 47854->47858 47856 7ff7a4081635 47857->47416 47858->47856 47859 7ff7a4047d4c 47860 7ff7a40659a0 2 API calls 47859->47860 47861 7ff7a4047d59 47860->47861 47862 7ff7a4047d75 47861->47862 47917 7ff7a4046100 17 API calls 47861->47917 47864 7ff7a4047d91 47862->47864 47918 7ff7a4046100 17 API calls 47862->47918 47886 7ff7a4051aa0 free free 47864->47886 47867 7ff7a4047da1 47868 7ff7a4056400 15 API calls 47867->47868 47871 7ff7a4047df7 47867->47871 47884 7ff7a4047b8b 47867->47884 47869 7ff7a4047deb 47868->47869 47870 7ff7a4048db0 17 API calls 47869->47870 47870->47871 47871->47884 47919 7ff7a405be90 free 47871->47919 47873 7ff7a4048db0 17 API calls 47873->47884 47875 7ff7a4048c32 47876 7ff7a4048c23 47922 7ff7a4056280 19 API calls 47876->47922 47879 7ff7a4051d40 90 API calls 47879->47884 47880 7ff7a4057b00 10 API calls 47880->47884 47881 7ff7a4047c2e 47882 7ff7a4056280 19 API calls 47881->47882 47881->47884 47882->47881 47884->47873 47884->47875 47884->47876 47884->47879 47884->47880 47884->47881 47885 7ff7a4047610 292 API calls 47884->47885 47916 7ff7a4056280 19 API calls 47884->47916 47920 7ff7a4046330 15 API calls 47884->47920 47921 7ff7a4065af0 22 API calls 47884->47921 47885->47884 47923 7ff7a4051880 47886->47923 47889 7ff7a4051880 292 API calls 47890 7ff7a4051b06 memset 47889->47890 47956 7ff7a4053230 47890->47956 47892 7ff7a4051bce 47895 7ff7a4051d40 90 API calls 47892->47895 47896 7ff7a4051b4d 47892->47896 47894 7ff7a40659a0 2 API calls 47897 7ff7a4051b6f 47894->47897 47895->47896 47896->47867 47897->47896 47898 7ff7a4051b9b free 47897->47898 47899 7ff7a4051bc2 47897->47899 48046 7ff7a40596c0 15 API calls 47898->48046 47899->47892 47900 7ff7a405e0c0 2 API calls 47899->47900 47902 7ff7a4051c10 47900->47902 47903 7ff7a4051c4d 47902->47903 47904 7ff7a4051c24 47902->47904 47906 7ff7a40659a0 2 API calls 47903->47906 48047 7ff7a4057090 47904->48047 47909 7ff7a4051c5a 47906->47909 47908 7ff7a4051d07 47910 7ff7a405e0c0 2 API calls 47908->47910 47911 7ff7a4051c7d 47909->47911 47912 7ff7a40659a0 2 API calls 47909->47912 47910->47896 48058 7ff7a4057c10 47911->48058 47912->47911 47915 7ff7a4056400 15 API calls 47915->47908 47916->47884 47917->47862 47918->47864 47919->47884 47920->47884 47921->47884 47922->47875 47924 7ff7a4051a8b 47923->47924 47925 7ff7a405188f 47923->47925 47924->47889 47925->47924 48088 7ff7a4046330 15 API calls 47925->48088 47927 7ff7a40518ad 47928 7ff7a40518c1 47927->47928 48089 7ff7a4047240 292 API calls 47927->48089 47930 7ff7a40518d2 47928->47930 48090 7ff7a4046f30 292 API calls 47928->48090 47932 7ff7a4051903 47930->47932 47933 7ff7a40518f6 free 47930->47933 48091 7ff7a4051ec0 292 API calls 47932->48091 47933->47932 47957 7ff7a4053275 47956->47957 48045 7ff7a4053299 47957->48045 48092 7ff7a4052a30 calloc 47957->48092 47959 7ff7a40532ab 47959->48045 48107 7ff7a4054ea0 47959->48107 47960 7ff7a408ff10 8 API calls 47961 7ff7a4051b35 47960->47961 47961->47892 47961->47894 47961->47896 47964 7ff7a40532f4 47966 7ff7a4053312 47964->47966 47967 7ff7a4053300 _strdup 47964->47967 47965 7ff7a40532e2 _strdup 47965->47964 47965->48045 48157 7ff7a4053c40 47966->48157 47967->47966 47967->48045 47971 7ff7a4059790 13 API calls 47972 7ff7a4053385 47971->47972 47972->48045 48216 7ff7a4054490 47972->48216 47973 7ff7a40533d7 47974 7ff7a405341c _strdup 47973->47974 47975 7ff7a4053432 47973->47975 47973->48045 47974->47975 47974->48045 47976 7ff7a405343c _strdup 47975->47976 47977 7ff7a4053455 47975->47977 47976->47977 47976->48045 48232 7ff7a4054900 47977->48232 47982 7ff7a40534a2 47984 7ff7a40534c4 47982->47984 47985 7ff7a4051fd0 38 API calls 47982->47985 47982->48045 47983 7ff7a4051fd0 38 API calls 47983->47982 47986 7ff7a4051fd0 38 API calls 47984->47986 47987 7ff7a40534e6 47984->47987 47984->48045 47985->47984 47986->47987 47988 7ff7a405367f 47987->47988 47992 7ff7a40535e4 47987->47992 47987->48045 48254 7ff7a404f7b0 47988->48254 47990 7ff7a405381a 47991 7ff7a404f7b0 8 API calls 47990->47991 47990->48045 47993 7ff7a4053831 47991->47993 47994 7ff7a4053604 47992->47994 47995 7ff7a405366f 47992->47995 47993->48045 48278 7ff7a4055360 47993->48278 48334 7ff7a404e6f0 17 API calls 47994->48334 47996 7ff7a40520a0 2 API calls 47995->47996 47996->48045 47998 7ff7a405361a 48001 7ff7a4055dd0 17 API calls 47998->48001 47998->48045 48007 7ff7a405362c 48001->48007 48002 7ff7a4053924 48006 7ff7a40539d1 48002->48006 48338 7ff7a404ec90 13 API calls 48002->48338 48003 7ff7a4053632 48003->48045 48005 7ff7a4053889 48005->48002 48008 7ff7a4053891 48005->48008 48009 7ff7a4056400 15 API calls 48006->48009 48007->48003 48335 7ff7a405d2b0 17 API calls 48007->48335 48337 7ff7a4055a80 34 API calls 48008->48337 48013 7ff7a40539e0 48009->48013 48340 7ff7a4052ec0 44 API calls 48013->48340 48015 7ff7a40538a1 free free 48016 7ff7a40538c8 48015->48016 48019 7ff7a4056400 15 API calls 48016->48019 48017 7ff7a4053976 48024 7ff7a40539bb 48017->48024 48339 7ff7a404ea40 QueryPerformanceCounter GetTickCount 48017->48339 48023 7ff7a405391f 48019->48023 48020 7ff7a4053a5c 48342 7ff7a404e6f0 17 API calls 48020->48342 48022 7ff7a405399d 48028 7ff7a40539bd 48022->48028 48029 7ff7a40539b0 48022->48029 48297 7ff7a40520a0 48023->48297 48024->48020 48341 7ff7a404eb10 QueryPerformanceCounter GetTickCount 48024->48341 48026 7ff7a4053adb 48301 7ff7a4055dd0 48026->48301 48027 7ff7a4053a91 48027->48023 48042 7ff7a4056400 15 API calls 48027->48042 48034 7ff7a4056400 15 API calls 48028->48034 48033 7ff7a4051d40 90 API calls 48029->48033 48032 7ff7a4053a6b 48032->48027 48037 7ff7a4056400 15 API calls 48032->48037 48032->48045 48033->48024 48034->48006 48035 7ff7a4053a45 48038 7ff7a4053c2b 48035->48038 48039 7ff7a4053a51 48035->48039 48037->48027 48041 7ff7a4056400 15 API calls 48038->48041 48040 7ff7a4051d40 90 API calls 48039->48040 48040->48020 48041->48006 48044 7ff7a4053abf 48042->48044 48044->48023 48045->47960 48046->47899 48048 7ff7a405e0c0 2 API calls 48047->48048 48049 7ff7a40570b3 48048->48049 48050 7ff7a405712b 48049->48050 48053 7ff7a4057144 48049->48053 48479 7ff7a4056280 19 API calls 48050->48479 48052 7ff7a405713a 48056 7ff7a4051c3a 48052->48056 48054 7ff7a405724d 48053->48054 48414 7ff7a40585d0 48053->48414 48054->48056 48480 7ff7a4046100 17 API calls 48054->48480 48056->47892 48056->47908 48059 7ff7a4057c47 48058->48059 48060 7ff7a4057e43 48058->48060 48059->48060 48062 7ff7a4057c61 getpeername 48059->48062 48061 7ff7a408ff10 8 API calls 48060->48061 48063 7ff7a4051c97 48061->48063 48064 7ff7a4057cbd getsockname 48062->48064 48065 7ff7a4057c86 WSAGetLastError 48062->48065 48063->47908 48063->47915 48067 7ff7a4057d47 48064->48067 48068 7ff7a4057d10 WSAGetLastError 48064->48068 48519 7ff7a4042e10 27 API calls 48065->48519 48523 7ff7a4056e40 19 API calls 48067->48523 48521 7ff7a4042e10 27 API calls 48068->48521 48070 7ff7a4057ca3 48520 7ff7a4056280 19 API calls 48070->48520 48072 7ff7a4057d69 48075 7ff7a4057dad 48072->48075 48076 7ff7a4057d6d _errno _errno 48072->48076 48074 7ff7a4057d2d 48522 7ff7a4056280 19 API calls 48074->48522 48526 7ff7a4056e40 19 API calls 48075->48526 48524 7ff7a4042e10 27 API calls 48076->48524 48077 7ff7a4057cb8 48077->48060 48081 7ff7a4057d93 48525 7ff7a4056280 19 API calls 48081->48525 48082 7ff7a4057dff 48082->48060 48084 7ff7a4057e03 _errno _errno 48082->48084 48527 7ff7a4042e10 27 API calls 48084->48527 48086 7ff7a4057e29 48528 7ff7a4056280 19 API calls 48086->48528 48088->47927 48089->47928 48090->47930 48093 7ff7a4052a55 48092->48093 48094 7ff7a4052a60 calloc 48092->48094 48093->47959 48095 7ff7a4052a8a 48094->48095 48096 7ff7a4052cd1 free 48094->48096 48097 7ff7a405e0c0 2 API calls 48095->48097 48096->47959 48098 7ff7a4052b21 48097->48098 48099 7ff7a405e0c0 2 API calls 48098->48099 48100 7ff7a4052b35 48099->48100 48101 7ff7a4052d0d 48100->48101 48102 7ff7a4052c97 _strdup 48100->48102 48103 7ff7a405e0c0 2 API calls 48101->48103 48102->48101 48104 7ff7a4052ca9 48102->48104 48105 7ff7a4052d4d 48103->48105 48106 7ff7a4052cb7 free free 48104->48106 48105->47959 48106->48096 48343 7ff7a4055e80 8 API calls 48107->48343 48110 7ff7a4054ec7 48347 7ff7a407ee10 calloc 48110->48347 48111 7ff7a4054ec0 48346 7ff7a407ee50 23 API calls 48111->48346 48114 7ff7a4054ec5 48115 7ff7a4054ecc 48114->48115 48116 7ff7a4054f42 48115->48116 48152 7ff7a40532cc 48115->48152 48348 7ff7a407ea80 tolower 48115->48348 48129 7ff7a4055005 48116->48129 48116->48152 48350 7ff7a407ef90 8 API calls 48116->48350 48119 7ff7a4054f0f 48119->48116 48120 7ff7a4054f1b free 48119->48120 48121 7ff7a4054f28 48119->48121 48120->48121 48349 7ff7a40596c0 15 API calls 48121->48349 48122 7ff7a405506c 48352 7ff7a4056280 19 API calls 48122->48352 48126 7ff7a4054fec 48128 7ff7a4054ff8 free 48126->48128 48126->48129 48126->48152 48127 7ff7a405507e 48127->48152 48128->48129 48351 7ff7a407ef90 8 API calls 48129->48351 48130 7ff7a405502e 48130->48122 48131 7ff7a40550a4 48130->48131 48130->48152 48353 7ff7a407ef90 8 API calls 48131->48353 48133 7ff7a40550cb 48134 7ff7a40550f2 48133->48134 48135 7ff7a40550d5 _strdup 48133->48135 48134->48152 48354 7ff7a407ef90 8 API calls 48134->48354 48135->48134 48135->48152 48137 7ff7a4055115 48138 7ff7a405511f _strdup 48137->48138 48139 7ff7a4055138 48137->48139 48138->48139 48138->48152 48139->48152 48355 7ff7a407ef90 8 API calls 48139->48355 48141 7ff7a4055158 48142 7ff7a40551ed 48141->48142 48143 7ff7a4055162 _strdup 48141->48143 48142->48152 48356 7ff7a407ef90 8 API calls 48142->48356 48143->48142 48143->48152 48145 7ff7a4055208 48145->48152 48357 7ff7a407ef90 8 API calls 48145->48357 48147 7ff7a405523d 48147->48152 48358 7ff7a407ef90 8 API calls 48147->48358 48149 7ff7a4055281 48150 7ff7a4055285 48149->48150 48151 7ff7a40552a1 strtoul 48149->48151 48150->48152 48359 7ff7a407ef90 8 API calls 48150->48359 48151->48150 48152->47964 48152->47965 48152->48045 48154 7ff7a405531d _strdup 48154->48152 48155 7ff7a40552e0 48155->48154 48155->48155 48360 7ff7a4055f50 20 API calls 48155->48360 48158 7ff7a4053d5d 48157->48158 48159 7ff7a4053c8d memset memset 48157->48159 48162 7ff7a4053d69 _strdup 48158->48162 48163 7ff7a4053d90 48158->48163 48160 7ff7a4053cd8 48159->48160 48161 7ff7a4053cc0 strncpy 48159->48161 48167 7ff7a4053ce4 strncpy 48160->48167 48168 7ff7a4053cff 48160->48168 48161->48160 48162->48163 48164 7ff7a4053d77 48162->48164 48165 7ff7a4053d9c _strdup 48163->48165 48166 7ff7a4053daf 48163->48166 48369 7ff7a4056280 19 API calls 48164->48369 48165->48164 48165->48166 48194 7ff7a4053e0e 48166->48194 48370 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48166->48370 48167->48168 48367 7ff7a406c990 malloc strtoul free 48168->48367 48171 7ff7a4053d86 48174 7ff7a40542b7 free free 48171->48174 48173 7ff7a4053d1f 48176 7ff7a4053d4c 48173->48176 48368 7ff7a406c990 malloc strtoul free 48173->48368 48177 7ff7a408ff10 8 API calls 48174->48177 48175 7ff7a4053dd0 48178 7ff7a4053dec 48175->48178 48371 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48175->48371 48176->48158 48176->48174 48181 7ff7a4053327 48177->48181 48185 7ff7a4056400 15 API calls 48178->48185 48178->48194 48180 7ff7a4054071 free 48182 7ff7a40540ae 48180->48182 48183 7ff7a4054081 48180->48183 48181->47971 48181->47972 48181->48045 48188 7ff7a40540d8 48182->48188 48195 7ff7a40540c8 free 48182->48195 48183->48182 48187 7ff7a40540a2 free 48183->48187 48185->48194 48186 7ff7a40540f4 free free free 48201 7ff7a40540e7 48186->48201 48187->48182 48191 7ff7a40540dd 48188->48191 48376 7ff7a4054b50 47 API calls 48188->48376 48189 7ff7a4053f66 48189->48180 48190 7ff7a4053fb9 48189->48190 48192 7ff7a4053fa0 tolower 48189->48192 48372 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48190->48372 48191->48201 48204 7ff7a4054191 48191->48204 48377 7ff7a4054b50 47 API calls 48191->48377 48192->48190 48192->48192 48194->48186 48194->48189 48194->48194 48198 7ff7a4053e7e strchr 48194->48198 48199 7ff7a4053e97 48194->48199 48195->48188 48197 7ff7a405413f free 48197->48191 48197->48201 48198->48189 48198->48199 48199->48186 48199->48189 48199->48199 48209 7ff7a4053ec0 strchr 48199->48209 48211 7ff7a4053ef0 strchr 48199->48211 48201->48174 48202 7ff7a4054173 free 48202->48201 48202->48204 48203 7ff7a4056400 15 API calls 48206 7ff7a405406c 48203->48206 48204->48201 48214 7ff7a4054207 free 48204->48214 48206->48180 48207 7ff7a4053fe0 48215 7ff7a405401c 48207->48215 48373 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48207->48373 48208 7ff7a4054038 48212 7ff7a405404f 48208->48212 48375 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48208->48375 48209->48199 48211->48199 48212->48203 48212->48206 48214->48201 48215->48212 48374 7ff7a406c850 realloc GetEnvironmentVariableA realloc free 48215->48374 48217 7ff7a40544f4 48216->48217 48218 7ff7a40544c1 48216->48218 48219 7ff7a4054509 free _strdup 48217->48219 48220 7ff7a405452b 48217->48220 48218->48217 48221 7ff7a40544d4 free 48218->48221 48222 7ff7a40544e0 48218->48222 48219->48220 48230 7ff7a4054628 48219->48230 48223 7ff7a4054561 48220->48223 48224 7ff7a405453f free _strdup 48220->48224 48221->48222 48222->48217 48226 7ff7a40544e8 free 48222->48226 48225 7ff7a4054575 free _strdup 48223->48225 48227 7ff7a405459f 48223->48227 48224->48223 48224->48230 48225->48227 48225->48230 48226->48217 48227->48230 48378 7ff7a4080d40 36 API calls 48227->48378 48229 7ff7a405460e 48229->48230 48231 7ff7a4056400 15 API calls 48229->48231 48230->47973 48231->48230 48239 7ff7a4054930 48232->48239 48234 7ff7a4054a08 strchr 48235 7ff7a4054a1d strtol 48234->48235 48234->48239 48235->48239 48237 7ff7a4053467 48237->48045 48242 7ff7a4051fd0 48237->48242 48238 7ff7a4054aaa free 48238->48239 48239->48234 48239->48237 48239->48238 48240 7ff7a4056400 15 API calls 48239->48240 48241 7ff7a40549d7 free 48239->48241 48379 7ff7a40596c0 15 API calls 48239->48379 48380 7ff7a4054700 22 API calls 48239->48380 48240->48239 48241->48238 48241->48239 48243 7ff7a405201f 48242->48243 48244 7ff7a4052005 48242->48244 48245 7ff7a408ff10 8 API calls 48243->48245 48244->48243 48381 7ff7a4080c90 18 API calls 48244->48381 48246 7ff7a4052031 48245->48246 48246->47982 48246->47983 48246->48045 48248 7ff7a4052058 48248->48243 48249 7ff7a405206b GetLastError 48248->48249 48382 7ff7a4042f50 21 API calls 48249->48382 48251 7ff7a4052083 48383 7ff7a4056280 19 API calls 48251->48383 48253 7ff7a4052099 48253->48243 48255 7ff7a404f815 48254->48255 48256 7ff7a404f7f6 _strdup 48254->48256 48258 7ff7a404f841 48255->48258 48259 7ff7a404f822 _strdup 48255->48259 48256->48255 48257 7ff7a404f805 48256->48257 48257->47990 48261 7ff7a404f84e _strdup 48258->48261 48263 7ff7a404f86d 48258->48263 48259->48258 48260 7ff7a404f831 48259->48260 48260->47990 48262 7ff7a404f85d 48261->48262 48261->48263 48262->47990 48264 7ff7a404f899 48263->48264 48265 7ff7a404f87a _strdup 48263->48265 48267 7ff7a404f8c5 48264->48267 48268 7ff7a404f8a6 _strdup 48264->48268 48265->48264 48266 7ff7a404f889 48265->48266 48266->47990 48270 7ff7a404f8f1 48267->48270 48271 7ff7a404f8d2 _strdup 48267->48271 48268->48267 48269 7ff7a404f8b5 48268->48269 48269->47990 48273 7ff7a404f91d 48270->48273 48274 7ff7a404f8fe _strdup 48270->48274 48271->48270 48272 7ff7a404f8e1 48271->48272 48272->47990 48276 7ff7a404f92a _strdup 48273->48276 48277 7ff7a404f939 48273->48277 48274->48273 48275 7ff7a404f90d 48274->48275 48275->47990 48276->48277 48277->47990 48279 7ff7a405e0c0 2 API calls 48278->48279 48288 7ff7a4055373 48279->48288 48280 7ff7a4053847 48280->48002 48336 7ff7a4050f10 15 API calls 48280->48336 48282 7ff7a405ee30 9 API calls 48282->48288 48283 7ff7a4081620 8 API calls 48283->48288 48285 7ff7a4056400 15 API calls 48285->48288 48287 7ff7a4056ee0 closesocket free 48287->48288 48288->48280 48288->48282 48288->48283 48288->48285 48288->48287 48289 7ff7a40554e6 30 API calls 48288->48289 48384 7ff7a405f7f0 free free free free 48288->48384 48385 7ff7a4081230 48288->48385 48388 7ff7a404b510 48288->48388 48402 7ff7a40531b0 free free 48289->48402 48291 7ff7a4055746 48292 7ff7a4055754 free 48291->48292 48403 7ff7a404f960 8 API calls 48292->48403 48294 7ff7a4055774 48404 7ff7a404f960 8 API calls 48294->48404 48296 7ff7a4055780 free free free 48296->48288 48298 7ff7a40520ae 48297->48298 48299 7ff7a405e0c0 2 API calls 48298->48299 48300 7ff7a4052118 48299->48300 48300->48026 48302 7ff7a4055dec 48301->48302 48303 7ff7a4055df5 48302->48303 48304 7ff7a4055e0e free 48302->48304 48305 7ff7a4055e22 48302->48305 48304->48305 48306 7ff7a4055e27 48305->48306 48307 7ff7a4055e35 _strdup 48305->48307 48334->47998 48335->47995 48336->48005 48337->48015 48338->48017 48339->48022 48340->48045 48341->48035 48342->48032 48361 7ff7a407ee20 48343->48361 48346->48114 48348->48119 48349->48116 48350->48126 48351->48130 48352->48127 48353->48133 48354->48137 48355->48141 48356->48145 48357->48147 48358->48149 48359->48155 48360->48154 48362 7ff7a407ee25 48361->48362 48363 7ff7a4054eb4 48361->48363 48366 7ff7a407fe00 12 API calls 48362->48366 48363->48110 48363->48111 48367->48173 48368->48176 48369->48171 48370->48175 48371->48178 48372->48207 48373->48215 48374->48208 48375->48212 48376->48197 48377->48202 48378->48229 48379->48239 48380->48239 48381->48248 48382->48251 48383->48253 48384->48288 48405 7ff7a4085150 7 API calls 48385->48405 48387 7ff7a408124e 48389 7ff7a404b980 48388->48389 48390 7ff7a404b998 EnterCriticalSection LeaveCriticalSection 48389->48390 48391 7ff7a404ba24 free 48389->48391 48392 7ff7a404b9db 48390->48392 48393 7ff7a404b9d1 CloseHandle 48390->48393 48391->48288 48394 7ff7a404b9e9 48392->48394 48395 7ff7a404b9e1 48392->48395 48396 7ff7a404b9fc 48393->48396 48407 7ff7a404ba40 7 API calls 48394->48407 48406 7ff7a40696b0 WaitForSingleObjectEx CloseHandle 48395->48406 48397 7ff7a404ba11 closesocket 48396->48397 48408 7ff7a4046410 free 48396->48408 48397->48391 48401 7ff7a404b9f2 free 48401->48396 48402->48291 48403->48294 48404->48296 48405->48387 48406->48394 48407->48401 48408->48397 48415 7ff7a405863f memcpy 48414->48415 48417 7ff7a40586a8 socket 48415->48417 48420 7ff7a405867b 48415->48420 48417->48420 48419 7ff7a408ff10 8 API calls 48421 7ff7a4058b7b 48419->48421 48423 7ff7a40586e7 48420->48423 48472 7ff7a4058a04 48420->48472 48501 7ff7a40655a0 ioctlsocket 48420->48501 48421->48053 48422 7ff7a4058b0a _errno _errno _errno 48514 7ff7a4042e10 27 API calls 48422->48514 48423->48422 48481 7ff7a4081ad0 48423->48481 48426 7ff7a4058b3b 48515 7ff7a4056280 19 API calls 48426->48515 48427 7ff7a4058734 48427->48422 48429 7ff7a405873d htons 48427->48429 48431 7ff7a4056400 15 API calls 48429->48431 48430 7ff7a4058b50 48432 7ff7a4056ee0 2 API calls 48430->48432 48433 7ff7a405875e 48431->48433 48434 7ff7a40589e5 48432->48434 48435 7ff7a40587d9 48433->48435 48436 7ff7a405877f setsockopt 48433->48436 48434->48472 48439 7ff7a4059110 14 API calls 48435->48439 48443 7ff7a4058811 48435->48443 48436->48435 48437 7ff7a40587ad WSAGetLastError 48436->48437 48502 7ff7a4042e10 27 API calls 48437->48502 48439->48443 48440 7ff7a4058815 48446 7ff7a405889a setsockopt 48440->48446 48450 7ff7a40588d9 48440->48450 48441 7ff7a4058832 getsockopt 48444 7ff7a4058859 48441->48444 48445 7ff7a4058863 setsockopt 48441->48445 48442 7ff7a40587c7 48447 7ff7a4056400 15 API calls 48442->48447 48443->48440 48443->48441 48444->48440 48444->48445 48445->48440 48448 7ff7a40588c7 48446->48448 48455 7ff7a40588de 48446->48455 48447->48435 48451 7ff7a4056400 15 API calls 48448->48451 48449 7ff7a40589b8 48503 7ff7a4057f40 596 API calls 48449->48503 48463 7ff7a40589a7 48450->48463 48467 7ff7a40589f9 48450->48467 48451->48450 48452 7ff7a4058a0e 48500 7ff7a40655a0 ioctlsocket 48452->48500 48454 7ff7a4058a1b 48457 7ff7a405e0c0 2 API calls 48454->48457 48458 7ff7a405890c WSAIoctl 48455->48458 48460 7ff7a4058a25 48457->48460 48458->48450 48461 7ff7a4058954 WSAGetLastError 48458->48461 48459 7ff7a40589d4 48459->48452 48462 7ff7a40589da 48459->48462 48464 7ff7a4058a4f 48460->48464 48512 7ff7a4046100 17 API calls 48460->48512 48465 7ff7a4056400 15 API calls 48461->48465 48504 7ff7a4056ee0 48462->48504 48463->48449 48463->48452 48470 7ff7a4058a98 WSAGetLastError 48464->48470 48471 7ff7a4058a6f connect 48464->48471 48464->48472 48465->48450 48469 7ff7a4056ee0 2 API calls 48467->48469 48469->48472 48470->48472 48473 7ff7a4058aa5 48470->48473 48471->48470 48471->48472 48472->48419 48473->48472 48513 7ff7a4042e10 27 API calls 48473->48513 48475 7ff7a4058ac1 48476 7ff7a4056400 15 API calls 48475->48476 48477 7ff7a4058ad7 48476->48477 48478 7ff7a4056ee0 2 API calls 48477->48478 48478->48472 48479->48052 48480->48056 48482 7ff7a4081b09 48481->48482 48483 7ff7a4081adf 48481->48483 48485 7ff7a4059790 13 API calls 48482->48485 48484 7ff7a4081ae4 _errno 48483->48484 48491 7ff7a4081af7 48483->48491 48484->48427 48487 7ff7a4081b78 48485->48487 48486 7ff7a4081bc4 _errno 48488 7ff7a4081b97 48486->48488 48487->48486 48487->48488 48489 7ff7a408ff10 8 API calls 48488->48489 48490 7ff7a4081bdf 48489->48490 48490->48427 48492 7ff7a4059790 13 API calls 48491->48492 48493 7ff7a4081e6a 48491->48493 48497 7ff7a4081df0 48491->48497 48492->48491 48516 7ff7a4081b20 14 API calls 48493->48516 48495 7ff7a4081e19 48498 7ff7a408ff10 8 API calls 48495->48498 48496 7ff7a4081e83 _errno 48496->48495 48497->48495 48497->48496 48499 7ff7a4081e57 48498->48499 48499->48427 48500->48454 48501->48423 48502->48442 48503->48459 48505 7ff7a4056f20 closesocket 48504->48505 48506 7ff7a4056ef5 48504->48506 48505->48434 48507 7ff7a4056f36 48506->48507 48509 7ff7a4056f11 48506->48509 48518 7ff7a4046410 free 48507->48518 48517 7ff7a4046410 free 48509->48517 48511 7ff7a4056f3e 48511->48434 48512->48464 48513->48475 48514->48426 48515->48430 48516->48497 48517->48505 48518->48511 48519->48070 48520->48077 48521->48074 48522->48077 48523->48072 48524->48081 48525->48077 48526->48082 48527->48086 48528->48077 48529 7ff7a404808b 48530 7ff7a404809e 48529->48530 48531 7ff7a4048157 48530->48531 48534 7ff7a40480a6 48530->48534 48552 7ff7a405bfe0 48530->48552 48532 7ff7a40480e3 48531->48532 48531->48534 48535 7ff7a4047610 292 API calls 48532->48535 48549 7ff7a4047b8b 48534->48549 48591 7ff7a405be90 free 48534->48591 48535->48549 48537 7ff7a40480dd 48537->48531 48537->48532 48537->48534 48572 7ff7a4061be0 48537->48572 48539 7ff7a4048c32 48540 7ff7a4048c23 48594 7ff7a4056280 19 API calls 48540->48594 48541 7ff7a4048db0 17 API calls 48541->48549 48544 7ff7a4051d40 90 API calls 48544->48549 48545 7ff7a4057b00 10 API calls 48545->48549 48546 7ff7a4047c2e 48547 7ff7a4056280 19 API calls 48546->48547 48546->48549 48547->48546 48549->48539 48549->48540 48549->48541 48549->48544 48549->48545 48549->48546 48550 7ff7a4047610 292 API calls 48549->48550 48590 7ff7a4056280 19 API calls 48549->48590 48592 7ff7a4046330 15 API calls 48549->48592 48593 7ff7a4065af0 22 API calls 48549->48593 48550->48549 48553 7ff7a405c02f 48552->48553 48554 7ff7a405c014 48552->48554 48556 7ff7a405c071 memset 48553->48556 48571 7ff7a405c035 48553->48571 48554->48553 48595 7ff7a4050480 48554->48595 48559 7ff7a405c0a3 48556->48559 48557 7ff7a408ff10 8 API calls 48558 7ff7a405c1d5 48557->48558 48558->48537 48560 7ff7a405c0fe calloc 48559->48560 48561 7ff7a405c176 48559->48561 48562 7ff7a405c12c 48560->48562 48563 7ff7a405c116 48560->48563 48608 7ff7a405b390 404 API calls 48561->48608 48565 7ff7a4056400 15 API calls 48562->48565 48563->48571 48567 7ff7a405c13b 48565->48567 48566 7ff7a405c186 48568 7ff7a4056400 15 API calls 48566->48568 48569 7ff7a405c1a1 48566->48569 48567->48561 48568->48569 48570 7ff7a405c1ab free 48569->48570 48569->48571 48570->48571 48571->48557 48573 7ff7a4061c0c 48572->48573 48574 7ff7a405bfe0 407 API calls 48573->48574 48577 7ff7a4061c16 48574->48577 48575 7ff7a408ff10 8 API calls 48576 7ff7a4061d72 48575->48576 48576->48531 48578 7ff7a4061d2c 48577->48578 48579 7ff7a4061c67 48577->48579 48582 7ff7a4061d46 48577->48582 48580 7ff7a4050480 255 API calls 48578->48580 48578->48582 48581 7ff7a4059790 13 API calls 48579->48581 48580->48582 48583 7ff7a4061cd8 calloc 48581->48583 48582->48575 48584 7ff7a4061cf7 48583->48584 48585 7ff7a4061cf0 48583->48585 48632 7ff7a4062270 48584->48632 48585->48582 48587 7ff7a4061d06 48587->48582 48642 7ff7a4062020 48587->48642 48590->48549 48591->48549 48592->48549 48593->48549 48594->48539 48596 7ff7a40504a7 48595->48596 48597 7ff7a40504ae 48595->48597 48627 7ff7a4050e60 memset 48596->48627 48599 7ff7a40504d4 48597->48599 48600 7ff7a40504dd 48597->48600 48602 7ff7a4050517 48597->48602 48628 7ff7a4056280 19 API calls 48599->48628 48607 7ff7a406a390 255 API calls 48600->48607 48609 7ff7a4069700 48600->48609 48602->48553 48603 7ff7a4050527 48603->48602 48604 7ff7a4050502 48604->48602 48605 7ff7a40659a0 2 API calls 48604->48605 48605->48602 48607->48604 48608->48566 48610 7ff7a406a390 48609->48610 48612 7ff7a4057b00 10 API calls 48610->48612 48622 7ff7a406a40b 48610->48622 48626 7ff7a406a3d9 48610->48626 48611 7ff7a406a502 48611->48626 48631 7ff7a406baf0 69 API calls 48611->48631 48616 7ff7a406a3f7 48612->48616 48613 7ff7a4057b00 10 API calls 48613->48622 48615 7ff7a406a4ec 48630 7ff7a4056280 19 API calls 48615->48630 48616->48615 48617 7ff7a406a580 74 API calls 48616->48617 48617->48622 48619 7ff7a406a4e5 48619->48626 48620 7ff7a40668f0 19 API calls 48620->48622 48621 7ff7a406b360 254 API calls 48621->48622 48622->48611 48622->48613 48622->48615 48622->48620 48622->48621 48623 7ff7a406a4cd WSAGetLastError 48622->48623 48625 7ff7a406a4bc 48622->48625 48622->48626 48629 7ff7a4056280 19 API calls 48623->48629 48625->48615 48625->48626 48626->48604 48627->48597 48628->48603 48629->48619 48630->48619 48631->48626 48662 7ff7a4059800 15 API calls 48632->48662 48634 7ff7a4062299 48635 7ff7a40622a1 48634->48635 48637 7ff7a40622da 48634->48637 48635->48635 48638 7ff7a40622ba 48635->48638 48636 7ff7a40622f9 48636->48587 48637->48636 48639 7ff7a40622e7 free free 48637->48639 48663 7ff7a4061eb0 7 API calls 48638->48663 48639->48636 48641 7ff7a40622c5 free 48641->48587 48643 7ff7a4062082 48642->48643 48644 7ff7a4062094 48643->48644 48646 7ff7a40620ea 48643->48646 48664 7ff7a405c990 malloc 48644->48664 48665 7ff7a4056ad0 48646->48665 48648 7ff7a40620a9 48650 7ff7a40620b0 48648->48650 48651 7ff7a40620cf memcpy 48648->48651 48652 7ff7a40620c7 48650->48652 48653 7ff7a40620b5 free free 48650->48653 48651->48646 48654 7ff7a4061d28 48652->48654 48653->48652 48654->48578 48654->48582 48655 7ff7a4062239 free free 48655->48654 48656 7ff7a406214c 48668 7ff7a40561c0 fwrite fwrite 48656->48668 48658 7ff7a406217e 48658->48654 48658->48655 48659 7ff7a406215d 48660 7ff7a4062176 48659->48660 48669 7ff7a40561c0 fwrite fwrite 48659->48669 48660->48658 48662->48634 48663->48641 48664->48648 48670 7ff7a406c5a0 48665->48670 48668->48659 48669->48660 48671 7ff7a406c619 malloc 48670->48671 48672 7ff7a406c5f2 48670->48672 48673 7ff7a406c659 48671->48673 48674 7ff7a406c60c 48671->48674 48672->48671 48672->48674 48675 7ff7a406c679 memcpy 48673->48675 48676 7ff7a408ff10 8 API calls 48674->48676 48681 7ff7a406c6fc 48675->48681 48677 7ff7a4056b00 48676->48677 48677->48656 48677->48658 48678 7ff7a406c79d 48679 7ff7a406c809 free 48678->48679 48679->48674 48680 7ff7a4057b00 10 API calls 48680->48681 48681->48678 48681->48679 48681->48680 48682 7ff7a406c7d1 48681->48682 48684 7ff7a40668f0 19 API calls 48681->48684 48686 7ff7a406c7ab WSAGetLastError 48681->48686 48688 7ff7a4056b40 48 API calls 48681->48688 48691 7ff7a4056280 19 API calls 48682->48691 48684->48681 48685 7ff7a406c7e3 48685->48679 48690 7ff7a4056280 19 API calls 48686->48690 48688->48681 48689 7ff7a406c7c3 48689->48678 48690->48689 48691->48685 48692 7ff7a406a915 48693 7ff7a406a919 48692->48693 48698 7ff7a406a9e7 48693->48698 48719 7ff7a406a9a0 strtol 48693->48719 48726 7ff7a406a9c2 strchr 48693->48726 48747 7ff7a406aa47 48693->48747 48799 7ff7a4069d40 62 API calls 48693->48799 48694 7ff7a406aea5 calloc 48696 7ff7a406aecc 48694->48696 48704 7ff7a406af48 48694->48704 48695 7ff7a406aa06 strchr 48697 7ff7a406aa1f strncmp 48695->48697 48699 7ff7a406ab6b 48695->48699 48805 7ff7a4056280 19 API calls 48696->48805 48701 7ff7a406aa3c 48697->48701 48702 7ff7a406aa60 strncmp 48697->48702 48698->48694 48698->48695 48705 7ff7a406ac7e fopen 48699->48705 48706 7ff7a406af2b 48699->48706 48708 7ff7a406ab39 strchr 48701->48708 48702->48701 48703 7ff7a406aa82 strncmp 48702->48703 48703->48701 48711 7ff7a406aaa4 strncmp 48703->48711 48713 7ff7a406afaa 48704->48713 48714 7ff7a406afa4 CertFreeCertificateContext 48704->48714 48705->48706 48715 7ff7a406ac97 fseek 48705->48715 48807 7ff7a4056280 19 API calls 48706->48807 48707 7ff7a406aedb 48709 7ff7a406aee9 CertFreeCertificateContext 48707->48709 48797 7ff7a406b166 48707->48797 48708->48699 48710 7ff7a406ab53 _strdup 48708->48710 48709->48797 48710->48699 48718 7ff7a406ab73 48710->48718 48711->48701 48720 7ff7a406aac3 strncmp 48711->48720 48721 7ff7a406afae 48713->48721 48722 7ff7a406b013 48713->48722 48714->48713 48716 7ff7a406accd 48715->48716 48717 7ff7a406acc1 ftell 48715->48717 48723 7ff7a406acde fseek 48716->48723 48724 7ff7a406aef9 fclose 48716->48724 48717->48716 48718->48699 48739 7ff7a406ab94 CertOpenStore 48718->48739 48719->48693 48719->48726 48720->48708 48727 7ff7a406aada strncmp 48720->48727 48808 7ff7a4042620 22 API calls 48721->48808 48729 7ff7a4068210 13 API calls 48722->48729 48723->48724 48731 7ff7a406acfb malloc 48723->48731 48806 7ff7a4056280 19 API calls 48724->48806 48725 7ff7a408ff10 8 API calls 48732 7ff7a406b31c 48725->48732 48726->48693 48726->48698 48727->48701 48734 7ff7a406aaf9 strncmp 48727->48734 48736 7ff7a406b02c 48729->48736 48731->48724 48738 7ff7a406ad14 fread 48731->48738 48734->48701 48740 7ff7a406ab18 strncmp 48734->48740 48735 7ff7a406afc2 48809 7ff7a4056280 19 API calls 48735->48809 48743 7ff7a406b03f 48736->48743 48749 7ff7a4068210 13 API calls 48736->48749 48737 7ff7a406af18 free 48737->48797 48738->48724 48744 7ff7a406ad32 fclose 48738->48744 48745 7ff7a406abe7 free CryptStringToBinaryA 48739->48745 48746 7ff7a406abb7 GetLastError 48739->48746 48740->48699 48740->48701 48742 7ff7a406afd4 free 48794 7ff7a406aa56 48742->48794 48742->48797 48750 7ff7a4056400 15 API calls 48743->48750 48756 7ff7a406b052 48743->48756 48751 7ff7a406ad5f malloc 48744->48751 48752 7ff7a406ad4f 48744->48752 48754 7ff7a406ae71 CertCloseStore 48745->48754 48755 7ff7a406ac32 CertFindCertificateInStore 48745->48755 48801 7ff7a4056280 19 API calls 48746->48801 48800 7ff7a4056280 19 API calls 48747->48800 48749->48743 48750->48756 48758 7ff7a406ada3 PFXImportCertStore free free 48751->48758 48759 7ff7a406ad79 MultiByteToWideChar 48751->48759 48752->48751 48754->48797 48760 7ff7a406ae8a CertCloseStore 48755->48760 48761 7ff7a406ac64 48755->48761 48762 7ff7a4056400 15 API calls 48756->48762 48765 7ff7a406b09b 48756->48765 48757 7ff7a406abd6 free 48757->48797 48766 7ff7a406ae2a CertFindCertificateInStore 48758->48766 48767 7ff7a406add4 GetLastError 48758->48767 48759->48758 48760->48694 48761->48754 48762->48765 48764 7ff7a406b0fd calloc 48768 7ff7a406b157 48764->48768 48769 7ff7a406b170 48764->48769 48765->48764 48771 7ff7a406ae86 48766->48771 48772 7ff7a406ae52 GetLastError 48766->48772 48773 7ff7a406ade9 48767->48773 48774 7ff7a406ae11 48767->48774 48810 7ff7a4056280 19 API calls 48768->48810 48778 7ff7a406b27c 48769->48778 48779 7ff7a406b1d9 free 48769->48779 48769->48797 48771->48760 48804 7ff7a4056280 19 API calls 48772->48804 48802 7ff7a4056280 19 API calls 48773->48802 48803 7ff7a4056280 19 API calls 48774->48803 48782 7ff7a4056b40 48 API calls 48778->48782 48780 7ff7a406b20a 48779->48780 48781 7ff7a406b256 48779->48781 48784 7ff7a406b212 48780->48784 48785 7ff7a406b230 48780->48785 48815 7ff7a4042620 22 API calls 48781->48815 48791 7ff7a406b29d 48782->48791 48811 7ff7a4042620 22 API calls 48784->48811 48813 7ff7a4042620 22 API calls 48785->48813 48786 7ff7a406b260 48816 7ff7a4056280 19 API calls 48786->48816 48790 7ff7a406b219 48812 7ff7a4056280 19 API calls 48790->48812 48796 7ff7a406b2f9 48791->48796 48791->48797 48792 7ff7a406b23a 48814 7ff7a4056280 19 API calls 48792->48814 48794->48797 48817 7ff7a4056280 19 API calls 48796->48817 48797->48725 48799->48693 48800->48794 48801->48757 48802->48794 48803->48794 48804->48754 48805->48707 48806->48737 48807->48794 48808->48735 48809->48742 48810->48797 48811->48790 48812->48794 48813->48792 48814->48794 48815->48786 48816->48794 48817->48797 48818 7ff7a405f4f0 48819 7ff7a405f53e 48818->48819 48852 7ff7a405f860 48819->48852 48822 7ff7a4056400 15 API calls 48825 7ff7a405f577 48822->48825 48823 7ff7a4068210 13 API calls 48826 7ff7a405f5f6 48823->48826 48824 7ff7a408ff10 8 API calls 48827 7ff7a405f6f2 48824->48827 48825->48823 48836 7ff7a405f6c5 48825->48836 48828 7ff7a405f61b 48826->48828 48829 7ff7a405f5fa 48826->48829 48831 7ff7a4068210 13 API calls 48828->48831 48867 7ff7a40691c0 15 API calls 48829->48867 48833 7ff7a405f62d 48831->48833 48832 7ff7a405f60f 48832->48828 48834 7ff7a405f70a 48832->48834 48835 7ff7a405f631 48833->48835 48842 7ff7a405f652 48833->48842 48837 7ff7a405f714 48834->48837 48868 7ff7a40691c0 15 API calls 48835->48868 48836->48824 48872 7ff7a405ea70 27 API calls 48837->48872 48840 7ff7a405f646 48840->48834 48840->48842 48841 7ff7a405f736 48843 7ff7a405f6be 48841->48843 48873 7ff7a4068f90 free free free 48841->48873 48842->48836 48846 7ff7a405f683 48842->48846 48869 7ff7a40832c0 534 API calls 48842->48869 48843->48836 48846->48834 48847 7ff7a405f6a0 48846->48847 48847->48836 48848 7ff7a405f6b9 48847->48848 48849 7ff7a405f6c0 48847->48849 48870 7ff7a40834c0 314 API calls 48848->48870 48871 7ff7a404b710 51 API calls 48849->48871 48853 7ff7a405f8a0 48852->48853 48854 7ff7a405f8db 48853->48854 48855 7ff7a405f8c6 tolower 48853->48855 48856 7ff7a4059790 13 API calls 48854->48856 48855->48854 48855->48855 48857 7ff7a405f8f2 48856->48857 48858 7ff7a405f95c 48857->48858 48860 7ff7a405f938 tolower 48857->48860 48866 7ff7a405f9d1 48857->48866 48859 7ff7a405f996 _time64 48858->48859 48858->48866 48861 7ff7a405f9b5 48859->48861 48859->48866 48863 7ff7a4059790 13 API calls 48860->48863 48865 7ff7a4056400 15 API calls 48861->48865 48861->48866 48862 7ff7a408ff10 8 API calls 48864 7ff7a405f55b 48862->48864 48863->48858 48864->48822 48864->48825 48865->48866 48866->48862 48867->48832 48868->48840 48869->48846 48870->48843 48871->48836 48872->48841 48873->48843 48874 7ff7a404bab0 48875 7ff7a4059790 13 API calls 48874->48875 48876 7ff7a404baef 48875->48876 48893 7ff7a4068fe0 getaddrinfo 48876->48893 48879 7ff7a404bb0b WSAGetLastError 48881 7ff7a404bb2a 48879->48881 48882 7ff7a404bb15 WSAGetLastError 48879->48882 48880 7ff7a404bb2d EnterCriticalSection 48883 7ff7a404bb3c LeaveCriticalSection 48880->48883 48884 7ff7a404bb58 48880->48884 48881->48880 48882->48880 48911 7ff7a404ba40 7 API calls 48883->48911 48886 7ff7a404bb86 LeaveCriticalSection 48884->48886 48887 7ff7a404bb62 send 48884->48887 48888 7ff7a404bb96 48886->48888 48887->48886 48890 7ff7a404bb7d WSAGetLastError 48887->48890 48891 7ff7a408ff10 8 API calls 48888->48891 48889 7ff7a404bb4d free 48889->48888 48890->48886 48892 7ff7a404bba5 48891->48892 48895 7ff7a4069013 48893->48895 48904 7ff7a404bb05 48893->48904 48894 7ff7a4069184 WSASetLastError 48894->48904 48895->48894 48896 7ff7a40690fe 48895->48896 48899 7ff7a4069069 malloc 48895->48899 48897 7ff7a4069147 48896->48897 48898 7ff7a4069141 freeaddrinfo 48896->48898 48900 7ff7a406914c 48897->48900 48901 7ff7a406917f 48897->48901 48898->48897 48902 7ff7a406912c 48899->48902 48903 7ff7a4069080 malloc 48899->48903 48900->48904 48905 7ff7a4069151 free free free 48900->48905 48901->48894 48901->48904 48902->48896 48906 7ff7a406911b free 48903->48906 48907 7ff7a40690b7 memcpy 48903->48907 48904->48879 48904->48880 48905->48904 48905->48905 48906->48896 48908 7ff7a40690de 48907->48908 48909 7ff7a40690cf _strdup 48907->48909 48908->48895 48909->48908 48910 7ff7a4069100 free free 48909->48910 48910->48896 48911->48889 48912 7ff7a40901ec 48913 7ff7a4090205 48912->48913 48914 7ff7a4090343 48913->48914 48915 7ff7a409020d __scrt_acquire_startup_lock 48913->48915 48994 7ff7a409067c 9 API calls 48914->48994 48917 7ff7a409034d 48915->48917 48922 7ff7a409022b __scrt_release_startup_lock 48915->48922 48995 7ff7a409067c 9 API calls 48917->48995 48919 7ff7a4090358 48921 7ff7a4090360 _exit 48919->48921 48920 7ff7a4090250 48922->48920 48923 7ff7a40902d6 _get_initial_narrow_environment __p___argv __p___argc 48922->48923 48926 7ff7a40902ce _register_thread_local_exe_atexit_callback 48922->48926 48932 7ff7a4041e40 48923->48932 48926->48923 48996 7ff7a408fb18 48932->48996 48936 7ff7a4042369 ?_Throw_Cpp_error@std@@YAXH 48937 7ff7a4041eb8 48938 7ff7a404235e ?_Throw_Cpp_error@std@@YAXH 48937->48938 48939 7ff7a4041ec3 _Thrd_detach 48937->48939 48938->48936 48939->48938 48940 7ff7a4041ee0 16 API calls 48939->48940 49005 7ff7a4032ab0 48940->49005 48994->48917 48995->48919 48997 7ff7a408fb32 malloc 48996->48997 48998 7ff7a408fb23 48997->48998 48999 7ff7a4041e6f _beginthreadex 48997->48999 48998->48997 49000 7ff7a408fb42 48998->49000 48999->48936 48999->48937 49003 7ff7a408fb4d 49000->49003 49094 7ff7a4090640 _CxxThrowException std::bad_alloc::bad_alloc 49000->49094 49095 7ff7a4031a00 49003->49095 49004 7ff7a408fb53 49098 7ff7a4032850 49005->49098 49007 7ff7a4032afa 49008 7ff7a40330b8 49007->49008 49111 7ff7a4033170 49007->49111 49227 7ff7a4033130 7 API calls 49008->49227 49010 7ff7a4033114 Sleep exit 49012 7ff7a4033128 49010->49012 49014 7ff7a4031a00 Concurrency::cancel_current_task __std_exception_copy 49012->49014 49013 7ff7a4032b7f 49123 7ff7a4033c40 49013->49123 49017 7ff7a403312d 49014->49017 49016 7ff7a4032b8c 49130 7ff7a40332e0 49016->49130 49019 7ff7a4032bbc 49020 7ff7a4033c40 10 API calls 49019->49020 49021 7ff7a4032bc8 49020->49021 49138 7ff7a40333e0 49021->49138 49023 7ff7a4032bfb 49024 7ff7a4033c40 10 API calls 49023->49024 49025 7ff7a4032c08 49024->49025 49026 7ff7a4032c5f 49025->49026 49029 7ff7a4032c58 _invalid_parameter_noinfo_noreturn 49025->49029 49027 7ff7a4032caf 49026->49027 49030 7ff7a4032ca8 _invalid_parameter_noinfo_noreturn 49026->49030 49028 7ff7a4032cee 49027->49028 49032 7ff7a4032ce7 _invalid_parameter_noinfo_noreturn 49027->49032 49031 7ff7a4032d3c 49028->49031 49034 7ff7a4032d35 _invalid_parameter_noinfo_noreturn 49028->49034 49029->49026 49030->49027 49035 7ff7a4032d74 _invalid_parameter_noinfo_noreturn 49031->49035 49038 7ff7a4032d7b 49031->49038 49032->49028 49033 7ff7a4032dc9 49146 7ff7a4033560 49033->49146 49034->49031 49035->49038 49036 7ff7a4032e2f 49039 7ff7a408fb18 3 API calls 49036->49039 49043 7ff7a4032e1a memcpy 49036->49043 49038->49012 49038->49033 49038->49036 49042 7ff7a408fb18 3 API calls 49038->49042 49039->49043 49045 7ff7a4032e12 49042->49045 49043->49033 49045->49043 49047 7ff7a4032e28 _invalid_parameter_noinfo_noreturn 49045->49047 49047->49036 49096 7ff7a4031a0e Concurrency::cancel_current_task 49095->49096 49097 7ff7a4031a1f __std_exception_copy 49096->49097 49097->49004 49099 7ff7a40328a0 49098->49099 49099->49099 49100 7ff7a40328b0 system 49099->49100 49101 7ff7a4032910 49100->49101 49101->49101 49102 7ff7a4032920 system 49101->49102 49103 7ff7a4032970 49102->49103 49103->49103 49104 7ff7a4032980 system 49103->49104 49105 7ff7a40329c0 49104->49105 49105->49105 49106 7ff7a40329d0 system 49105->49106 49107 7ff7a4032a10 49106->49107 49107->49107 49108 7ff7a4032a20 system 49107->49108 49109 7ff7a4032a80 49108->49109 49109->49109 49110 7ff7a4032a90 system 49109->49110 49110->49007 49113 7ff7a403318e 49111->49113 49112 7ff7a40331d8 49115 7ff7a4033237 49112->49115 49116 7ff7a4034320 7 API calls 49112->49116 49113->49112 49114 7ff7a4034320 7 API calls 49113->49114 49114->49112 49228 7ff7a4035de0 49115->49228 49116->49115 49119 7ff7a4033286 49120 7ff7a40332c7 49119->49120 49122 7ff7a40332c0 _invalid_parameter_noinfo_noreturn 49119->49122 49120->49013 49121 7ff7a403327f _invalid_parameter_noinfo_noreturn 49121->49119 49122->49120 49124 7ff7a4033c5d 49123->49124 49125 7ff7a4033cb8 49124->49125 49126 7ff7a4033c73 memcpy 49124->49126 49254 7ff7a4034ec0 9 API calls Concurrency::cancel_current_task 49125->49254 49126->49016 49129 7ff7a4033ccb 49129->49016 49131 7ff7a40332fe 49130->49131 49132 7ff7a4034320 7 API calls 49131->49132 49133 7ff7a4033348 49131->49133 49132->49133 49255 7ff7a4036de0 49133->49255 49135 7ff7a4033364 49136 7ff7a40333c7 49135->49136 49137 7ff7a40333c0 _invalid_parameter_noinfo_noreturn 49135->49137 49136->49019 49137->49136 49140 7ff7a40333fe 49138->49140 49139 7ff7a4033448 49142 7ff7a4036de0 12 API calls 49139->49142 49140->49139 49141 7ff7a4034320 7 API calls 49140->49141 49141->49139 49144 7ff7a4033464 49142->49144 49143 7ff7a40334c7 49143->49023 49144->49143 49145 7ff7a40334c0 _invalid_parameter_noinfo_noreturn 49144->49145 49145->49143 49147 7ff7a4032850 6 API calls 49146->49147 49148 7ff7a403359c 49147->49148 49262 7ff7a40423e0 49148->49262 49150 7ff7a40335a1 49151 7ff7a40335ad 49150->49151 49157 7ff7a4033642 49150->49157 49152 7ff7a4034320 7 API calls 49151->49152 49153 7ff7a40335d1 49152->49153 49155 7ff7a403379a _invalid_parameter_noinfo_noreturn 49153->49155 49161 7ff7a4033604 49153->49161 49154 7ff7a408ff10 8 API calls 49156 7ff7a4032e6a 49154->49156 49271 7ff7a40424a0 49157->49271 49159 7ff7a403371e 49159->49153 49160 7ff7a4033729 MessageBoxA 49159->49160 49160->49153 49161->49154 49227->49010 49229 7ff7a4035e2a 49228->49229 49230 7ff7a4035e7f 49228->49230 49229->49230 49232 7ff7a4035e2f memcpy 49229->49232 49231 7ff7a4035e87 memcpy 49230->49231 49240 7ff7a4035edb 49230->49240 49233 7ff7a4035ec1 49231->49233 49234 7ff7a4035ec4 memcpy 49231->49234 49236 7ff7a403324a 49232->49236 49233->49234 49234->49236 49235 7ff7a4035fc1 49253 7ff7a4031aa0 ?_Xlength_error@std@@YAXPEBD 49235->49253 49236->49119 49236->49121 49239 7ff7a4035f59 49244 7ff7a4035f44 memcpy 49239->49244 49245 7ff7a408fb18 3 API calls 49239->49245 49240->49235 49240->49239 49242 7ff7a4035f37 49240->49242 49243 7ff7a4035fbc 49240->49243 49248 7ff7a408fb18 3 API calls 49242->49248 49247 7ff7a4031a00 Concurrency::cancel_current_task __std_exception_copy 49243->49247 49249 7ff7a4035f90 49244->49249 49250 7ff7a4035f93 memcpy 49244->49250 49245->49244 49247->49235 49251 7ff7a4035f3f 49248->49251 49249->49250 49250->49236 49251->49244 49252 7ff7a4035f52 _invalid_parameter_noinfo_noreturn 49251->49252 49252->49239 49254->49129 49256 7ff7a4036ea5 49255->49256 49259 7ff7a4036e10 memcpy memcpy memcpy 49255->49259 49261 7ff7a403c610 9 API calls Concurrency::cancel_current_task 49256->49261 49258 7ff7a4036eba 49258->49135 49259->49135 49261->49258 49263 7ff7a40423ed calloc 49262->49263 49270 7ff7a404245d 49262->49270 49266 7ff7a4042442 49263->49266 49265 7ff7a4042471 49265->49150 49267 7ff7a404247c 49266->49267 49292 7ff7a4059290 49266->49292 49267->49150 49269 7ff7a4042450 49269->49267 49269->49270 49323 7ff7a40521c0 25 API calls 49270->49323 49272 7ff7a40424b9 49271->49272 49273 7ff7a40424af 49271->49273 49274 7ff7a40424ea 49272->49274 49275 7ff7a40424d2 49272->49275 49273->49159 49280 7ff7a4042506 49274->49280 49350 7ff7a40464d0 calloc 49274->49350 49398 7ff7a4056280 19 API calls 49275->49398 49278 7ff7a404250e 49278->49159 49279 7ff7a40424de 49279->49159 49280->49278 49378 7ff7a4046d80 49280->49378 49293 7ff7a40592ae WSAStartup 49292->49293 49294 7ff7a40592f6 49292->49294 49295 7ff7a40592d9 49293->49295 49296 7ff7a40592c2 49293->49296 49324 7ff7a4082d90 49294->49324 49299 7ff7a408ff10 8 API calls 49295->49299 49296->49294 49298 7ff7a40592d3 WSACleanup 49296->49298 49298->49295 49301 7ff7a40592ee 49299->49301 49301->49269 49302 7ff7a4059303 GetModuleHandleA 49305 7ff7a405933e GetProcAddress strpbrk 49302->49305 49306 7ff7a4059332 49302->49306 49303 7ff7a40595bf 49304 7ff7a408ff10 8 API calls 49303->49304 49307 7ff7a40595cf 49304->49307 49309 7ff7a405939b 49305->49309 49310 7ff7a4059375 49305->49310 49308 7ff7a40594c3 7 API calls 49306->49308 49307->49269 49308->49303 49311 7ff7a40593ca GetSystemDirectoryA 49309->49311 49312 7ff7a40593a0 GetProcAddress 49309->49312 49313 7ff7a405938d LoadLibraryA 49310->49313 49316 7ff7a405937d 49310->49316 49311->49316 49312->49311 49313->49316 49316->49308 49323->49265 49325 7ff7a4082d9e 49324->49325 49330 7ff7a40592fb 49324->49330 49326 7ff7a4059110 14 API calls 49325->49326 49327 7ff7a4082db1 49326->49327 49332 7ff7a4058f70 GetModuleHandleA 49327->49332 49330->49302 49330->49303 49333 7ff7a4058f9a GetProcAddress strpbrk 49332->49333 49334 7ff7a4058f92 49332->49334 49351 7ff7a404650b 49350->49351 49352 7ff7a40464fb 49350->49352 49352->49280 49398->49279 49644 7ff7a4069770 49645 7ff7a4069785 49644->49645 49646 7ff7a4050ce0 49644->49646 49649 7ff7a40697c0 49646->49649 49650 7ff7a406980c 49649->49650 49651 7ff7a4056400 15 API calls 49650->49651 49656 7ff7a4069850 49651->49656 49652 7ff7a40699c5 49655 7ff7a40699df free 49652->49655 49659 7ff7a4069a02 49652->49659 49653 7ff7a4069a57 free 49654 7ff7a4069a90 49653->49654 49657 7ff7a4069a99 free 49654->49657 49658 7ff7a40698dc 49654->49658 49655->49659 49656->49652 49660 7ff7a40698b4 49656->49660 49668 7ff7a40698d7 49656->49668 49657->49658 49664 7ff7a408ff10 8 API calls 49658->49664 49661 7ff7a4069a35 49659->49661 49667 7ff7a4069a2c free 49659->49667 49672 7ff7a4042620 22 API calls 49660->49672 49661->49653 49661->49654 49663 7ff7a40698c5 49673 7ff7a4056280 19 API calls 49663->49673 49666 7ff7a4050cfc 49664->49666 49667->49661 49668->49652 49668->49658 49669 7ff7a4056b40 48 API calls 49668->49669 49670 7ff7a4069984 49669->49670 49670->49652 49671 7ff7a4056400 15 API calls 49670->49671 49671->49652 49672->49663 49673->49668 49674 7ff7a4069af0 49675 7ff7a4082d90 26 API calls 49674->49675 49676 7ff7a4069af9 49675->49676 49677 7ff7a404823b 49678 7ff7a4048251 49677->49678 49679 7ff7a4048282 49677->49679 49714 7ff7a405fea0 49678->49714 49680 7ff7a404832a 49679->49680 49688 7ff7a4048280 49679->49688 49682 7ff7a4048344 49680->49682 49685 7ff7a40483e4 49680->49685 49961 7ff7a405d120 24 API calls 49682->49961 49683 7ff7a404826a 49686 7ff7a40659a0 2 API calls 49683->49686 49689 7ff7a4047610 292 API calls 49685->49689 49710 7ff7a4047b8b 49685->49710 49686->49688 49687 7ff7a4047610 292 API calls 49687->49710 49688->49687 49688->49710 49689->49710 49690 7ff7a4048351 49692 7ff7a4047610 292 API calls 49690->49692 49693 7ff7a4048371 49692->49693 49695 7ff7a404837a 49693->49695 49696 7ff7a40483d6 free 49693->49696 49694 7ff7a4048c32 49698 7ff7a4048391 49695->49698 49701 7ff7a4048383 free 49695->49701 49696->49710 49697 7ff7a4048c23 49965 7ff7a4056280 19 API calls 49697->49965 49962 7ff7a405c6e0 28 API calls 49698->49962 49699 7ff7a4048db0 17 API calls 49699->49710 49701->49710 49704 7ff7a4051d40 90 API calls 49704->49710 49705 7ff7a40483c7 free 49705->49710 49706 7ff7a4057b00 10 API calls 49706->49710 49707 7ff7a40483a2 49707->49705 49708 7ff7a4056280 19 API calls 49709 7ff7a4047c2e 49708->49709 49709->49708 49709->49710 49710->49694 49710->49697 49710->49699 49710->49704 49710->49706 49710->49709 49712 7ff7a4047610 292 API calls 49710->49712 49960 7ff7a4056280 19 API calls 49710->49960 49963 7ff7a4046330 15 API calls 49710->49963 49964 7ff7a4065af0 22 API calls 49710->49964 49712->49710 49715 7ff7a405ff38 49714->49715 49716 7ff7a405ff71 free _strdup 49715->49716 49719 7ff7a405ff9b 49715->49719 49947 7ff7a405ff4e 49715->49947 49716->49719 49716->49947 49717 7ff7a408ff10 8 API calls 49718 7ff7a404825b 49717->49718 49718->49679 49718->49683 49720 7ff7a4060065 49719->49720 49721 7ff7a4060051 free 49719->49721 49722 7ff7a4060084 49720->49722 49976 7ff7a40596c0 15 API calls 49720->49976 49721->49720 49724 7ff7a40600cf free 49722->49724 49725 7ff7a406012d 49722->49725 49722->49947 49726 7ff7a40600e2 free 49724->49726 49734 7ff7a4060191 49725->49734 49977 7ff7a4064d90 337 API calls 49725->49977 49735 7ff7a406025a 49726->49735 49736 7ff7a4060233 49726->49736 49729 7ff7a4060179 49732 7ff7a4060180 free 49729->49732 49729->49734 49731 7ff7a40601ce free 49731->49726 49731->49947 49732->49947 49734->49731 49978 7ff7a4064d90 337 API calls 49734->49978 49738 7ff7a4060316 free 49735->49738 49739 7ff7a40602de free 49735->49739 49735->49947 49736->49735 49979 7ff7a40596c0 15 API calls 49736->49979 49740 7ff7a4060305 49738->49740 49980 7ff7a40596c0 15 API calls 49739->49980 49742 7ff7a406034d 49740->49742 49748 7ff7a4060336 49740->49748 49740->49947 49981 7ff7a404c510 6 API calls 49742->49981 49744 7ff7a4060359 49982 7ff7a4084830 59 API calls 49744->49982 49746 7ff7a4060372 49746->49748 49746->49947 49747 7ff7a40605bc free 49758 7ff7a40605df 49747->49758 49778 7ff7a406033b 49748->49778 49983 7ff7a404d480 free free 49748->49983 49750 7ff7a4060448 49751 7ff7a406048f strchr 49750->49751 49770 7ff7a4060461 49750->49770 49753 7ff7a40604a4 strchr 49751->49753 49751->49770 49752 7ff7a40603e0 49984 7ff7a404c710 26 API calls 49752->49984 49757 7ff7a40604b7 strchr 49753->49757 49753->49770 49754 7ff7a40606e7 49763 7ff7a4060710 49754->49763 49766 7ff7a406074b 49754->49766 49755 7ff7a406059c 49986 7ff7a4056280 19 API calls 49755->49986 49757->49770 49758->49754 49759 7ff7a4060615 49758->49759 49987 7ff7a40629a0 strchr strchr strchr malloc memcpy 49759->49987 49760 7ff7a4060515 49760->49755 49760->49770 49762 7ff7a40603f5 49985 7ff7a404d480 free free 49762->49985 49989 7ff7a40596c0 15 API calls 49763->49989 49764 7ff7a40605ab 49764->49947 49990 7ff7a40596c0 15 API calls 49766->49990 49770->49747 49771 7ff7a406061d 49772 7ff7a406063b 49771->49772 49773 7ff7a4060630 free 49771->49773 49771->49947 49776 7ff7a4060666 49772->49776 49779 7ff7a4060650 memcpy 49772->49779 49775 7ff7a406068f 49773->49775 49774 7ff7a4060749 49782 7ff7a40606b3 49774->49782 49805 7ff7a406096f 49774->49805 49774->49947 49775->49782 49988 7ff7a40596c0 15 API calls 49775->49988 49777 7ff7a406066b strchr 49776->49777 49780 7ff7a406067b free 49777->49780 49781 7ff7a4060678 49777->49781 49778->49750 49778->49760 49778->49947 49779->49777 49780->49775 49781->49780 49782->49764 49782->49774 49991 7ff7a407ee50 23 API calls 49782->49991 49785 7ff7a4060c00 calloc 49788 7ff7a4060c2f 49785->49788 49785->49947 49786 7ff7a4060962 49790 7ff7a407ee20 13 API calls 49786->49790 49787 7ff7a40609ae 49794 7ff7a40609ea free 49787->49794 49797 7ff7a4060b3e 49787->49797 49798 7ff7a4060a0a 49787->49798 49791 7ff7a4062270 25 API calls 49788->49791 49789 7ff7a4060a68 49994 7ff7a4056280 19 API calls 49789->49994 49790->49764 49795 7ff7a4060c43 49791->49795 49793 7ff7a40607c7 49793->49786 49793->49947 49992 7ff7a407ef90 8 API calls 49793->49992 49993 7ff7a40596c0 15 API calls 49794->49993 49806 7ff7a4060cb0 49795->49806 49810 7ff7a4060c77 49795->49810 49795->49947 49797->49798 49799 7ff7a4060b62 free 49797->49799 49798->49785 49798->49947 49803 7ff7a4060b8d 49799->49803 49804 7ff7a4060b80 49799->49804 49800 7ff7a4060a81 49807 7ff7a4060b22 49800->49807 49815 7ff7a4060adf 49800->49815 49802 7ff7a4060872 49802->49786 49808 7ff7a406087a 49802->49808 49803->49804 49809 7ff7a4060ba0 49803->49809 49998 7ff7a40596c0 15 API calls 49804->49998 49805->49787 49805->49789 49805->49800 49805->49815 49811 7ff7a4060cde 49806->49811 49812 7ff7a4060cb5 49806->49812 49996 7ff7a4056280 19 API calls 49807->49996 49813 7ff7a407ee20 13 API calls 49808->49813 49997 7ff7a40596c0 15 API calls 49809->49997 49999 7ff7a4061eb0 7 API calls 49810->49999 50000 7ff7a4061eb0 7 API calls 49811->50000 49818 7ff7a4062270 25 API calls 49812->49818 49827 7ff7a4060882 49813->49827 49815->49787 49822 7ff7a4060b09 49815->49822 49833 7ff7a4060cdc 49818->49833 49995 7ff7a4056280 19 API calls 49822->49995 49824 7ff7a4060cfb 49830 7ff7a4062270 25 API calls 49824->49830 49824->49833 49824->49947 49826 7ff7a4060c98 free 49826->49833 49827->49805 49828 7ff7a40608aa strstr 49827->49828 49829 7ff7a406093f 49827->49829 49831 7ff7a40608c2 49828->49831 49829->49805 49830->49833 49831->49829 49832 7ff7a4059790 13 API calls 49831->49832 49832->49829 49834 7ff7a4062270 25 API calls 49833->49834 49833->49947 49835 7ff7a4060ef0 free free free 49834->49835 49837 7ff7a4060f2e 49835->49837 49835->49947 49836 7ff7a40610eb 49839 7ff7a4061231 49836->49839 49836->49947 50004 7ff7a4068580 _gmtime64 49836->50004 49837->49836 49838 7ff7a4060f91 49837->49838 49845 7ff7a4061075 49837->49845 49837->49947 50001 7ff7a404a330 62 API calls 49838->50001 49966 7ff7a4062310 49839->49966 49840 7ff7a40610c0 49840->49836 49843 7ff7a40610d4 49840->49843 49840->49947 50003 7ff7a4061eb0 7 API calls 49843->50003 49844 7ff7a406111d 49850 7ff7a4061123 49844->49850 49866 7ff7a4061139 49844->49866 49845->49840 49846 7ff7a4061094 49845->49846 49851 7ff7a4062270 25 API calls 49845->49851 49847 7ff7a4062270 25 API calls 49846->49847 49846->49947 49847->49840 50005 7ff7a4056280 19 API calls 49850->50005 49851->49846 49852 7ff7a40610e8 49852->49836 49854 7ff7a406123f 49855 7ff7a4061270 49854->49855 49861 7ff7a406165c 49854->49861 49854->49947 49857 7ff7a4061603 49855->49857 49859 7ff7a4061367 49855->49859 49860 7ff7a4061280 49855->49860 49856 7ff7a4061066 49856->49845 50015 7ff7a4061eb0 7 API calls 49857->50015 49862 7ff7a4061370 49859->49862 49882 7ff7a40613e1 49859->49882 49860->49857 49880 7ff7a406128a 49860->49880 49869 7ff7a40616b5 49861->49869 49875 7ff7a4062270 25 API calls 49861->49875 49865 7ff7a4062270 25 API calls 49862->49865 49863 7ff7a4061619 49871 7ff7a4062020 62 API calls 49863->49871 49863->49947 49864 7ff7a406105e 50002 7ff7a404a2a0 9 API calls 49864->50002 49870 7ff7a4061380 49865->49870 49866->49839 49876 7ff7a4059790 13 API calls 49866->49876 49866->49947 49867 7ff7a4061474 49893 7ff7a4061551 49867->49893 49910 7ff7a406148f 49867->49910 49868 7ff7a40616e1 49894 7ff7a40617d1 49868->49894 49923 7ff7a4061704 49868->49923 49868->49947 49869->49868 49878 7ff7a4062270 25 API calls 49869->49878 49869->49947 49885 7ff7a4062020 62 API calls 49870->49885 49870->49947 49879 7ff7a406163c 49871->49879 49872 7ff7a40612db 49883 7ff7a40612ff 49872->49883 49872->49947 50007 7ff7a40648a0 28 API calls 49872->50007 49873 7ff7a4062270 25 API calls 49881 7ff7a4060fd8 49873->49881 49875->49869 49877 7ff7a4061205 49876->49877 50006 7ff7a4061eb0 7 API calls 49877->50006 49878->49868 49886 7ff7a4061646 49879->49886 49887 7ff7a40613bf 49879->49887 49880->49872 49898 7ff7a4062270 25 API calls 49880->49898 49881->49856 49881->49864 49881->49873 49889 7ff7a4062270 25 API calls 49882->49889 49892 7ff7a4061430 49882->49892 50008 7ff7a4061eb0 7 API calls 49883->50008 49884 7ff7a4062270 25 API calls 49884->49892 49895 7ff7a40613a3 49885->49895 50016 7ff7a4056280 19 API calls 49886->50016 50011 7ff7a405d2b0 17 API calls 49887->50011 49889->49892 49892->49867 49892->49884 49892->49947 49925 7ff7a4061535 49893->49925 50012 7ff7a40648a0 28 API calls 49893->50012 49938 7ff7a406177c 49894->49938 50017 7ff7a40648a0 28 API calls 49894->50017 49895->49887 49901 7ff7a40613a9 49895->49901 49898->49872 49899 7ff7a40612f7 49899->49883 49899->49947 50010 7ff7a4056280 19 API calls 49901->50010 49903 7ff7a4061227 49903->49839 49903->49947 49906 7ff7a4061315 49911 7ff7a4062020 62 API calls 49906->49911 49906->49947 49908 7ff7a4061807 49917 7ff7a4061821 49908->49917 49928 7ff7a40618f8 49908->49928 49909 7ff7a4061991 50025 7ff7a4061eb0 7 API calls 49909->50025 49912 7ff7a40614cf strchr 49910->49912 49910->49925 49916 7ff7a4061343 49911->49916 49918 7ff7a40614e4 strchr 49912->49918 49937 7ff7a4061504 49912->49937 49913 7ff7a4061747 strchr 49919 7ff7a406175c strchr 49913->49919 49913->49938 49915 7ff7a40613d8 49915->49947 50027 7ff7a4065af0 22 API calls 49915->50027 49920 7ff7a4061349 49916->49920 49921 7ff7a406135f 49916->49921 49922 7ff7a406182e 49917->49922 49917->49928 49924 7ff7a40614f7 strchr 49918->49924 49918->49937 49926 7ff7a406176f strchr 49919->49926 49919->49938 50009 7ff7a4056280 19 API calls 49920->50009 50026 7ff7a405d2b0 17 API calls 49921->50026 50018 7ff7a4061eb0 7 API calls 49922->50018 49923->49913 49923->49938 49924->49937 50013 7ff7a4061eb0 7 API calls 49925->50013 49926->49938 49946 7ff7a4061868 49928->49946 49928->49947 50023 7ff7a4061eb0 7 API calls 49928->50023 49930 7ff7a4061590 49934 7ff7a4062020 62 API calls 49930->49934 49930->49947 49932 7ff7a4061a65 49941 7ff7a4056400 15 API calls 49932->49941 49932->49947 49940 7ff7a40615e3 49934->49940 49935 7ff7a4061844 49944 7ff7a406186d 49935->49944 49945 7ff7a4061855 49935->49945 49935->49947 49936 7ff7a4061953 49942 7ff7a4062020 62 API calls 49936->49942 49937->49925 49937->49947 49938->49908 49938->49909 49938->49947 49940->49921 49943 7ff7a40615ed 49940->49943 49941->49947 49948 7ff7a4061971 49942->49948 50014 7ff7a4056280 19 API calls 49943->50014 49951 7ff7a40618b4 49944->49951 49953 7ff7a4062270 25 API calls 49944->49953 50019 7ff7a4061eb0 7 API calls 49945->50019 49946->49936 49946->49947 49947->49717 49948->49921 49952 7ff7a406197b 49948->49952 49951->49946 50022 7ff7a4061eb0 7 API calls 49951->50022 50024 7ff7a4056280 19 API calls 49952->50024 49956 7ff7a4061885 49953->49956 49956->49946 50020 7ff7a4061eb0 7 API calls 49956->50020 49958 7ff7a406189c 49958->49951 50021 7ff7a4061eb0 7 API calls 49958->50021 49960->49710 49961->49690 49962->49707 49963->49710 49964->49710 49965->49694 49971 7ff7a406233b 49966->49971 49967 7ff7a406261a 49967->49854 49968 7ff7a40623c0 strchr 49969 7ff7a40623d9 strchr 49968->49969 49968->49971 49969->49971 49970 7ff7a4062428 _strdup 49970->49971 49972 7ff7a4062639 49970->49972 49971->49967 49971->49968 49971->49970 49974 7ff7a40625f4 free 49971->49974 49975 7ff7a4062270 25 API calls 49971->49975 49972->49967 49973 7ff7a4062643 free free 49972->49973 49973->49967 49974->49971 49975->49971 49976->49722 49977->49729 49978->49731 49979->49735 49980->49740 49981->49744 49982->49746 49983->49752 49984->49762 49985->49778 49986->49764 49987->49771 49988->49782 49989->49774 49990->49774 49991->49793 49992->49802 49993->49798 49994->49764 49995->49764 49996->49764 49997->49798 49998->49798 49999->49826 50000->49824 50001->49881 50002->49856 50003->49852 50004->49844 50005->49764 50006->49903 50007->49899 50008->49906 50009->49947 50010->49764 50011->49915 50012->49937 50013->49930 50014->49764 50015->49863 50016->49764 50017->49938 50018->49935 50019->49946 50020->49958 50021->49951 50022->49946 50023->49946 50024->49764 50025->49928 50026->49915 50027->49932 50028 7ff7a4047e80 50029 7ff7a4047e91 50028->50029 50056 7ff7a405ed30 50029->50056 50031 7ff7a4047ec5 50032 7ff7a4047ef7 50031->50032 50034 7ff7a4056400 15 API calls 50031->50034 50084 7ff7a405f780 314 API calls 50032->50084 50036 7ff7a4047ef1 50034->50036 50035 7ff7a4047f04 50037 7ff7a4047f07 50035->50037 50036->50032 50036->50037 50060 7ff7a4048e30 50037->50060 50044 7ff7a4048c32 50045 7ff7a4048c23 50087 7ff7a4056280 19 API calls 50045->50087 50046 7ff7a4048db0 17 API calls 50054 7ff7a4047b8b 50046->50054 50049 7ff7a4051d40 90 API calls 50049->50054 50050 7ff7a4057b00 10 API calls 50050->50054 50051 7ff7a4047c2e 50052 7ff7a4056280 19 API calls 50051->50052 50051->50054 50052->50051 50054->50044 50054->50045 50054->50046 50054->50049 50054->50050 50054->50051 50055 7ff7a4047610 292 API calls 50054->50055 50082 7ff7a4056280 19 API calls 50054->50082 50085 7ff7a4046330 15 API calls 50054->50085 50086 7ff7a4065af0 22 API calls 50054->50086 50055->50054 50057 7ff7a405ed5a 50056->50057 50058 7ff7a405f860 18 API calls 50057->50058 50059 7ff7a405ed79 50058->50059 50059->50031 50068 7ff7a4048e96 50060->50068 50061 7ff7a4049218 memcpy memcpy 50062 7ff7a4049100 50061->50062 50064 7ff7a408ff10 8 API calls 50062->50064 50063 7ff7a404910a 50063->50061 50067 7ff7a4049214 50063->50067 50089 7ff7a405e6e0 free 50063->50089 50066 7ff7a4047f12 50064->50066 50065 7ff7a4048fde calloc 50065->50062 50065->50068 50066->50054 50076 7ff7a405f450 50066->50076 50067->50061 50068->50063 50068->50065 50069 7ff7a4049027 50068->50069 50070 7ff7a405e750 malloc 50068->50070 50072 7ff7a40490f7 free 50068->50072 50069->50062 50069->50068 50071 7ff7a405e410 malloc memcpy 50069->50071 50073 7ff7a40490ef 50069->50073 50070->50068 50071->50069 50072->50062 50088 7ff7a405e6e0 free 50073->50088 50077 7ff7a405f469 50076->50077 50090 7ff7a40527a0 50077->50090 50079 7ff7a405f480 50080 7ff7a4047e1c 50079->50080 50081 7ff7a4051d40 90 API calls 50079->50081 50080->50054 50083 7ff7a405be90 free 50080->50083 50081->50080 50082->50054 50083->50054 50084->50035 50085->50054 50086->50054 50087->50044 50088->50072 50089->50063 50091 7ff7a40659a0 2 API calls 50090->50091 50092 7ff7a40527c5 50091->50092 50093 7ff7a40527d5 50092->50093 50094 7ff7a40527fe free 50092->50094 50095 7ff7a4052829 50092->50095 50093->50079 50114 7ff7a40596c0 15 API calls 50094->50114 50097 7ff7a405e0c0 2 API calls 50095->50097 50099 7ff7a4052835 50095->50099 50098 7ff7a405285f 50097->50098 50100 7ff7a4052873 50098->50100 50101 7ff7a40528a1 50098->50101 50099->50079 50103 7ff7a4057090 616 API calls 50100->50103 50102 7ff7a40659a0 2 API calls 50101->50102 50104 7ff7a40528ae 50102->50104 50105 7ff7a4052889 50103->50105 50108 7ff7a40528d1 50104->50108 50109 7ff7a40659a0 2 API calls 50104->50109 50106 7ff7a4052891 50105->50106 50107 7ff7a405e0c0 2 API calls 50105->50107 50106->50079 50110 7ff7a4052964 50107->50110 50111 7ff7a4057c10 47 API calls 50108->50111 50109->50108 50110->50079 50112 7ff7a40528ea 50111->50112 50112->50105 50113 7ff7a4056400 15 API calls 50112->50113 50113->50105 50114->50095 50115 7ff7a40489c5 50116 7ff7a40489d4 50115->50116 50120 7ff7a40489f3 50115->50120 50117 7ff7a40489e5 50116->50117 50118 7ff7a4048db0 17 API calls 50116->50118 50119 7ff7a4047610 292 API calls 50117->50119 50118->50117 50119->50120 50133 7ff7a4047b8b 50120->50133 50136 7ff7a4046330 15 API calls 50120->50136 50122 7ff7a4048db0 17 API calls 50122->50133 50124 7ff7a4048c32 50125 7ff7a4048c23 50139 7ff7a4056280 19 API calls 50125->50139 50128 7ff7a4051d40 90 API calls 50128->50133 50129 7ff7a4057b00 10 API calls 50129->50133 50130 7ff7a4047c2e 50131 7ff7a4056280 19 API calls 50130->50131 50130->50133 50131->50130 50133->50122 50133->50124 50133->50125 50133->50128 50133->50129 50133->50130 50134 7ff7a4047610 292 API calls 50133->50134 50135 7ff7a4056280 19 API calls 50133->50135 50137 7ff7a4046330 15 API calls 50133->50137 50138 7ff7a4065af0 22 API calls 50133->50138 50134->50133 50135->50133 50136->50133 50137->50133 50138->50133 50139->50124 50140 7ff7a4061da0 50141 7ff7a4050480 255 API calls 50140->50141 50142 7ff7a4061db7 50141->50142 50143 7ff7a404b520 50144 7ff7a404b564 50143->50144 50145 7ff7a404b574 50143->50145 50146 7ff7a405ea00 3 API calls 50144->50146 50147 7ff7a405e0c0 2 API calls 50145->50147 50146->50145 50148 7ff7a404b5b6 50147->50148 50154 7ff7a404bbc0 calloc 50148->50154 50151 7ff7a404b5de 50188 7ff7a4056280 19 API calls 50151->50188 50152 7ff7a404b5d5 50155 7ff7a404bd4e _errno 50154->50155 50156 7ff7a404bc11 malloc 50154->50156 50159 7ff7a404b5d1 50155->50159 50157 7ff7a404bc9c InitializeCriticalSectionEx 50156->50157 50158 7ff7a404bcc7 50156->50158 50160 7ff7a4065370 29 API calls 50157->50160 50161 7ff7a404bcf0 free 50158->50161 50162 7ff7a404bce0 DeleteCriticalSection free 50158->50162 50159->50151 50159->50152 50163 7ff7a404bcbf 50160->50163 50164 7ff7a404bd08 50161->50164 50165 7ff7a404bd03 50161->50165 50162->50161 50163->50158 50166 7ff7a404bd76 _strdup 50163->50166 50168 7ff7a404bd18 free 50164->50168 50169 7ff7a404bd12 closesocket 50164->50169 50190 7ff7a4068f90 free free free 50165->50190 50166->50158 50170 7ff7a404bd90 free _strdup 50166->50170 50168->50155 50169->50168 50171 7ff7a404bdde 50170->50171 50172 7ff7a404bdb2 50170->50172 50174 7ff7a404bdea EnterCriticalSection LeaveCriticalSection 50171->50174 50175 7ff7a404be61 free 50171->50175 50189 7ff7a4069660 _beginthreadex 50172->50189 50177 7ff7a404be14 CloseHandle 50174->50177 50178 7ff7a404be25 50174->50178 50175->50155 50176 7ff7a404bdc6 50176->50159 50179 7ff7a404bdce _errno 50176->50179 50182 7ff7a404be48 50177->50182 50180 7ff7a404be2a 50178->50180 50181 7ff7a404be32 50178->50181 50179->50171 50191 7ff7a40696b0 WaitForSingleObjectEx CloseHandle 50180->50191 50192 7ff7a404ba40 7 API calls 50181->50192 50183 7ff7a404be58 closesocket 50182->50183 50193 7ff7a4046410 free 50182->50193 50183->50175 50187 7ff7a404be3b free 50187->50182 50188->50152 50189->50176 50190->50164 50191->50181 50192->50187 50193->50183 50194 7ff7a40729c0 50195 7ff7a40729e9 50194->50195 50196 7ff7a4072a50 50194->50196 50198 7ff7a40729fa 50195->50198 50199 7ff7a4072a10 50195->50199 50197 7ff7a405bfe0 407 API calls 50196->50197 50203 7ff7a4072a5d 50197->50203 50267 7ff7a405bee0 405 API calls 50198->50267 50229 7ff7a4057290 50199->50229 50209 7ff7a4072ac1 50203->50209 50215 7ff7a4072b3a 50203->50215 50269 7ff7a408b390 35 API calls 50203->50269 50204 7ff7a4072a05 50205 7ff7a4072a21 50205->50215 50268 7ff7a4073640 65 API calls 50205->50268 50207 7ff7a4072bee 50277 7ff7a405d2b0 17 API calls 50207->50277 50208 7ff7a4072af2 50210 7ff7a4072b4e 50208->50210 50211 7ff7a4072afe 50208->50211 50209->50207 50209->50208 50209->50215 50223 7ff7a4072b57 50210->50223 50273 7ff7a408d420 _errno strtoll _errno 50210->50273 50270 7ff7a4073350 271 API calls 50211->50270 50216 7ff7a4072a45 50218 7ff7a4072b08 50218->50215 50271 7ff7a4072ea0 26 API calls 50218->50271 50222 7ff7a4072b23 50222->50215 50272 7ff7a4073290 32 API calls 50222->50272 50228 7ff7a4072bae 50223->50228 50275 7ff7a40736e0 72 API calls 50223->50275 50224 7ff7a4072b73 50224->50223 50225 7ff7a4072b99 50224->50225 50224->50228 50274 7ff7a40736e0 72 API calls 50225->50274 50228->50215 50276 7ff7a408b390 35 API calls 50228->50276 50230 7ff7a40572e8 50229->50230 50241 7ff7a40572df 50229->50241 50231 7ff7a405e0c0 2 API calls 50230->50231 50234 7ff7a4057302 50231->50234 50232 7ff7a408ff10 8 API calls 50233 7ff7a4057815 50232->50233 50233->50196 50233->50205 50235 7ff7a4057379 50234->50235 50236 7ff7a4057392 50234->50236 50299 7ff7a4056280 19 API calls 50235->50299 50238 7ff7a405739c 50236->50238 50265 7ff7a40573c9 50236->50265 50239 7ff7a4058460 611 API calls 50238->50239 50240 7ff7a40573aa 50239->50240 50240->50241 50244 7ff7a4058570 51 API calls 50240->50244 50241->50232 50242 7ff7a40668f0 19 API calls 50242->50265 50243 7ff7a40576a5 50243->50241 50301 7ff7a4058b90 616 API calls 50243->50301 50244->50241 50245 7ff7a4057614 SleepEx getsockopt 50247 7ff7a405765c WSAGetLastError 50245->50247 50245->50265 50247->50265 50248 7ff7a40575b6 SleepEx getsockopt 50252 7ff7a40575fe WSAGetLastError 50248->50252 50248->50265 50249 7ff7a40576d7 50302 7ff7a4042e10 27 API calls 50249->50302 50250 7ff7a40576e3 50253 7ff7a405773b 50250->50253 50256 7ff7a4056ee0 2 API calls 50250->50256 50251 7ff7a40574c7 WSASetLastError 50251->50265 50252->50265 50278 7ff7a4058460 50253->50278 50254 7ff7a40576be 50254->50241 50254->50249 50256->50253 50258 7ff7a40577b7 50303 7ff7a4056280 19 API calls 50258->50303 50259 7ff7a4057759 50259->50241 50291 7ff7a4058570 50259->50291 50262 7ff7a4057388 50262->50241 50264 7ff7a4056400 15 API calls 50264->50265 50265->50242 50265->50243 50265->50245 50265->50248 50265->50250 50265->50251 50265->50264 50266 7ff7a4058b90 616 API calls 50265->50266 50300 7ff7a4042e10 27 API calls 50265->50300 50266->50265 50267->50204 50268->50216 50269->50209 50270->50218 50271->50222 50272->50215 50273->50224 50274->50228 50275->50228 50276->50215 50277->50215 50279 7ff7a4058565 50278->50279 50281 7ff7a4058477 50278->50281 50279->50259 50280 7ff7a4058547 50306 7ff7a4066d50 583 API calls 50280->50306 50281->50280 50282 7ff7a405851a 50281->50282 50284 7ff7a40584fc 50281->50284 50305 7ff7a40673a0 610 API calls 50282->50305 50284->50282 50287 7ff7a4058501 50284->50287 50286 7ff7a4058560 50286->50259 50304 7ff7a4056280 19 API calls 50287->50304 50288 7ff7a4058542 50288->50259 50290 7ff7a4058510 50290->50259 50292 7ff7a405859d 50291->50292 50293 7ff7a4058590 50291->50293 50295 7ff7a4057c10 47 API calls 50292->50295 50294 7ff7a40659a0 2 API calls 50293->50294 50294->50292 50296 7ff7a40585ad 50295->50296 50307 7ff7a40529b0 15 API calls 50296->50307 50298 7ff7a40585b5 50298->50241 50299->50262 50300->50265 50301->50254 50302->50258 50303->50262 50304->50290 50305->50288 50306->50286 50307->50298
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup$callocmemcpystrstr
                                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                          • API String ID: 2045874074-4264080130
                                          • Opcode ID: 4168fa95d65f54a1e0795bddf3cd2d3dada032a491ce2ca990e0fbb27d0a3f89
                                          • Instruction ID: 7399ef7eda52c052c3c3f8ed8b764b2c52bf65d1804eac10a72917a9f88c7127
                                          • Opcode Fuzzy Hash: 4168fa95d65f54a1e0795bddf3cd2d3dada032a491ce2ca990e0fbb27d0a3f89
                                          • Instruction Fuzzy Hash: 4103C631B0A642A5FB54EF2394802BAE791EF40784F8640B5DE0E476B5DF7EE461E321

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 689 7ff7a4041e40-7ff7a4041e72 call 7ff7a408fb18 692 7ff7a4041e80 689->692 693 7ff7a4041e74-7ff7a4041e7e 689->693 694 7ff7a4041e83-7ff7a4041eb2 _beginthreadex 692->694 693->694 695 7ff7a4042369-7ff7a4042377 ?_Throw_Cpp_error@std@@YAXH@Z 694->695 696 7ff7a4041eb8-7ff7a4041ebd 694->696 697 7ff7a404235e-7ff7a4042368 ?_Throw_Cpp_error@std@@YAXH@Z 696->697 698 7ff7a4041ec3-7ff7a4041eda _Thrd_detach 696->698 697->695 698->697 699 7ff7a4041ee0-7ff7a4042230 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff7a4032ab0 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 GetStdHandle SetConsoleTextAttribute call 7ff7a4042380 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff7a40422ad-7ff7a40422b0 699->734 735 7ff7a4042232-7ff7a40422ac call 7ff7a4033d40 * 2 call 7ff7a4033b20 * 2 URLDownloadToFileA system * 2 Sleep exit 699->735 737 7ff7a404232d-7ff7a4042332 734->737 738 7ff7a40422b2-7ff7a404232c call 7ff7a4033d40 * 2 call 7ff7a4033b20 * 2 URLDownloadToFileA system * 2 Sleep exit 734->738 735->734 740 7ff7a404233b-7ff7a404235d call 7ff7a408ff10 737->740 741 7ff7a4042334-7ff7a404233a terminate 737->741 738->737 741->740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                          • String ID: Iniciar Valorant Plus (HVCI DESLIGADO): $ Iniciar Valorant Plus (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SerHuStinsHostDialog.exe$C:\Windows\System32\config\ServceHubeinssDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/plusattnewhvcionprivate.exe$http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe$start C:\Windows\System32\config\SerHuStinsHostDialog.exe$start C:\Windows\System32\config\ServceHubeinssDialog.exe
                                          • API String ID: 3379756739-3894013811
                                          • Opcode ID: 7d6ccfdcf208f1ed3c30f3b331a260dc6719f22fd9a96427a0c815ad178a38ab
                                          • Instruction ID: 87e5e10d068b0cdd8d794d2e400774aaed1890ecec01b47927eba304018139c5
                                          • Opcode Fuzzy Hash: 7d6ccfdcf208f1ed3c30f3b331a260dc6719f22fd9a96427a0c815ad178a38ab
                                          • Instruction Fuzzy Hash: 79D16531A0B50396EB04BF22EC9417BB361EF84751F810A79F51E066B6DF3EE554A360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupstrncmpstrtol
                                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                          • API String ID: 707411602-3372543188
                                          • Opcode ID: 05868821c97f94baf6164b8d17389528a2746141e5772ed87361180ad4809c89
                                          • Instruction ID: a03a4ec549f21cc3360966aa3aead632e231a470e3086a4ff88e37e4b3105c80
                                          • Opcode Fuzzy Hash: 05868821c97f94baf6164b8d17389528a2746141e5772ed87361180ad4809c89
                                          • Instruction Fuzzy Hash: 0142D33170A74295EB14AF13D8906BAA3A0FF45784F824175DA4E077B1DFBEE424E721

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 939 7ff7a4059290-7ff7a40592ac 940 7ff7a40592ae-7ff7a40592c0 WSAStartup 939->940 941 7ff7a40592f6-7ff7a40592fd call 7ff7a4082d90 939->941 942 7ff7a40592d9-7ff7a40592f5 call 7ff7a408ff10 940->942 943 7ff7a40592c2-7ff7a40592c9 940->943 950 7ff7a4059303-7ff7a4059330 GetModuleHandleA 941->950 951 7ff7a40595bf-7ff7a40595d6 call 7ff7a408ff10 941->951 945 7ff7a40592cb-7ff7a40592d1 943->945 946 7ff7a40592d3 WSACleanup 943->946 945->941 945->946 946->942 953 7ff7a405933e-7ff7a4059373 GetProcAddress strpbrk 950->953 954 7ff7a4059332-7ff7a4059339 950->954 957 7ff7a405939b-7ff7a405939e 953->957 958 7ff7a4059375-7ff7a405937b 953->958 956 7ff7a40594c3-7ff7a40595b7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 954->956 956->951 959 7ff7a40593ca-7ff7a40593e1 GetSystemDirectoryA 957->959 960 7ff7a40593a0-7ff7a40593b3 GetProcAddress 957->960 961 7ff7a405938d-7ff7a4059396 LoadLibraryA 958->961 962 7ff7a405937d-7ff7a4059388 958->962 965 7ff7a40593e7-7ff7a40593fa malloc 959->965 966 7ff7a4059482 959->966 960->959 964 7ff7a40593b5-7ff7a40593c5 LoadLibraryExA 960->964 963 7ff7a405948a-7ff7a405949c 961->963 962->963 963->956 967 7ff7a405949e-7ff7a40594bc GetProcAddress 963->967 964->963 968 7ff7a40593fc-7ff7a405940a GetSystemDirectoryA 965->968 969 7ff7a4059479-7ff7a405947c free 965->969 966->963 967->956 968->969 971 7ff7a405940c-7ff7a4059416 968->971 969->966 972 7ff7a4059420-7ff7a4059429 971->972 972->972 973 7ff7a405942b-7ff7a4059430 972->973 974 7ff7a4059434-7ff7a405943b 973->974 974->974 975 7ff7a405943d-7ff7a4059446 974->975 976 7ff7a4059450-7ff7a405945c 975->976 976->976 977 7ff7a405945e-7ff7a4059464 976->977 978 7ff7a4059466-7ff7a405946e 977->978 979 7ff7a4059470 LoadLibraryA 977->979 980 7ff7a4059476 978->980 979->980 980->969
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                          • API String ID: 2612373469-2794540096
                                          • Opcode ID: de4467785da5013e920e77c5cee71bf5eccab42b814541a419c8975c411fe98b
                                          • Instruction ID: bdd8fedf4b2147c67873156869adeef955dec4484562f43b8fd9263d6e751970
                                          • Opcode Fuzzy Hash: de4467785da5013e920e77c5cee71bf5eccab42b814541a419c8975c411fe98b
                                          • Instruction Fuzzy Hash: 9891A621A0E78285E720AF12A8843BBB391FF89B80F868575D94E07775DF3DE4659720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1236 7ff7a40585d0-7ff7a405863d 1237 7ff7a405863f 1236->1237 1238 7ff7a4058642-7ff7a4058652 1236->1238 1237->1238 1239 7ff7a4058654-7ff7a405865c 1238->1239 1240 7ff7a4058661-7ff7a4058679 memcpy 1238->1240 1239->1240 1241 7ff7a405867b-7ff7a40586a6 call 7ff7a4046ba0 * 2 1240->1241 1242 7ff7a40586a8-7ff7a40586bb socket 1240->1242 1244 7ff7a40586be-7ff7a40586ca 1241->1244 1242->1244 1246 7ff7a40586d0-7ff7a40586d8 1244->1246 1247 7ff7a4058b5f 1244->1247 1249 7ff7a40586e7-7ff7a40586f0 1246->1249 1250 7ff7a40586da-7ff7a40586e2 call 7ff7a40655a0 1246->1250 1248 7ff7a4058b64-7ff7a4058b8d call 7ff7a408ff10 1247->1248 1252 7ff7a4058700-7ff7a4058709 1249->1252 1253 7ff7a40586f2-7ff7a40586fd 1249->1253 1250->1249 1256 7ff7a405871c-7ff7a4058720 1252->1256 1257 7ff7a405870b-7ff7a405870e 1252->1257 1253->1252 1262 7ff7a4058725-7ff7a4058737 call 7ff7a4081ad0 1256->1262 1260 7ff7a4058b0a-7ff7a4058b5d _errno * 3 call 7ff7a4042e10 call 7ff7a4056280 call 7ff7a4056ee0 1257->1260 1261 7ff7a4058714-7ff7a405871a 1257->1261 1260->1248 1261->1262 1262->1260 1269 7ff7a405873d-7ff7a4058765 htons call 7ff7a4056400 1262->1269 1275 7ff7a405876c-7ff7a4058771 1269->1275 1276 7ff7a4058767-7ff7a405876a 1269->1276 1277 7ff7a40587de 1275->1277 1278 7ff7a4058773-7ff7a405877d 1275->1278 1276->1275 1276->1277 1280 7ff7a40587e1-7ff7a40587fd 1277->1280 1279 7ff7a405877f-7ff7a40587ab setsockopt 1278->1279 1278->1280 1281 7ff7a40587ad-7ff7a40587d4 WSAGetLastError call 7ff7a4042e10 call 7ff7a4056400 1279->1281 1282 7ff7a40587d9-7ff7a40587dc 1279->1282 1283 7ff7a405882d-7ff7a4058830 1280->1283 1284 7ff7a40587ff-7ff7a4058813 call 7ff7a4059110 1280->1284 1281->1282 1282->1280 1287 7ff7a4058884-7ff7a4058887 1283->1287 1288 7ff7a4058832-7ff7a4058857 getsockopt 1283->1288 1297 7ff7a4058815-7ff7a405881f 1284->1297 1298 7ff7a4058821-7ff7a405882b 1284->1298 1289 7ff7a405888d-7ff7a4058894 1287->1289 1290 7ff7a405896f-7ff7a4058976 1287->1290 1293 7ff7a4058859-7ff7a4058861 1288->1293 1294 7ff7a4058863-7ff7a405887e setsockopt 1288->1294 1289->1290 1295 7ff7a405889a-7ff7a40588c5 setsockopt 1289->1295 1299 7ff7a4058978-7ff7a40589a5 call 7ff7a4046ba0 * 2 1290->1299 1300 7ff7a40589aa-7ff7a40589b1 1290->1300 1293->1287 1293->1294 1294->1287 1302 7ff7a40588de-7ff7a4058952 call 7ff7a4058c80 * 2 WSAIoctl 1295->1302 1303 7ff7a40588c7-7ff7a40588d9 call 7ff7a4056400 1295->1303 1297->1287 1298->1288 1327 7ff7a40589a7 1299->1327 1328 7ff7a40589f5-7ff7a40589f7 1299->1328 1304 7ff7a40589b8-7ff7a40589d8 call 7ff7a4081a40 call 7ff7a4057f40 1300->1304 1305 7ff7a40589b3-7ff7a40589b6 1300->1305 1302->1290 1325 7ff7a4058954-7ff7a405896a WSAGetLastError call 7ff7a4056400 1302->1325 1303->1290 1309 7ff7a4058a0e-7ff7a4058a38 call 7ff7a40655a0 call 7ff7a405e0c0 1304->1309 1326 7ff7a40589da-7ff7a40589e8 call 7ff7a4056ee0 1304->1326 1305->1304 1305->1309 1329 7ff7a4058a3a-7ff7a4058a4a call 7ff7a4046100 1309->1329 1330 7ff7a4058a4f-7ff7a4058a52 1309->1330 1325->1290 1326->1247 1338 7ff7a40589ee-7ff7a40589f0 1326->1338 1327->1300 1328->1300 1334 7ff7a40589f9-7ff7a4058a09 call 7ff7a4056ee0 1328->1334 1329->1330 1336 7ff7a4058a58-7ff7a4058a60 1330->1336 1337 7ff7a4058aff-7ff7a4058b08 1330->1337 1334->1248 1336->1337 1340 7ff7a4058a66-7ff7a4058a6d 1336->1340 1337->1248 1338->1248 1341 7ff7a4058a98-7ff7a4058aa3 WSAGetLastError 1340->1341 1342 7ff7a4058a6f-7ff7a4058a84 connect 1340->1342 1345 7ff7a4058aa5-7ff7a4058aae 1341->1345 1346 7ff7a4058af2-7ff7a4058af4 1341->1346 1342->1341 1344 7ff7a4058a86-7ff7a4058a88 1342->1344 1347 7ff7a4058afb-7ff7a4058afd 1344->1347 1348 7ff7a4058a8a-7ff7a4058a93 1344->1348 1345->1346 1349 7ff7a4058ab0-7ff7a4058af0 call 7ff7a4042e10 call 7ff7a4056400 call 7ff7a4056ee0 1345->1349 1346->1347 1347->1248 1348->1248 1349->1248
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                          • API String ID: 3453287622-3868455274
                                          • Opcode ID: dbb5cd4517bb968bcac715a938c16f0401d988df0ca92266df0104945dc9420d
                                          • Instruction ID: 747be276a51e6c0b2ce955321ce02779a43cb7328cded64fd877dbe4e78f7b27
                                          • Opcode Fuzzy Hash: dbb5cd4517bb968bcac715a938c16f0401d988df0ca92266df0104945dc9420d
                                          • Instruction Fuzzy Hash: 5AF1F532A0A24286F750AF27D4842BFA390FB44784F828475EE4D476B5DF3EE564EB11

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1872 7ff7a4065370-7ff7a40653be socket 1873 7ff7a40653c5-7ff7a406541e htonl setsockopt 1872->1873 1874 7ff7a40653c0 1872->1874 1876 7ff7a406554b-7ff7a4065567 closesocket * 3 1873->1876 1877 7ff7a4065424-7ff7a4065439 bind 1873->1877 1875 7ff7a4065574-7ff7a4065592 call 7ff7a408ff10 1874->1875 1878 7ff7a406556c 1876->1878 1877->1876 1880 7ff7a406543f-7ff7a4065455 getsockname 1877->1880 1878->1875 1880->1876 1882 7ff7a406545b-7ff7a406546a listen 1880->1882 1882->1876 1883 7ff7a4065470-7ff7a4065485 socket 1882->1883 1883->1876 1884 7ff7a406548b-7ff7a40654a0 connect 1883->1884 1884->1876 1885 7ff7a40654a6-7ff7a40654bc accept 1884->1885 1885->1876 1886 7ff7a40654c2-7ff7a40654de call 7ff7a4059790 1885->1886 1889 7ff7a40654e5-7ff7a40654ec 1886->1889 1889->1889 1890 7ff7a40654ee-7ff7a4065508 send 1889->1890 1890->1876 1891 7ff7a406550a-7ff7a4065526 recv 1890->1891 1891->1876 1892 7ff7a4065528-7ff7a406553c memcmp 1891->1892 1892->1876 1893 7ff7a406553e-7ff7a4065549 closesocket 1892->1893 1893->1878
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                          • String ID:
                                          • API String ID: 3699910901-0
                                          • Opcode ID: 41927ea1387b75350c3ebf46daa169a36e0fbdbc2e22d370c80ef841000f6fad
                                          • Instruction ID: d8ccb7f066c0dec2642612cc1406dcea919be8f5e78c70c754802de3aecbea43
                                          • Opcode Fuzzy Hash: 41927ea1387b75350c3ebf46daa169a36e0fbdbc2e22d370c80ef841000f6fad
                                          • Instruction Fuzzy Hash: 2D51DF31609A4286DB50BF26E89416AF362EB40BB4F814730EA7E436F4DF7DD499D710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1894 7ff7a4057290-7ff7a40572dd 1895 7ff7a40572e8-7ff7a4057323 call 7ff7a405e0c0 1894->1895 1896 7ff7a40572df-7ff7a40572e3 1894->1896 1901 7ff7a4057328-7ff7a405732b 1895->1901 1902 7ff7a4057325 1895->1902 1897 7ff7a4057806-7ff7a4057824 call 7ff7a408ff10 1896->1897 1904 7ff7a405732d-7ff7a4057330 1901->1904 1905 7ff7a4057348 1901->1905 1902->1901 1906 7ff7a4057343-7ff7a4057346 1904->1906 1907 7ff7a4057332-7ff7a4057335 1904->1907 1908 7ff7a405734b-7ff7a4057377 call 7ff7a405e150 1905->1908 1906->1908 1907->1908 1909 7ff7a4057337-7ff7a4057341 1907->1909 1912 7ff7a4057379-7ff7a405738d call 7ff7a4056280 1908->1912 1913 7ff7a4057392-7ff7a405739a 1908->1913 1909->1908 1923 7ff7a40577f6-7ff7a40577fe 1912->1923 1915 7ff7a405739c-7ff7a40573ae call 7ff7a4058460 1913->1915 1916 7ff7a40573c9-7ff7a40573e7 1913->1916 1924 7ff7a40573b0-7ff7a40573b2 1915->1924 1925 7ff7a40573c2-7ff7a40573c4 1915->1925 1917 7ff7a40573f0-7ff7a4057405 1916->1917 1921 7ff7a405740b-7ff7a405741f call 7ff7a40668f0 1917->1921 1922 7ff7a405768a 1917->1922 1932 7ff7a4057425-7ff7a4057450 call 7ff7a405e150 1921->1932 1933 7ff7a40575a0-7ff7a40575a3 1921->1933 1927 7ff7a405768e-7ff7a405769f 1922->1927 1923->1897 1924->1925 1928 7ff7a40573b4-7ff7a40573bd call 7ff7a4058570 1924->1928 1925->1923 1927->1917 1930 7ff7a40576a5-7ff7a40576a7 1927->1930 1928->1925 1934 7ff7a40577ec 1930->1934 1935 7ff7a40576ad-7ff7a40576c4 call 7ff7a4058b90 1930->1935 1947 7ff7a4057469-7ff7a405746c 1932->1947 1948 7ff7a4057452-7ff7a4057464 call 7ff7a4056400 1932->1948 1938 7ff7a4057614-7ff7a405765a SleepEx getsockopt 1933->1938 1939 7ff7a40575a5-7ff7a40575ac 1933->1939 1936 7ff7a40577ee 1934->1936 1951 7ff7a4057777-7ff7a4057779 1935->1951 1952 7ff7a40576ca-7ff7a40576d1 1935->1952 1936->1923 1941 7ff7a405765c-7ff7a4057664 WSAGetLastError 1938->1941 1942 7ff7a4057666 1938->1942 1939->1938 1944 7ff7a40575ae-7ff7a40575b0 1939->1944 1946 7ff7a405766a-7ff7a405766c 1941->1946 1942->1946 1949 7ff7a40575b6-7ff7a40575fc SleepEx getsockopt 1944->1949 1950 7ff7a40574bf-7ff7a40574c1 1944->1950 1957 7ff7a405766e-7ff7a4057674 1946->1957 1958 7ff7a40576e3-7ff7a4057731 1946->1958 1955 7ff7a40574bb 1947->1955 1956 7ff7a405746e-7ff7a4057475 1947->1956 1948->1947 1961 7ff7a405760b-7ff7a405760f 1949->1961 1962 7ff7a40575fe-7ff7a4057606 WSAGetLastError 1949->1962 1950->1922 1959 7ff7a40574c7-7ff7a40574dc WSASetLastError 1950->1959 1951->1936 1953 7ff7a405777b-7ff7a4057782 1952->1953 1954 7ff7a40576d7-7ff7a40576de 1952->1954 1969 7ff7a405778d-7ff7a4057794 1953->1969 1970 7ff7a4057784-7ff7a405778b 1953->1970 1963 7ff7a40577a6-7ff7a40577e9 call 7ff7a4042e10 call 7ff7a4056280 1954->1963 1955->1950 1956->1955 1964 7ff7a4057477-7ff7a40574a3 call 7ff7a405e150 1956->1964 1957->1958 1967 7ff7a4057676-7ff7a4057685 call 7ff7a4056400 1957->1967 1965 7ff7a4057733-7ff7a405773b call 7ff7a4056ee0 1958->1965 1966 7ff7a4057746-7ff7a405775b call 7ff7a4058460 1958->1966 1959->1922 1968 7ff7a40574e2-7ff7a405754c call 7ff7a405f4b0 call 7ff7a4042e10 call 7ff7a4056400 1959->1968 1961->1950 1962->1950 1963->1934 1964->1955 1987 7ff7a40574a5-7ff7a40574b6 call 7ff7a4058b90 1964->1987 1965->1966 1966->1936 1988 7ff7a4057761-7ff7a4057763 1966->1988 1967->1922 1997 7ff7a405756e-7ff7a4057584 call 7ff7a4058b90 1968->1997 1998 7ff7a405754e-7ff7a4057555 1968->1998 1978 7ff7a4057796-7ff7a405779d 1969->1978 1979 7ff7a405779f 1969->1979 1970->1963 1978->1963 1979->1963 1987->1955 1988->1936 1992 7ff7a4057769-7ff7a4057772 call 7ff7a4058570 1988->1992 1992->1951 2004 7ff7a4057597-7ff7a405759b 1997->2004 2005 7ff7a4057586-7ff7a4057591 1997->2005 1998->1997 1999 7ff7a4057557-7ff7a405755e 1998->1999 2001 7ff7a4057560-7ff7a4057563 1999->2001 2001->1997 2003 7ff7a4057565-7ff7a405756c 2001->2003 2003->1997 2003->2001 2004->1927 2005->1922 2005->2004
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                          • API String ID: 0-3307081561
                                          • Opcode ID: c48996a20b67154a06dffc38494323cf43a5c0cced136d840c2590770bea82d0
                                          • Instruction ID: bbeceec2eeaef0d46d7d85df83332c1f25e8f8034236259a973fe424806be65b
                                          • Opcode Fuzzy Hash: c48996a20b67154a06dffc38494323cf43a5c0cced136d840c2590770bea82d0
                                          • Instruction Fuzzy Hash: 78E12532B0A68282EB14AF2695846BFAB50FB44794F818275DE5D037F1DF3EE421E711
                                          APIs
                                            • Part of subcall function 00007FF7A40408F0: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7A40311F9), ref: 00007FF7A4040928
                                          • SleepEx.KERNELBASE ref: 00007FF7A4041C5F
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4041CD3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4041D14
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4041D4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                          • API String ID: 18138616-2486835083
                                          • Opcode ID: 02c974ba3ea694fb1581b36dc1d3936bca2f7c19c08318b0ff3533f4e3fd965b
                                          • Instruction ID: cd565a63328ea892923b6103cf6794ac7bf54df6ce75e99f0ce017c90772e3a4
                                          • Opcode Fuzzy Hash: 02c974ba3ea694fb1581b36dc1d3936bca2f7c19c08318b0ff3533f4e3fd965b
                                          • Instruction Fuzzy Hash: CC811772B2968186EB00EF26E4842AFB362FB94394F914236EA5D07AF5DF3DD050D710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastrecv
                                          • String ID:
                                          • API String ID: 2514157807-0
                                          • Opcode ID: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                          • Instruction ID: 6c0e048b31969fae7c37be3cded2b20317b11841492a31959e7a4896e9b99370
                                          • Opcode Fuzzy Hash: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                          • Instruction Fuzzy Hash: 85E02621F0660943FF286B72F8A573A1294DB48732F844BB8DA3E863E0DE3C44E65710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 982 7ff7a4032ab0-7ff7a4032aff call 7ff7a4032850 985 7ff7a40330b8-7ff7a4033127 call 7ff7a4033130 Sleep exit 982->985 986 7ff7a4032b05-7ff7a4032b0a 982->986 991 7ff7a4033128-7ff7a403312f call 7ff7a4031a00 985->991 986->985 988 7ff7a4032b10-7ff7a4032c2e call 7ff7a4033170 call 7ff7a4033c40 call 7ff7a40332e0 call 7ff7a4033c40 call 7ff7a40333e0 call 7ff7a4033c40 986->988 1005 7ff7a4032c30-7ff7a4032c41 988->1005 1006 7ff7a4032c64-7ff7a4032c7d 988->1006 1007 7ff7a4032c5f call 7ff7a408fb54 1005->1007 1008 7ff7a4032c43-7ff7a4032c56 1005->1008 1009 7ff7a4032c7f-7ff7a4032c91 1006->1009 1010 7ff7a4032cb5-7ff7a4032cbd 1006->1010 1007->1006 1008->1007 1015 7ff7a4032c58-7ff7a4032c5e _invalid_parameter_noinfo_noreturn 1008->1015 1011 7ff7a4032caf-7ff7a4032cb4 call 7ff7a408fb54 1009->1011 1012 7ff7a4032c93-7ff7a4032ca6 1009->1012 1013 7ff7a4032cbf-7ff7a4032cd0 1010->1013 1014 7ff7a4032cf3-7ff7a4032d0b 1010->1014 1011->1010 1012->1011 1017 7ff7a4032ca8-7ff7a4032cae _invalid_parameter_noinfo_noreturn 1012->1017 1019 7ff7a4032cee call 7ff7a408fb54 1013->1019 1020 7ff7a4032cd2-7ff7a4032ce5 1013->1020 1021 7ff7a4032d0d-7ff7a4032d1e 1014->1021 1022 7ff7a4032d42-7ff7a4032d4a 1014->1022 1015->1007 1017->1011 1019->1014 1020->1019 1026 7ff7a4032ce7-7ff7a4032ced _invalid_parameter_noinfo_noreturn 1020->1026 1028 7ff7a4032d3c-7ff7a4032d41 call 7ff7a408fb54 1021->1028 1029 7ff7a4032d20-7ff7a4032d33 1021->1029 1023 7ff7a4032d4c-7ff7a4032d5d 1022->1023 1024 7ff7a4032d80-7ff7a4032dc7 1022->1024 1031 7ff7a4032d7b call 7ff7a408fb54 1023->1031 1032 7ff7a4032d5f-7ff7a4032d72 1023->1032 1033 7ff7a4032dc9-7ff7a4032dd6 1024->1033 1034 7ff7a4032dd8-7ff7a4032dfb 1024->1034 1026->1019 1028->1022 1029->1028 1035 7ff7a4032d35-7ff7a4032d3b _invalid_parameter_noinfo_noreturn 1029->1035 1031->1024 1032->1031 1037 7ff7a4032d74-7ff7a4032d7a _invalid_parameter_noinfo_noreturn 1032->1037 1039 7ff7a4032e52-7ff7a4032ea8 call 7ff7a4033560 call 7ff7a4032850 call 7ff7a4034be0 call 7ff7a40348d0 1033->1039 1040 7ff7a4032dfd-7ff7a4032e04 1034->1040 1041 7ff7a4032e2f-7ff7a4032e32 1034->1041 1035->1028 1037->1031 1060 7ff7a4032eae-7ff7a4032ebd call 7ff7a40348d0 1039->1060 1061 7ff7a4032fb3-7ff7a4033023 call 7ff7a40348d0 call 7ff7a408fb18 call 7ff7a4034320 call 7ff7a4035a10 call 7ff7a4033e60 1039->1061 1040->991 1045 7ff7a4032e0a-7ff7a4032e18 call 7ff7a408fb18 1040->1045 1042 7ff7a4032e3b 1041->1042 1043 7ff7a4032e34-7ff7a4032e39 call 7ff7a408fb18 1041->1043 1047 7ff7a4032e3e-7ff7a4032e4d memcpy 1042->1047 1043->1047 1054 7ff7a4032e1a-7ff7a4032e26 1045->1054 1055 7ff7a4032e28-7ff7a4032e2e _invalid_parameter_noinfo_noreturn 1045->1055 1047->1039 1054->1047 1055->1041 1066 7ff7a4032ebf-7ff7a4032ec3 1060->1066 1067 7ff7a4032ec5 1060->1067 1087 7ff7a4033071-7ff7a40330b7 call 7ff7a40348d0 call 7ff7a4034d10 call 7ff7a4033b20 MessageBoxA call 7ff7a4033ce0 exit 1061->1087 1088 7ff7a4033025-7ff7a4033070 call 7ff7a40348d0 call 7ff7a40349b0 call 7ff7a4033b20 ShellExecuteA exit 1061->1088 1069 7ff7a4032ec8-7ff7a4032ed1 1066->1069 1067->1069 1071 7ff7a4032ed6-7ff7a4032ef9 call 7ff7a4034320 call 7ff7a4033e60 1069->1071 1072 7ff7a4032ed3 1069->1072 1083 7ff7a4032efb-7ff7a4032f0c 1071->1083 1084 7ff7a4032f2f-7ff7a4032f43 1071->1084 1072->1071 1089 7ff7a4032f2a call 7ff7a408fb54 1083->1089 1090 7ff7a4032f0e-7ff7a4032f21 1083->1090 1085 7ff7a4032f79-7ff7a4032fb2 call 7ff7a408ff10 1084->1085 1086 7ff7a4032f45-7ff7a4032f53 1084->1086 1092 7ff7a4032f71-7ff7a4032f74 call 7ff7a408fb54 1086->1092 1093 7ff7a4032f55-7ff7a4032f68 1086->1093 1087->985 1088->1087 1089->1084 1090->1089 1097 7ff7a4032f23-7ff7a4032f29 _invalid_parameter_noinfo_noreturn 1090->1097 1092->1085 1093->1092 1098 7ff7a4032f6a-7ff7a4032f70 _invalid_parameter_noinfo_noreturn 1093->1098 1097->1089 1098->1092
                                          APIs
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40328B7
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032927
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032987
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40329D7
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032A27
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032C58
                                            • Part of subcall function 00007FF7A40348D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4034990
                                            • Part of subcall function 00007FF7A408FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7A40343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A408FB32
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032CA8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032CE7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032D35
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032D74
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032E28
                                          • memcpy.VCRUNTIME140 ref: 00007FF7A4032E4D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032F23
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032F6A
                                          • ShellExecuteA.SHELL32 ref: 00007FF7A4033062
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403306A
                                          • MessageBoxA.USER32 ref: 00007FF7A40330A0
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40330B1
                                          • Sleep.KERNEL32 ref: 00007FF7A4033119
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4033121
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A4033128
                                            • Part of subcall function 00007FF7A4033170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403327F
                                            • Part of subcall function 00007FF7A4033170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40332C0
                                            • Part of subcall function 00007FF7A4033C40: memcpy.VCRUNTIME140 ref: 00007FF7A4033C93
                                            • Part of subcall function 00007FF7A40332E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40333C0
                                            • Part of subcall function 00007FF7A40333E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40334C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                          • String ID: Failure$download$invalidver$message$open$sessionid$success
                                          • API String ID: 3283070336-3881042241
                                          • Opcode ID: 1d9b411b40bc9a0d335268b4121ff1fd53ff6ab73f3897d94a4ed14f8e470e53
                                          • Instruction ID: da20124e13451720a9d483631634d69ed5d926027780d341b08fb52af2d3fa09
                                          • Opcode Fuzzy Hash: 1d9b411b40bc9a0d335268b4121ff1fd53ff6ab73f3897d94a4ed14f8e470e53
                                          • Instruction Fuzzy Hash: 8F023A22A0978285EB04EF36D5803AEB761FB45794F815674EA6C03AF6DF3EE094D350

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1113 7ff7a406bed0-7ff7a406bf4d 1114 7ff7a406bf6e-7ff7a406bf73 1113->1114 1115 7ff7a406bf4f-7ff7a406bf53 1113->1115 1117 7ff7a406bf75-7ff7a406bf8d call 7ff7a4056400 1114->1117 1118 7ff7a406bf92-7ff7a406bf96 1114->1118 1115->1114 1116 7ff7a406bf55-7ff7a406bf69 call 7ff7a4056400 1115->1116 1130 7ff7a406c3bc-7ff7a406c3c9 1116->1130 1131 7ff7a406c3b3-7ff7a406c3b6 1117->1131 1121 7ff7a406bf98-7ff7a406bfac call 7ff7a4056400 1118->1121 1122 7ff7a406bfb1-7ff7a406bfb4 1118->1122 1121->1131 1124 7ff7a406c2ca 1122->1124 1125 7ff7a406bfba-7ff7a406bfbe 1122->1125 1132 7ff7a406c2d2-7ff7a406c2da 1124->1132 1125->1124 1129 7ff7a406bfc4-7ff7a406bfd9 1125->1129 1133 7ff7a406bfdb-7ff7a406bfde 1129->1133 1134 7ff7a406bfe0-7ff7a406c00b realloc 1129->1134 1135 7ff7a406c4d5-7ff7a406c4db 1130->1135 1136 7ff7a406c3cf-7ff7a406c3d3 1130->1136 1131->1130 1131->1135 1137 7ff7a406c2de 1132->1137 1133->1134 1140 7ff7a406c05d-7ff7a406c072 call 7ff7a4056600 1133->1140 1141 7ff7a406c00d-7ff7a406c029 call 7ff7a4056280 1134->1141 1142 7ff7a406c02e-7ff7a406c05b 1134->1142 1138 7ff7a406c4ed-7ff7a406c503 1135->1138 1139 7ff7a406c4dd-7ff7a406c4e0 1135->1139 1136->1135 1143 7ff7a406c3d9-7ff7a406c3dd 1136->1143 1144 7ff7a406c2e6-7ff7a406c2ec 1137->1144 1146 7ff7a406c54b-7ff7a406c551 1138->1146 1147 7ff7a406c505-7ff7a406c549 memcpy * 2 1138->1147 1139->1138 1145 7ff7a406c4e2-7ff7a406c4ea 1139->1145 1157 7ff7a406c077-7ff7a406c07d 1140->1157 1141->1130 1142->1140 1143->1135 1150 7ff7a406c3e3-7ff7a406c3f8 call 7ff7a4059110 1143->1150 1151 7ff7a406c382-7ff7a406c388 1144->1151 1152 7ff7a406c2f2-7ff7a406c307 call 7ff7a4056400 1144->1152 1145->1138 1155 7ff7a406c565-7ff7a406c568 1146->1155 1156 7ff7a406c553-7ff7a406c556 1146->1156 1153 7ff7a406c575-7ff7a406c597 call 7ff7a408ff10 1147->1153 1170 7ff7a406c4be-7ff7a406c4d0 call 7ff7a4056400 1150->1170 1171 7ff7a406c3fe-7ff7a406c400 1150->1171 1161 7ff7a406c38e-7ff7a406c39e 1151->1161 1162 7ff7a406c0b0-7ff7a406c0bf 1151->1162 1186 7ff7a406c309-7ff7a406c30c 1152->1186 1187 7ff7a406c312-7ff7a406c322 1152->1187 1165 7ff7a406c56a-7ff7a406c56e 1155->1165 1166 7ff7a406c570-7ff7a406c572 1155->1166 1156->1155 1164 7ff7a406c558-7ff7a406c560 1156->1164 1167 7ff7a406c083-7ff7a406c08f 1157->1167 1168 7ff7a406c282-7ff7a406c28a 1157->1168 1161->1131 1173 7ff7a406c3a0-7ff7a406c3a4 1161->1173 1162->1131 1172 7ff7a406c0c5-7ff7a406c0c7 1162->1172 1164->1155 1165->1166 1166->1153 1175 7ff7a406c0a9-7ff7a406c0ae 1167->1175 1176 7ff7a406c091-7ff7a406c097 1167->1176 1177 7ff7a406c28c-7ff7a406c29d 1168->1177 1178 7ff7a406c2a2 1168->1178 1170->1135 1171->1170 1182 7ff7a406c406-7ff7a406c412 1171->1182 1172->1131 1184 7ff7a406c0cd-7ff7a406c0d0 1172->1184 1185 7ff7a406c3ab 1173->1185 1175->1162 1179 7ff7a406c09d-7ff7a406c0a4 call 7ff7a4056400 1176->1179 1180 7ff7a406c26e-7ff7a406c27d call 7ff7a4056400 1176->1180 1177->1162 1178->1175 1181 7ff7a406c2a8-7ff7a406c2c5 1178->1181 1179->1175 1180->1175 1181->1162 1182->1135 1189 7ff7a406c0e2-7ff7a406c160 call 7ff7a4058cd0 1184->1189 1190 7ff7a406c0d2-7ff7a406c0d6 1184->1190 1191 7ff7a406c3ae call 7ff7a4056400 1185->1191 1186->1187 1192 7ff7a406c492-7ff7a406c499 1186->1192 1194 7ff7a406c4aa-7ff7a406c4b9 1187->1194 1195 7ff7a406c328-7ff7a406c369 call 7ff7a4056400 call 7ff7a406a390 1187->1195 1208 7ff7a406c174-7ff7a406c179 1189->1208 1209 7ff7a406c162-7ff7a406c167 1189->1209 1190->1189 1196 7ff7a406c0d8-7ff7a406c0dc 1190->1196 1191->1131 1192->1185 1194->1191 1206 7ff7a406c49e-7ff7a406c4a5 1195->1206 1207 7ff7a406c36f-7ff7a406c37d call 7ff7a4056400 1195->1207 1196->1131 1196->1189 1206->1191 1207->1162 1210 7ff7a406c21e-7ff7a406c222 1208->1210 1211 7ff7a406c17f-7ff7a406c1a9 1208->1211 1209->1208 1213 7ff7a406c169-7ff7a406c16e 1209->1213 1210->1132 1217 7ff7a406c228-7ff7a406c22d 1210->1217 1214 7ff7a406c1ab-7ff7a406c1ae 1211->1214 1215 7ff7a406c1b0-7ff7a406c1cb realloc 1211->1215 1213->1208 1218 7ff7a406c417-7ff7a406c41d 1213->1218 1214->1215 1219 7ff7a406c1f5-7ff7a406c1f9 1214->1219 1220 7ff7a406c476-7ff7a406c48d call 7ff7a4056280 1215->1220 1221 7ff7a406c1d1-7ff7a406c1f1 1215->1221 1217->1132 1224 7ff7a406c233-7ff7a406c245 1217->1224 1222 7ff7a406c446-7ff7a406c471 call 7ff7a4042620 call 7ff7a4056400 1218->1222 1223 7ff7a406c41f-7ff7a406c430 1218->1223 1225 7ff7a406c1fb-7ff7a406c218 memcpy 1219->1225 1226 7ff7a406c21c 1219->1226 1220->1131 1221->1219 1222->1131 1227 7ff7a406c43a-7ff7a406c441 1223->1227 1228 7ff7a406c432 1223->1228 1224->1144 1230 7ff7a406c24b-7ff7a406c26c memcpy 1224->1230 1225->1226 1226->1210 1227->1185 1228->1227 1230->1137
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                          • API String ID: 3510742995-857957974
                                          • Opcode ID: a248729e05c5a164a4cded72e3c22de02dfaf7ecce5ddd1b6ceda931908bb9be
                                          • Instruction ID: 0bc8b776cbc9125c25327808dba9ebffdaa383f551b88aae3c2ffbacb4fd7fe9
                                          • Opcode Fuzzy Hash: a248729e05c5a164a4cded72e3c22de02dfaf7ecce5ddd1b6ceda931908bb9be
                                          • Instruction Fuzzy Hash: 4702E032B0AA4181EB60EF0AD88436BB7A4FB40B94F924176DE4E473B4DFBAD450D711

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1356 7ff7a406b360-7ff7a406b3ce 1357 7ff7a406b3f0 1356->1357 1358 7ff7a406b3d0-7ff7a406b3e5 1356->1358 1360 7ff7a406b3f7-7ff7a406b411 1357->1360 1358->1357 1359 7ff7a406b3e7-7ff7a406b3ee 1358->1359 1359->1360 1361 7ff7a406badb 1360->1361 1362 7ff7a406b417-7ff7a406b41c 1360->1362 1362->1361 1363 7ff7a406b422-7ff7a406b430 1362->1363 1364 7ff7a406b472-7ff7a406b476 1363->1364 1365 7ff7a406b432-7ff7a406b46c malloc 1363->1365 1367 7ff7a406b478-7ff7a406b4bd malloc 1364->1367 1368 7ff7a406b4c3-7ff7a406b4d4 1364->1368 1365->1364 1366 7ff7a406bacf 1365->1366 1366->1361 1367->1366 1367->1368 1369 7ff7a406b548-7ff7a406b54a 1368->1369 1370 7ff7a406b4d6-7ff7a406b4f0 realloc 1368->1370 1373 7ff7a406b54c-7ff7a406b570 call 7ff7a4056600 1369->1373 1374 7ff7a406b5aa-7ff7a406b651 call 7ff7a4058cd0 malloc 1369->1374 1371 7ff7a406b4f2-7ff7a406b4fc call 7ff7a4056280 1370->1371 1372 7ff7a406b530-7ff7a406b546 1370->1372 1379 7ff7a406b501 1371->1379 1372->1369 1380 7ff7a406b575-7ff7a406b578 1373->1380 1374->1366 1381 7ff7a406b657-7ff7a406b671 memcpy 1374->1381 1382 7ff7a406b506-7ff7a406b52f call 7ff7a408ff10 1379->1382 1383 7ff7a406b57e-7ff7a406b580 1380->1383 1384 7ff7a406b7ef-7ff7a406b7f6 1380->1384 1381->1379 1385 7ff7a406b677-7ff7a406b6e3 free 1381->1385 1387 7ff7a406b7d6-7ff7a406b7ea call 7ff7a4056280 1383->1387 1388 7ff7a406b586-7ff7a406b58e 1383->1388 1389 7ff7a406b7fc-7ff7a406b808 1384->1389 1390 7ff7a406bac8-7ff7a406baca 1384->1390 1396 7ff7a406b6e9-7ff7a406b6f0 1385->1396 1397 7ff7a406bab3-7ff7a406baba 1385->1397 1387->1382 1388->1387 1393 7ff7a406b594-7ff7a406b5a6 1388->1393 1389->1382 1390->1382 1393->1374 1399 7ff7a406ba5c-7ff7a406ba68 1396->1399 1400 7ff7a406b6f6-7ff7a406b6fd 1396->1400 1398 7ff7a406babe 1397->1398 1398->1390 1403 7ff7a406ba9b-7ff7a406baae 1399->1403 1404 7ff7a406ba6a-7ff7a406ba96 call 7ff7a4042620 call 7ff7a4056280 1399->1404 1401 7ff7a406b708-7ff7a406b70f 1400->1401 1402 7ff7a406b6ff-7ff7a406b702 1400->1402 1406 7ff7a406b710-7ff7a406b714 1401->1406 1402->1401 1405 7ff7a406b80d-7ff7a406b814 1402->1405 1403->1382 1404->1382 1411 7ff7a406b816-7ff7a406b81d 1405->1411 1412 7ff7a406b854-7ff7a406b87d call 7ff7a4042620 call 7ff7a4056280 1405->1412 1408 7ff7a406b716-7ff7a406b71a 1406->1408 1409 7ff7a406b753-7ff7a406b75a 1406->1409 1408->1409 1417 7ff7a406b71c-7ff7a406b737 call 7ff7a4056b40 1408->1417 1413 7ff7a406b75c 1409->1413 1414 7ff7a406b769-7ff7a406b772 1409->1414 1411->1404 1415 7ff7a406b823-7ff7a406b84f call 7ff7a4042620 call 7ff7a4056280 1411->1415 1412->1379 1413->1414 1414->1406 1420 7ff7a406b774-7ff7a406b778 1414->1420 1415->1382 1428 7ff7a406b73c-7ff7a406b742 1417->1428 1425 7ff7a406b77e-7ff7a406b783 1420->1425 1426 7ff7a406b8a8-7ff7a406b8af 1420->1426 1425->1426 1430 7ff7a406b789-7ff7a406b79a 1425->1430 1432 7ff7a406b8b7-7ff7a406b8be 1426->1432 1433 7ff7a406b748-7ff7a406b74d 1428->1433 1434 7ff7a406b882-7ff7a406b8a3 call 7ff7a4056280 1428->1434 1430->1432 1436 7ff7a406b7a0-7ff7a406b7c4 memcpy 1430->1436 1432->1398 1438 7ff7a406b8c4-7ff7a406b8c7 1432->1438 1433->1409 1433->1434 1434->1382 1436->1438 1441 7ff7a406b7ca-7ff7a406b7cf 1436->1441 1439 7ff7a406b8c9 1438->1439 1440 7ff7a406b8d3-7ff7a406b8db 1438->1440 1439->1440 1443 7ff7a406b8dd-7ff7a406b8f7 1440->1443 1444 7ff7a406b903 1440->1444 1441->1387 1443->1444 1445 7ff7a406b8f9-7ff7a406b901 1443->1445 1446 7ff7a406b90b-7ff7a406b90e 1444->1446 1445->1446 1447 7ff7a406b914-7ff7a406b945 1446->1447 1448 7ff7a406ba30-7ff7a406ba38 1446->1448 1453 7ff7a406b94b-7ff7a406b953 1447->1453 1454 7ff7a406ba03-7ff7a406ba2e call 7ff7a4042620 call 7ff7a4056280 1447->1454 1448->1390 1449 7ff7a406ba3e-7ff7a406ba49 1448->1449 1449->1390 1450 7ff7a406ba4b-7ff7a406ba57 call 7ff7a40863e0 1449->1450 1450->1382 1453->1454 1457 7ff7a406b959-7ff7a406b95c 1453->1457 1460 7ff7a406b9d5-7ff7a406b9d8 1454->1460 1459 7ff7a406b95e-7ff7a406b965 1457->1459 1457->1460 1464 7ff7a406b967-7ff7a406b98e memset call 7ff7a4088dc0 1459->1464 1465 7ff7a406b9d0 1459->1465 1462 7ff7a406b9da CertFreeCertificateContext 1460->1462 1463 7ff7a406b9e0-7ff7a406b9e2 1460->1463 1462->1463 1463->1448 1467 7ff7a406b9e4-7ff7a406b9f5 call 7ff7a4056280 1463->1467 1472 7ff7a406b9cb 1464->1472 1473 7ff7a406b990-7ff7a406b99a 1464->1473 1465->1460 1467->1382 1472->1465 1474 7ff7a406b99c-7ff7a406b9a6 1473->1474 1475 7ff7a406b9fa-7ff7a406ba01 1473->1475 1474->1475 1477 7ff7a406b9a8-7ff7a406b9ba call 7ff7a404f9f0 1474->1477 1476 7ff7a406b9c3-7ff7a406b9c6 call 7ff7a4056280 1475->1476 1476->1472 1477->1472 1481 7ff7a406b9bc 1477->1481 1481->1476
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                          • API String ID: 860210379-3059304359
                                          • Opcode ID: 97b15636c902424c44a3963cf3d924265bea320a0c79efaab36c3c2d44ec8d35
                                          • Instruction ID: f8de4576d08cca4edb019d5c51c62a8c3db35082289e86a84abd385a44ba9074
                                          • Opcode Fuzzy Hash: 97b15636c902424c44a3963cf3d924265bea320a0c79efaab36c3c2d44ec8d35
                                          • Instruction Fuzzy Hash: 9A12A072B0AB8185E760AF2AD8803ABB7A0FB44B85F910175CA8E477B0DF7ED451D711

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1482 7ff7a406a580-7ff7a406a5f0 1483 7ff7a406a5f2-7ff7a406a604 1482->1483 1484 7ff7a406a60f 1482->1484 1483->1484 1485 7ff7a406a606-7ff7a406a60d 1483->1485 1486 7ff7a406a616-7ff7a406a630 call 7ff7a4059110 1484->1486 1485->1486 1489 7ff7a406a641-7ff7a406a648 1486->1489 1490 7ff7a406a632-7ff7a406a63c call 7ff7a4056400 1486->1490 1492 7ff7a406a64a-7ff7a406a66a GetModuleHandleA GetProcAddress 1489->1492 1493 7ff7a406a688 1489->1493 1490->1489 1492->1493 1494 7ff7a406a66c-7ff7a406a682 call 7ff7a4059110 1492->1494 1495 7ff7a406a68a-7ff7a406a69b 1493->1495 1494->1493 1502 7ff7a406a684-7ff7a406a686 1494->1502 1497 7ff7a406a69d-7ff7a406a6b5 1495->1497 1498 7ff7a406a6c0 1495->1498 1497->1498 1500 7ff7a406a6b7-7ff7a406a6be 1497->1500 1501 7ff7a406a6c7-7ff7a406a6ca 1498->1501 1500->1501 1503 7ff7a406a70b-7ff7a406a712 1501->1503 1504 7ff7a406a6cc-7ff7a406a6e3 call 7ff7a4059110 1501->1504 1502->1495 1505 7ff7a406a716-7ff7a406a727 1503->1505 1512 7ff7a406a6e5-7ff7a406a6f0 1504->1512 1513 7ff7a406a6f2-7ff7a406a706 call 7ff7a4056280 1504->1513 1507 7ff7a406a74c 1505->1507 1508 7ff7a406a729-7ff7a406a741 1505->1508 1511 7ff7a406a753-7ff7a406a755 1507->1511 1508->1507 1510 7ff7a406a743-7ff7a406a74a 1508->1510 1510->1511 1514 7ff7a406a757-7ff7a406a773 call 7ff7a4050c70 call 7ff7a4050690 1511->1514 1515 7ff7a406a798-7ff7a406a7a2 1511->1515 1512->1505 1524 7ff7a406b30d-7ff7a406b336 call 7ff7a408ff10 1513->1524 1544 7ff7a406a775-7ff7a406a78d 1514->1544 1545 7ff7a406a790-7ff7a406a793 call 7ff7a4050ca0 1514->1545 1517 7ff7a406b017-7ff7a406b02e call 7ff7a4068210 1515->1517 1518 7ff7a406a7a8-7ff7a406a7d3 1515->1518 1532 7ff7a406b043-7ff7a406b04d call 7ff7a4056400 1517->1532 1533 7ff7a406b030-7ff7a406b041 call 7ff7a4068210 1517->1533 1522 7ff7a406a80b 1518->1522 1523 7ff7a406a7d5-7ff7a406a7ec 1518->1523 1530 7ff7a406a810-7ff7a406a81a 1522->1530 1527 7ff7a406a7ee-7ff7a406a7f3 1523->1527 1528 7ff7a406a7f5-7ff7a406a7fc 1523->1528 1527->1530 1535 7ff7a406a7fe-7ff7a406a803 1528->1535 1536 7ff7a406a805-7ff7a406a809 1528->1536 1537 7ff7a406a81c-7ff7a406a81f 1530->1537 1538 7ff7a406a822-7ff7a406a82d 1530->1538 1547 7ff7a406b052-7ff7a406b05d 1532->1547 1533->1532 1533->1547 1535->1530 1536->1530 1537->1538 1542 7ff7a406a833-7ff7a406a848 1538->1542 1543 7ff7a406afff-7ff7a406b00e call 7ff7a4056280 1538->1543 1542->1543 1555 7ff7a406b308 1543->1555 1544->1545 1545->1515 1550 7ff7a406b0e6-7ff7a406b0f8 1547->1550 1551 7ff7a406b063-7ff7a406b0e4 call 7ff7a4056400 call 7ff7a4058c90 1547->1551 1554 7ff7a406b0fd-7ff7a406b155 calloc 1550->1554 1551->1554 1557 7ff7a406b157-7ff7a406b161 call 7ff7a4056280 1554->1557 1558 7ff7a406b170-7ff7a406b173 1554->1558 1555->1524 1561 7ff7a406b166-7ff7a406b16b 1557->1561 1560 7ff7a406b175-7ff7a406b1d3 1558->1560 1558->1561 1565 7ff7a406b27c-7ff7a406b298 call 7ff7a4056b40 1560->1565 1566 7ff7a406b1d9-7ff7a406b208 free 1560->1566 1561->1524 1573 7ff7a406b29d-7ff7a406b2ba 1565->1573 1567 7ff7a406b20a-7ff7a406b210 1566->1567 1568 7ff7a406b256-7ff7a406b277 call 7ff7a4042620 call 7ff7a4056280 1566->1568 1571 7ff7a406b212-7ff7a406b22b call 7ff7a4042620 call 7ff7a4056280 1567->1571 1572 7ff7a406b230-7ff7a406b251 call 7ff7a4042620 call 7ff7a4056280 1567->1572 1568->1524 1571->1555 1572->1524 1584 7ff7a406b2bc-7ff7a406b2bf 1573->1584 1585 7ff7a406b2f9-7ff7a406b303 call 7ff7a4056280 1573->1585 1584->1585 1588 7ff7a406b2c1-7ff7a406b2f7 1584->1588 1585->1555 1588->1524
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                          • API String ID: 1646373207-2477831187
                                          • Opcode ID: 10b3639ac4156d1e6dcbd89b31d7d7416f6e26047d03e936fee46af19bc1507d
                                          • Instruction ID: da0d81f33b1f9eb5f1461c73bf8eaffc699ba47ec1ee661bbe544dcd23be0969
                                          • Opcode Fuzzy Hash: 10b3639ac4156d1e6dcbd89b31d7d7416f6e26047d03e936fee46af19bc1507d
                                          • Instruction Fuzzy Hash: 3D020332B09B8199E710AF26D8802EFB7A4FB45784F824175DA4E077B1DF79D460EB11

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1590 7ff7a404bbc0-7ff7a404bc0b calloc 1591 7ff7a404bd4e-7ff7a404bd57 _errno 1590->1591 1592 7ff7a404bc11-7ff7a404bc9a malloc 1590->1592 1595 7ff7a404bd59-7ff7a404bd75 1591->1595 1593 7ff7a404bc9c-7ff7a404bcc1 InitializeCriticalSectionEx call 7ff7a4065370 1592->1593 1594 7ff7a404bcd7-7ff7a404bcde 1592->1594 1602 7ff7a404bcc7-7ff7a404bccf 1593->1602 1603 7ff7a404bd76-7ff7a404bd8a _strdup 1593->1603 1597 7ff7a404bcf0-7ff7a404bd01 free 1594->1597 1598 7ff7a404bce0-7ff7a404bcea DeleteCriticalSection free 1594->1598 1600 7ff7a404bd08-7ff7a404bd10 1597->1600 1601 7ff7a404bd03 call 7ff7a4068f90 1597->1601 1598->1597 1605 7ff7a404bd18-7ff7a404bd48 free 1600->1605 1606 7ff7a404bd12 closesocket 1600->1606 1601->1600 1602->1594 1603->1594 1607 7ff7a404bd90-7ff7a404bdb0 free _strdup 1603->1607 1605->1591 1606->1605 1608 7ff7a404bdde-7ff7a404bde8 1607->1608 1609 7ff7a404bdb2-7ff7a404bdc1 call 7ff7a4069660 1607->1609 1611 7ff7a404bdea-7ff7a404be12 EnterCriticalSection LeaveCriticalSection 1608->1611 1612 7ff7a404be61-7ff7a404be7c free 1608->1612 1613 7ff7a404bdc6-7ff7a404bdcc 1609->1613 1614 7ff7a404be14-7ff7a404be1c CloseHandle 1611->1614 1615 7ff7a404be25-7ff7a404be28 1611->1615 1612->1591 1616 7ff7a404be1e-7ff7a404be20 1613->1616 1617 7ff7a404bdce-7ff7a404bddb _errno 1613->1617 1618 7ff7a404be48-7ff7a404be4b 1614->1618 1619 7ff7a404be2a-7ff7a404be2d call 7ff7a40696b0 1615->1619 1620 7ff7a404be32-7ff7a404be42 call 7ff7a404ba40 free 1615->1620 1616->1595 1617->1608 1621 7ff7a404be4d-7ff7a404be53 call 7ff7a4046410 1618->1621 1622 7ff7a404be58-7ff7a404be5b closesocket 1618->1622 1619->1620 1620->1618 1621->1622 1622->1612
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                          • String ID:
                                          • API String ID: 259767416-0
                                          • Opcode ID: 41a72df7b2bc5e60e2d0debc56844bab2a497cda2f686a918ca564a9ee16b53c
                                          • Instruction ID: a9e04a76ad46dcd34db8cb67ebea7196a249cef04ff19c07a7ee33aff6c67f36
                                          • Opcode Fuzzy Hash: 41a72df7b2bc5e60e2d0debc56844bab2a497cda2f686a918ca564a9ee16b53c
                                          • Instruction Fuzzy Hash: FC815122A06B8186E624EF22E49027AB370FB94754F425675DB9E03772DF79E0E4D310
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                          • API String ID: 0-760484938
                                          • Opcode ID: 88e9fff4c20cfb3387b05bb6273276a309f0730b87b5b8ee6ee5db605b16326a
                                          • Instruction ID: cb6a8f4a32a8fc75d32c6e0beec1f858cc35d68942abe5c9b3643bcdeffbaaa5
                                          • Opcode Fuzzy Hash: 88e9fff4c20cfb3387b05bb6273276a309f0730b87b5b8ee6ee5db605b16326a
                                          • Instruction Fuzzy Hash: 2B42E862A0ABC291EB59AF2295803BAA390FB45B84F858175CF5D47771DF3EE070D321

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,?,00007FF7A4082DCA,?,?,?,?,00007FF7A40592FB), ref: 00007FF7A4058F84
                                          • GetProcAddress.KERNEL32(?,?,00007FF7A4082DCA,?,?,?,?,00007FF7A40592FB), ref: 00007FF7A4058FA9
                                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF7A4082DCA,?,?,?,?,00007FF7A40592FB), ref: 00007FF7A4058FBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProcstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 27745253-3327535076
                                          • Opcode ID: 3fc36237d5a699e2f99facc73201d44ad9495a081454105c969e389c3d98dd0d
                                          • Instruction ID: a47dce0cb5e18a39e0f4f5e75441e9088c298c246059fea1bfe5b987ee9f7ec0
                                          • Opcode Fuzzy Hash: 3fc36237d5a699e2f99facc73201d44ad9495a081454105c969e389c3d98dd0d
                                          • Instruction Fuzzy Hash: E841E912B0B64249FB15AF17A88013AA791EF45BD0F498974DE1D077B1DE3ED4A6D320

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                          • API String ID: 2911674258-670633250
                                          • Opcode ID: beb777fae94bd714a0210b54ee0db9f5296f82d4134aa8963846ed8433313220
                                          • Instruction ID: 5e6b476be1a612d72443c4274f1dc467769e5be76071554ff644599bd669b3bc
                                          • Opcode Fuzzy Hash: beb777fae94bd714a0210b54ee0db9f5296f82d4134aa8963846ed8433313220
                                          • Instruction Fuzzy Hash: BE91B432A1ABC186D710DF26D5802EA7360FB8CB88F859235EE4C47636DF39D195D721

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2041 7ff7a4068fe0-7ff7a406900d getaddrinfo 2042 7ff7a4069013-7ff7a4069025 2041->2042 2043 7ff7a40691a4-7ff7a40691b1 2041->2043 2044 7ff7a406902b 2042->2044 2045 7ff7a4069184-7ff7a406918d WSASetLastError 2042->2045 2046 7ff7a4069030-7ff7a4069036 2044->2046 2047 7ff7a4069193-7ff7a40691a0 2045->2047 2048 7ff7a406903d-7ff7a4069040 2046->2048 2049 7ff7a4069038-7ff7a406903b 2046->2049 2047->2043 2051 7ff7a4069046 2048->2051 2052 7ff7a40690f1-7ff7a40690f8 2048->2052 2050 7ff7a4069049-7ff7a406904d 2049->2050 2050->2052 2054 7ff7a4069053-7ff7a406905a 2050->2054 2051->2050 2052->2046 2053 7ff7a40690fe 2052->2053 2055 7ff7a4069132-7ff7a406913f 2053->2055 2054->2052 2056 7ff7a4069060-7ff7a4069063 2054->2056 2057 7ff7a4069147-7ff7a406914a 2055->2057 2058 7ff7a4069141 freeaddrinfo 2055->2058 2056->2052 2059 7ff7a4069069-7ff7a406907a malloc 2056->2059 2060 7ff7a406914c-7ff7a406914f 2057->2060 2061 7ff7a406917f-7ff7a4069182 2057->2061 2058->2057 2062 7ff7a406912c 2059->2062 2063 7ff7a4069080-7ff7a40690b5 malloc 2059->2063 2064 7ff7a406917a-7ff7a406917d 2060->2064 2065 7ff7a4069151-7ff7a4069178 free * 3 2060->2065 2061->2045 2061->2047 2062->2055 2066 7ff7a406911b-7ff7a406912a free 2063->2066 2067 7ff7a40690b7-7ff7a40690cd memcpy 2063->2067 2064->2047 2065->2064 2065->2065 2066->2055 2068 7ff7a40690de-7ff7a40690e8 2067->2068 2069 7ff7a40690cf-7ff7a40690dc _strdup 2067->2069 2070 7ff7a40690ee 2068->2070 2071 7ff7a40690ea 2068->2071 2069->2068 2072 7ff7a4069100-7ff7a4069119 free * 2 2069->2072 2070->2052 2071->2070 2072->2055
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                          • String ID:
                                          • API String ID: 2364279375-0
                                          • Opcode ID: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                          • Instruction ID: 98bb9c33a429bbc1bdc3fad677d88a29a1cd26336e2434f7408ff71ad9706a48
                                          • Opcode Fuzzy Hash: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                          • Instruction Fuzzy Hash: 2D51A23270A74196EA24AF03A58413AF3A0FB84B90F964475CE8E07B70CF7DE465E721

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2073 7ff7a40668f0-7ff7a4066935 2074 7ff7a406696b-7ff7a4066985 2073->2074 2075 7ff7a4066937-7ff7a406693a 2073->2075 2077 7ff7a406699c-7ff7a40669b7 2074->2077 2078 7ff7a4066987-7ff7a4066997 2074->2078 2075->2074 2076 7ff7a406693c-7ff7a406693f 2075->2076 2076->2074 2079 7ff7a4066941-7ff7a4066944 2076->2079 2080 7ff7a40669bd-7ff7a40669c2 2077->2080 2081 7ff7a4066a47-7ff7a4066a53 2077->2081 2078->2077 2084 7ff7a4066964-7ff7a4066966 2079->2084 2085 7ff7a4066946 2079->2085 2082 7ff7a40669d7-7ff7a40669da 2080->2082 2083 7ff7a40669c4-7ff7a40669ce 2080->2083 2086 7ff7a4066a55-7ff7a4066a69 2081->2086 2087 7ff7a4066aa0-7ff7a4066aaa 2081->2087 2089 7ff7a40669dc-7ff7a40669e0 2082->2089 2090 7ff7a40669fd-7ff7a4066a02 2082->2090 2083->2082 2088 7ff7a40669d0-7ff7a40669d5 2083->2088 2095 7ff7a4066c0d 2084->2095 2093 7ff7a406695b-7ff7a406695e Sleep 2085->2093 2094 7ff7a4066948-7ff7a4066956 WSASetLastError 2085->2094 2096 7ff7a4066a6b 2086->2096 2097 7ff7a4066a7f-7ff7a4066a81 2086->2097 2091 7ff7a4066aac-7ff7a4066aaf 2087->2091 2092 7ff7a4066ae3-7ff7a4066aeb 2087->2092 2088->2082 2088->2083 2089->2090 2100 7ff7a40669e2-7ff7a40669f6 2089->2100 2101 7ff7a4066a14-7ff7a4066a1e 2090->2101 2102 7ff7a4066a04-7ff7a4066a0b 2090->2102 2091->2092 2104 7ff7a4066ab1-7ff7a4066ab3 2091->2104 2105 7ff7a4066aed-7ff7a4066af0 2092->2105 2106 7ff7a4066af2 2092->2106 2093->2084 2094->2095 2103 7ff7a4066c0f-7ff7a4066c2f call 7ff7a408ff10 2095->2103 2107 7ff7a4066a70-7ff7a4066a77 2096->2107 2098 7ff7a4066a99-7ff7a4066a9c 2097->2098 2099 7ff7a4066a83-7ff7a4066a86 2097->2099 2098->2087 2099->2098 2111 7ff7a4066a88-7ff7a4066a95 2099->2111 2100->2090 2115 7ff7a4066a3b-7ff7a4066a43 2101->2115 2116 7ff7a4066a20-7ff7a4066a28 2101->2116 2102->2101 2112 7ff7a4066a0d-7ff7a4066a12 2102->2112 2104->2092 2114 7ff7a4066ab5-7ff7a4066ab8 2104->2114 2117 7ff7a4066b2a-7ff7a4066b5a select 2105->2117 2108 7ff7a4066af4-7ff7a4066b1e 2106->2108 2109 7ff7a4066b20-7ff7a4066b23 2106->2109 2107->2097 2110 7ff7a4066a79-7ff7a4066a7d 2107->2110 2108->2117 2109->2117 2118 7ff7a4066b25 2109->2118 2110->2097 2110->2107 2111->2098 2112->2101 2112->2102 2121 7ff7a4066aba-7ff7a4066abc 2114->2121 2122 7ff7a4066ac1 2114->2122 2115->2081 2116->2115 2123 7ff7a4066a2a-7ff7a4066a37 2116->2123 2119 7ff7a4066b60-7ff7a4066b6a 2117->2119 2118->2117 2124 7ff7a4066b6c-7ff7a4066b6f 2119->2124 2125 7ff7a4066b74 2119->2125 2121->2119 2126 7ff7a4066ac3-7ff7a4066ad1 WSASetLastError 2122->2126 2127 7ff7a4066ad6-7ff7a4066ae1 Sleep 2122->2127 2123->2115 2124->2103 2128 7ff7a4066b7d-7ff7a4066b80 2125->2128 2129 7ff7a4066b76-7ff7a4066b78 2125->2129 2126->2119 2127->2119 2130 7ff7a4066baf-7ff7a4066bb2 2128->2130 2131 7ff7a4066b82-7ff7a4066baa __WSAFDIsSet * 2 2128->2131 2129->2103 2133 7ff7a4066bde-7ff7a4066be1 2130->2133 2134 7ff7a4066bb4-7ff7a4066bc5 __WSAFDIsSet 2130->2134 2131->2130 2132 7ff7a4066bac 2131->2132 2132->2130 2133->2095 2135 7ff7a4066be3-7ff7a4066bf4 __WSAFDIsSet 2133->2135 2136 7ff7a4066bc7 2134->2136 2137 7ff7a4066bca-7ff7a4066bd9 __WSAFDIsSet 2134->2137 2138 7ff7a4066bf9-7ff7a4066c08 __WSAFDIsSet 2135->2138 2139 7ff7a4066bf6 2135->2139 2136->2137 2137->2133 2140 7ff7a4066bdb 2137->2140 2138->2095 2141 7ff7a4066c0a 2138->2141 2139->2138 2140->2133 2141->2095
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                          • Instruction ID: 7073fb7a804e5db96bd3680e2ed969a298ccb7c794bbe541ce6829974bb0432f
                                          • Opcode Fuzzy Hash: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                          • Instruction Fuzzy Hash: 44919E31B0E68296E7246E1798C01BBE294FF40354F914974E90F86BF4DF7FD960A611
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                          • API String ID: 2635317215-3812100122
                                          • Opcode ID: f08da87b223e4afb787e14741a77dd1769841e215b917ae838169de794eb3b9c
                                          • Instruction ID: 8f5594b9d957296189bab2e405b6b7e54e5fbb03f5d415c11024d6fac67eb769
                                          • Opcode Fuzzy Hash: f08da87b223e4afb787e14741a77dd1769841e215b917ae838169de794eb3b9c
                                          • Instruction Fuzzy Hash: 5051D832B0EB4186FA15AF26A4C037AA690EB84780F554071DF4D837B5EF3FE460A721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: system
                                          • String ID: .8$h%49
                                          • API String ID: 3377271179-4206735779
                                          • Opcode ID: a7e926d66bff3890010a4de0419013d2960dc4d2cd83e741db80a3a17baeac22
                                          • Instruction ID: 67978fdaaca0dc127591302536fbc3793a5561a6d8222e5d9966aeda78d89d37
                                          • Opcode Fuzzy Hash: a7e926d66bff3890010a4de0419013d2960dc4d2cd83e741db80a3a17baeac22
                                          • Instruction Fuzzy Hash: 2E618D23E197DA8CF301DF79E8851BDB770BB89708F8153B8CE8925D25EBA91148D360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                          • String ID:
                                          • API String ID: 1133592946-0
                                          • Opcode ID: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                          • Instruction ID: a97ddde8905ef02750b4990a91b7491538c68b8ea55072e032a73d63d1a50973
                                          • Opcode Fuzzy Hash: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                          • Instruction Fuzzy Hash: 88312021A0B20241FA04BFA699D13BBE2919F55784FC644B4FA4D572F3DF2EA464A270
                                          APIs
                                            • Part of subcall function 00007FF7A4068FE0: getaddrinfo.WS2_32 ref: 00007FF7A4069002
                                            • Part of subcall function 00007FF7A4068FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A406906E
                                            • Part of subcall function 00007FF7A4068FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A40690A8
                                            • Part of subcall function 00007FF7A4068FE0: memcpy.VCRUNTIME140(?,?,?,00007FF7A404BB05), ref: 00007FF7A40690C1
                                            • Part of subcall function 00007FF7A4068FE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A40690CF
                                            • Part of subcall function 00007FF7A4068FE0: freeaddrinfo.WS2_32(?,?,?,00007FF7A404BB05), ref: 00007FF7A4069141
                                            • Part of subcall function 00007FF7A4068FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A4069155
                                            • Part of subcall function 00007FF7A4068FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A406915F
                                            • Part of subcall function 00007FF7A4068FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A404BB05), ref: 00007FF7A406916C
                                          • WSAGetLastError.WS2_32 ref: 00007FF7A404BB0B
                                          • WSAGetLastError.WS2_32 ref: 00007FF7A404BB15
                                          • EnterCriticalSection.KERNEL32 ref: 00007FF7A404BB30
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF7A404BB3F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404BB50
                                          • send.WS2_32 ref: 00007FF7A404BB73
                                          • WSAGetLastError.WS2_32 ref: 00007FF7A404BB7D
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF7A404BB90
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                          • String ID:
                                          • API String ID: 506363382-0
                                          • Opcode ID: a6177786e67ce207a14383e80216342d564401e2ecc507d782a46ab400b51c53
                                          • Instruction ID: d9b639008e9223d0e57261980b3320911a59e5f2476150366f99fda2dc9a3b3d
                                          • Opcode Fuzzy Hash: a6177786e67ce207a14383e80216342d564401e2ecc507d782a46ab400b51c53
                                          • Instruction Fuzzy Hash: AA31F93260960286E740AF36E4D026BB3B0FF84B98F810575E65E832B9DF7DD455D760
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                          • Instruction ID: 80e1d0dbc4e4bd56247b95bad732a664d21d0c7fa4e5bc19d3a26059ea785fea
                                          • Opcode Fuzzy Hash: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                          • Instruction Fuzzy Hash: 7EA17721B1A64296EB696E26D48037AE290FF44B94F810B74ED1F437F4DF7ED8209321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                          • API String ID: 1294909896-116363806
                                          • Opcode ID: a28eec18c5583ec35379bd811724e90c5d561a07f8764d59c040680412dff800
                                          • Instruction ID: ed3845eeaba32049ac294eaa9fd99ea47539de72ab83ece7f48b9559bd472550
                                          • Opcode Fuzzy Hash: a28eec18c5583ec35379bd811724e90c5d561a07f8764d59c040680412dff800
                                          • Instruction Fuzzy Hash: 5691883270AF8186EB109F26D8806AEB7A4FB84B88F850575CE4D47B74DF39D465DB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                          • API String ID: 3056473165-3891197721
                                          • Opcode ID: 8741bfcd9957ee131493ba49859359483c7bfae543cd2ba8d84637b182fc90c4
                                          • Instruction ID: f61c44e92024ed8f5795688069f53c18b873068e56475d62fe0caac3d3345f0d
                                          • Opcode Fuzzy Hash: 8741bfcd9957ee131493ba49859359483c7bfae543cd2ba8d84637b182fc90c4
                                          • Instruction Fuzzy Hash: CC71B372B0AB01CAE710DF66D4906AEB3A1FB487A8F424635DE2E477E4EE39D015D350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s$Connection #%ld to host %s left intact
                                          • API String ID: 1294909896-118628944
                                          • Opcode ID: 7665a385a49b6a18784097a82b69acf71c283a2eb38e737f672b30be921ec6bb
                                          • Instruction ID: 1c7334d8d39fb559806583783c79a14adfea47990656950a0f8332218083af4a
                                          • Opcode Fuzzy Hash: 7665a385a49b6a18784097a82b69acf71c283a2eb38e737f672b30be921ec6bb
                                          • Instruction Fuzzy Hash: 79919532B0A68182E758BF2695807BBA791FB44B84F854475DE4E07275CF3AE470E360
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4051ACB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4051AE1
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40518FD
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405191A
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405192E
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405194A
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051967
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405198A
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405199E
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519B2
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519D8
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519EC
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A00
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A4F
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A5C
                                            • Part of subcall function 00007FF7A4051880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A85
                                          • memset.VCRUNTIME140 ref: 00007FF7A4051B15
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 2717317152-3248832348
                                          • Opcode ID: 7e6886faf88a525474308bef059ca3135f8386d9b2c87476bf9b61c78194a49c
                                          • Instruction ID: a25cb97be09981be478c5d0fccdcef94fc8c34330bed5c62fdf921c53abdaf78
                                          • Opcode Fuzzy Hash: 7e6886faf88a525474308bef059ca3135f8386d9b2c87476bf9b61c78194a49c
                                          • Instruction Fuzzy Hash: 4571B622D0DAC181E751EF2294803FEA760EB51B84F898171DA5E0B2B5DF3EE461D331
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$memcpy
                                          • String ID: 1.1
                                          • API String ID: 4107583993-2150719395
                                          • Opcode ID: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                          • Instruction ID: 596f5d95b168aa2d166c44a334289d5efb35038c0d441ac0b34c96ea5370790c
                                          • Opcode Fuzzy Hash: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                          • Instruction Fuzzy Hash: 9A518272706A829AE664AF22E4803AAF3A0F744B84F454435CF9E47775CF7DE064D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastmallocrecvsend
                                          • String ID: Send failure: %s
                                          • API String ID: 25851408-857917747
                                          • Opcode ID: 9bcde3fcdb3c33973082be95d1aa4d0cd9a3947e20e16d38b606c5293046cf5d
                                          • Instruction ID: 2de7ccedbfa42b1845135c8fe2e2552ec7219bad2fbe4b18bab3a8f80b0f9086
                                          • Opcode Fuzzy Hash: 9bcde3fcdb3c33973082be95d1aa4d0cd9a3947e20e16d38b606c5293046cf5d
                                          • Instruction Fuzzy Hash: 3C41F372B06B4145EB60AF26E88077AA394FB08BE8F858635CE5D473B4DE3ED464D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 1294909896-3343404259
                                          • Opcode ID: 7a53e0a7d55959d416b0add4e115dcd4a29e0269d5a804bffd8908325d408303
                                          • Instruction ID: 0ab616e4a3901bb744629520613a2e1a61d51418050aabf64a251323f7f85847
                                          • Opcode Fuzzy Hash: 7a53e0a7d55959d416b0add4e115dcd4a29e0269d5a804bffd8908325d408303
                                          • Instruction Fuzzy Hash: 0FD1DA66A0A64285FB54AF6790843BFA361FF40B88F854871CE1D176B5DF3EE460E360
                                          APIs
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40328B7
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032927
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032987
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40329D7
                                            • Part of subcall function 00007FF7A4032850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032A27
                                          • MessageBoxA.USER32 ref: 00007FF7A4033737
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403379A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                          • String ID: keyauth.win$null
                                          • API String ID: 3545939226-2841560827
                                          • Opcode ID: 27d4b1ee77be1cfa0727f2cf05cfd0081e057b809cc8c74ae909376ae3587047
                                          • Instruction ID: 2981c2365182dcdcaf52fc39ad430f104ef68ec2c591347dfc154cbd630ede14
                                          • Opcode Fuzzy Hash: 27d4b1ee77be1cfa0727f2cf05cfd0081e057b809cc8c74ae909376ae3587047
                                          • Instruction Fuzzy Hash: 2E51F322B0974185FB08EF72D5843AE6761AB44B88FC14174DE0D17BBACF3EA1A1A350
                                          APIs
                                            • Part of subcall function 00007FF7A4058F70: GetModuleHandleA.KERNEL32(?,?,?,00007FF7A4082DCA,?,?,?,?,00007FF7A40592FB), ref: 00007FF7A4058F84
                                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF7A40592FB), ref: 00007FF7A4082DE0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: AddressCallerHandleModuleProc
                                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                          • API String ID: 2084706301-3788156360
                                          • Opcode ID: 6d94ad0bd16c8c0f11a2579dc9450e7ebb409a251943410b505cb19f3630012d
                                          • Instruction ID: d4099314df30966f391202a4b13d1dc386433a5d2a70d642cb136aec82833179
                                          • Opcode Fuzzy Hash: 6d94ad0bd16c8c0f11a2579dc9450e7ebb409a251943410b505cb19f3630012d
                                          • Instruction Fuzzy Hash: BAF0FF65E0BB0245EE44BF1799C17B6A790AF64344FC644B8D40C462B1EE6EA5A5A320
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 0-3343404259
                                          • Opcode ID: 543579aadb1d74d10013c36e2f77582ef7459981ea7dede42a3c104d98e4bc4e
                                          • Instruction ID: 5308dfddbf24951989ec28ace7c5cf9d9e729fd22de20c5c3bbfbd68ce832172
                                          • Opcode Fuzzy Hash: 543579aadb1d74d10013c36e2f77582ef7459981ea7dede42a3c104d98e4bc4e
                                          • Instruction Fuzzy Hash: 7CB1CA76A0A64285FB64BE27809437FA390EF41B48F865871CA1D472F5DE7EE460E360
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4061CE0
                                            • Part of subcall function 00007FF7A4062270: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A40622CA
                                            • Part of subcall function 00007FF7A4062020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A40620B8
                                            • Part of subcall function 00007FF7A4062020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A40620C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$calloc
                                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                          • API String ID: 3095843317-1242256665
                                          • Opcode ID: a1995d48067b5afd5e5404148f9da5058a0e5bbe3e5f70638319d2815a831231
                                          • Instruction ID: dc6868c52aaa1418127774de901fe7126105f8901d038d9e397f9dd1f3a08cb5
                                          • Opcode Fuzzy Hash: a1995d48067b5afd5e5404148f9da5058a0e5bbe3e5f70638319d2815a831231
                                          • Instruction Fuzzy Hash: 2B410D31B0E68295E760EF22A4803BBF7A1EF51784F854072DA4D4B276DE7ED414D721
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: closesocket$calloc
                                          • String ID:
                                          • API String ID: 2958813939-0
                                          • Opcode ID: 473b3bbd6640ab261cda7576d9617453ce688e41684549270cb66852f4c26c7d
                                          • Instruction ID: 9b77fba19b622a68fd752ec103f52716cad3bb58658a4778b03e6356677dc709
                                          • Opcode Fuzzy Hash: 473b3bbd6640ab261cda7576d9617453ce688e41684549270cb66852f4c26c7d
                                          • Instruction Fuzzy Hash: 8041C53160964181E780FF32D4902EBA361EF88768FC64A71DE5D462FAEF3ED1159361
                                          APIs
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7A40311F9), ref: 00007FF7A4040928
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7A40311F9), ref: 00007FF7A40409C9
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A40409E7
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 326894585-0
                                          • Opcode ID: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                          • Instruction ID: f56d0201c334f0caa95eac45d57a90bea6b7327d90ff3cc4a79b4432348da9dd
                                          • Opcode Fuzzy Hash: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                          • Instruction Fuzzy Hash: 5E31FB62B0774641FA15BF63A58037AA2509F04BE1F950670DF6D17BF2DF3DA8A29310
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                          • API String ID: 0-3791222319
                                          • Opcode ID: 3e47e14c372b87066afa308a6a35aab90b11a4499cdb2ff6be37f62f67aca775
                                          • Instruction ID: 3edb778d63922f2ac047b7803b6830237b93e3b3989a6f75b1963ab0b0c4f2ba
                                          • Opcode Fuzzy Hash: 3e47e14c372b87066afa308a6a35aab90b11a4499cdb2ff6be37f62f67aca775
                                          • Instruction Fuzzy Hash: 50510821B0A64295EB10FF16958427BE391FB467A4F854271DE1E432F1DEBEE021F721
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A40490FA
                                          • memcpy.VCRUNTIME140 ref: 00007FF7A404922C
                                          • memcpy.VCRUNTIME140 ref: 00007FF7A4049248
                                            • Part of subcall function 00007FF7A405E6E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4047003,?,?,00000000,00007FF7A40518D2,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405E71C
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freememcpy
                                          • String ID:
                                          • API String ID: 3223336191-0
                                          • Opcode ID: 54aff36e5212d6146394b1c18812124a5a0137bacb8697812285b3b45e936068
                                          • Instruction ID: f215806af8045868512124d39e709d25e889bed6b53bb800cd8db440cb26c227
                                          • Opcode Fuzzy Hash: 54aff36e5212d6146394b1c18812124a5a0137bacb8697812285b3b45e936068
                                          • Instruction Fuzzy Hash: ACC19F32B05A028AEB149F66C4803AE73A1FB447A8F818675CE2D177F8DF3AD415D350
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freerecv
                                          • String ID:
                                          • API String ID: 2032557106-0
                                          • Opcode ID: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                          • Instruction ID: bc5ea71e13ba749cb63876dfb06a3a8a02f92005e43eccfa9b8f07bddab0a22b
                                          • Opcode Fuzzy Hash: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                          • Instruction Fuzzy Hash: 1DC12B3260A68245E765AF2690803BBA390FF447A4F854A75DE5E037F4FF3ED8619710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 1294909896-3248832348
                                          • Opcode ID: 9352cf03e6d1215826af78489c14582c219a9cd389749df62015d38e4eedf361
                                          • Instruction ID: 8770742dc0ee8a1ae90d80822f381f22029aa9bcde763525c0ed0372d6f1c170
                                          • Opcode Fuzzy Hash: 9352cf03e6d1215826af78489c14582c219a9cd389749df62015d38e4eedf361
                                          • Instruction Fuzzy Hash: 67519422A096C185E741DF26E0803FEA750EB80B98F898175DF8C4B3B9CF79D4A1D721
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 4275364305-0
                                          • Opcode ID: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                          • Instruction ID: 88422d262d4fa89f56c3a5e0061878f285f844cb18af8e806a139a752de6219d
                                          • Opcode Fuzzy Hash: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                          • Instruction Fuzzy Hash: 1111A362B0A58281EA10EF22E4D432AB360FF857D4FC10671E59E066F6DE2DE1A0E710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: __acrt_iob_func__stdio_common_vfprintf
                                          • String ID:
                                          • API String ID: 2168557111-0
                                          • Opcode ID: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                          • Instruction ID: 385483b6f1a8638c908b68a4238be0704da77773f651536ed716ffa9c3a28258
                                          • Opcode Fuzzy Hash: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                          • Instruction Fuzzy Hash: 6CE03932A09B8182D6009F51F94446AF7A8FB987C4F804539EF8C57A39CF7CC1A5CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: closesocket
                                          • String ID:
                                          • API String ID: 2781271927-0
                                          • Opcode ID: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                          • Instruction ID: 5d289baad24e0e8619e491cac47727bc9e660865bb8c0d9b51276003099f397b
                                          • Opcode Fuzzy Hash: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                          • Instruction Fuzzy Hash: F101D612B1754181EF54EF2BE1D83AEA390EF88B88F898470D70D472B6DE3EC4A19351
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: socket
                                          • String ID:
                                          • API String ID: 98920635-0
                                          • Opcode ID: 9aa50d9fc156e246847f462c3a65219810722acfc51c2770c2959e6d5f14f527
                                          • Instruction ID: e7247b1b71350412b19a6d0d67294fddf40da293dd939c9d3213643ce1965a8b
                                          • Opcode Fuzzy Hash: 9aa50d9fc156e246847f462c3a65219810722acfc51c2770c2959e6d5f14f527
                                          • Instruction Fuzzy Hash: 71E0E525E0310182DE48BB32889116A2350AB40720FC187B0C63D023F0CE2EA566AB10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _beginthreadex
                                          • String ID:
                                          • API String ID: 3014514943-0
                                          • Opcode ID: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                          • Instruction ID: 49dd3d49a0d5ba9306b0728a46b0034d8c557e5ef793d8329cc5658494c0b1aa
                                          • Opcode Fuzzy Hash: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                          • Instruction Fuzzy Hash: 03D0C263719A00429B109F72A840029E251B788770B884738AE7D827E0DB38D1514600
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ioctlsocket
                                          • String ID:
                                          • API String ID: 3577187118-0
                                          • Opcode ID: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                          • Instruction ID: c3f92cc9a41e34a2937b61ceec11165d345386a9a9e672f4100085b18ff66a1d
                                          • Opcode Fuzzy Hash: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                          • Instruction Fuzzy Hash: D3C08056F15581C6C3446F6258C5087A771BBC4304FD56439E10742134DD3CD2F5DB40
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000001,00007FF7A404901F), ref: 00007FF7A405E7A8
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: malloc
                                          • String ID:
                                          • API String ID: 2803490479-0
                                          • Opcode ID: 2776bca9db8f599c86e0e75b1e27d899bf5cee7a17272ec46874e0d708622458
                                          • Instruction ID: d6c2e9430c4f22ae2c29cc23421463559405cf320f43bc8911ae19c0af5b778d
                                          • Opcode Fuzzy Hash: 2776bca9db8f599c86e0e75b1e27d899bf5cee7a17272ec46874e0d708622458
                                          • Instruction Fuzzy Hash: 2611A532F0574182DBA09F0AB18013AA2A4FF58784F9A9474DE8D47764DF39D8A1D740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                          • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                          • API String ID: 3939785054-690044944
                                          • Opcode ID: 6a72cbcf9002a9611f75e853c7b872236e3054cd818c7053253f7cd7de46e710
                                          • Instruction ID: d7b1cfa0719133588f558bf87ba366d35300718fd81395447741958c0830b194
                                          • Opcode Fuzzy Hash: 6a72cbcf9002a9611f75e853c7b872236e3054cd818c7053253f7cd7de46e710
                                          • Instruction Fuzzy Hash: 94C2CA31B0A68254FB50AF2294843FAE791EB41B88F964075DE4E072B5DF7ED460E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                          • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                          • API String ID: 2059720140-3844637060
                                          • Opcode ID: 875491f4005b451058fe927c7443391be4a7a5e85f4c1cbb66cb3d2a8e153f6d
                                          • Instruction ID: 55b43c06c5630e91ff988f47547eee5b2acc75e9623405962e4ceb2088ca8d04
                                          • Opcode Fuzzy Hash: 875491f4005b451058fe927c7443391be4a7a5e85f4c1cbb66cb3d2a8e153f6d
                                          • Instruction Fuzzy Hash: 9872B561A0E74645FB60AF37D48037BA7A0EF45744F8681B5DA8D026F5DF2EE460E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 1664669839-85532522
                                          • Opcode ID: ff3d0cbacaad0d0a51ccb3e8a1d91a7be11594ec6d960498e764185c0d18bc74
                                          • Instruction ID: 341dd87f26cf86528f6163061273c9db497dcb8780aa8d62c42f5c488be0ac7d
                                          • Opcode Fuzzy Hash: ff3d0cbacaad0d0a51ccb3e8a1d91a7be11594ec6d960498e764185c0d18bc74
                                          • Instruction Fuzzy Hash: B0A20762A19B8585EB04EF79D5803AEB721FB417A4F810231DA5D03AF9DF7DE090E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                                          • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                          • API String ID: 1025660337-777782649
                                          • Opcode ID: 8a55c1367f9f1b37493b38b20e08c8f00cb3cc7d56f824a22a116fa89aaa5d26
                                          • Instruction ID: d5cd2c7d2af2ff2275a86ff145d0e8f5d33f3fa6af044ccd05ba8bd659bcedcd
                                          • Opcode Fuzzy Hash: 8a55c1367f9f1b37493b38b20e08c8f00cb3cc7d56f824a22a116fa89aaa5d26
                                          • Instruction Fuzzy Hash: 7112F931A0EA8285E764AF1694843BBB390FB44B84F864175DA4D037B5DF7EE450EF21
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                          • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                          • API String ID: 561913010-2037819326
                                          • Opcode ID: b935490779b87931a9e513bbba229981ddc6e9c0cf9a56c44816dddb722aa26a
                                          • Instruction ID: a53c2a022e2edd64e93c1e3ef2e69b7d574a55fd7ead577ec0f943e68795ea01
                                          • Opcode Fuzzy Hash: b935490779b87931a9e513bbba229981ddc6e9c0cf9a56c44816dddb722aa26a
                                          • Instruction Fuzzy Hash: 7642E631A0AB4281E750AF12E9802BBB3A0FB44B94F824975DD4D077B5DF3EE464E750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastcallocfreegetsockname
                                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                          • API String ID: 2454324209-2383553807
                                          • Opcode ID: 12ef779d79857dd5239e196e155c9adeaede13bad430a52f2bc5226f40d2d6dc
                                          • Instruction ID: 57c834f987bd8c5ee220f3d41e56a94d24fc20cce52a6a57c1b6636cd0a5a77e
                                          • Opcode Fuzzy Hash: 12ef779d79857dd5239e196e155c9adeaede13bad430a52f2bc5226f40d2d6dc
                                          • Instruction Fuzzy Hash: 0722E821B0AB8282EB50BF23D4902FBA361FB45784FC14471E94D87AB5DE3ED524E721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                          • API String ID: 2190258309-2223379150
                                          • Opcode ID: 0b6cf52c47150631772bc81d3bfdb2e581589b248867cb97e625afe64155396c
                                          • Instruction ID: 6bfd605da03142235d7e24012454a0efaa2ad2c300c763b8013b33b18b383ba6
                                          • Opcode Fuzzy Hash: 0b6cf52c47150631772bc81d3bfdb2e581589b248867cb97e625afe64155396c
                                          • Instruction Fuzzy Hash: 2612B232A0AB4189EB10EF22D5906BEB7A4FB54B85F920579DE4D03BB4DF39D424D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strncmp$memset
                                          • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                          • API String ID: 3268688168-2769131373
                                          • Opcode ID: ba6021dfe63c0eb7322e0f086e7d4a830a6e595fcc698d5c1d088dfa337a663a
                                          • Instruction ID: ce4a53f203a9189d5169644215ddd2131e7802f02f6aadfd6dcab310d7bd9117
                                          • Opcode Fuzzy Hash: ba6021dfe63c0eb7322e0f086e7d4a830a6e595fcc698d5c1d088dfa337a663a
                                          • Instruction Fuzzy Hash: 55E12A22E0A78285E750EF22E8802BBA760FB85784F829575EE4E03775DF3ED060D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-4282655970
                                          • Opcode ID: 40a713b8b59d1049f2dd071324f05e575ca4a88e1dc44f461c2b7a7c0fa936f8
                                          • Instruction ID: e46173858ad046ee48d096469ecce70760fe81a066dda5da4f77cfb9c8929a75
                                          • Opcode Fuzzy Hash: 40a713b8b59d1049f2dd071324f05e575ca4a88e1dc44f461c2b7a7c0fa936f8
                                          • Instruction Fuzzy Hash: 8281D221B0A64295FB55BF23989037BE290BF46794F864474CA1E023B1DFBEE460F721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 958247072-579821726
                                          • Opcode ID: 7d08be5014e241e1996b359722984978a2474af68dff6998a59ef9cca349c1e5
                                          • Instruction ID: c2abac8e4ee29a50c1394096b6ccb1d4969c1faccc45ff77bbcf05264954d113
                                          • Opcode Fuzzy Hash: 7d08be5014e241e1996b359722984978a2474af68dff6998a59ef9cca349c1e5
                                          • Instruction Fuzzy Hash: 9E32F362A09A8685EB14EF7AD5803EEB721FB44794F814231DA5D07AF9DF7DE090E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-1887299029
                                          • Opcode ID: 046ae9396b9c5381c5eb35e0e58779f46924a88e9e3f65756152692471b5be5a
                                          • Instruction ID: f12816b3e63e9da7131aaa9b1a72405b61cab3adfe1f1b8d035a58646104358a
                                          • Opcode Fuzzy Hash: 046ae9396b9c5381c5eb35e0e58779f46924a88e9e3f65756152692471b5be5a
                                          • Instruction Fuzzy Hash: D881D221B0A64295EB55BF23989037BE290BF46794F864574CA1E023B1DFBEE460E721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup$fclosefgetsfopen
                                          • String ID: $default$login$machine$password
                                          • API String ID: 431015889-155862542
                                          • Opcode ID: 0ed022ba8a74bbf71af03541a72ae3937eab05d30cd0acd12a11acf22a19280f
                                          • Instruction ID: 2495d9be760ac8e288f235025450c8a0525da1f923be548a0674979b849afd4d
                                          • Opcode Fuzzy Hash: 0ed022ba8a74bbf71af03541a72ae3937eab05d30cd0acd12a11acf22a19280f
                                          • Instruction Fuzzy Hash: B1A1E922A0F68245FA606F139A90377F6A0EF94745F8640B1DE4D067B6DE3EE460A770
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno
                                          • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                          • API String ID: 3939687465-1752685260
                                          • Opcode ID: 25adad5ac7b8ccfe19bb9cb406b551687a5dcdd2bcf657889b2ccb51d25d1618
                                          • Instruction ID: 3ca44456c326562852ea9c31773e149082370f576624c6fdcd6425db175509fb
                                          • Opcode Fuzzy Hash: 25adad5ac7b8ccfe19bb9cb406b551687a5dcdd2bcf657889b2ccb51d25d1618
                                          • Instruction Fuzzy Hash: 8651CB25A0E68289F760AF22A8D03BBB750FF44784FC144B9D94D026B6CF3DE524E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _errno$strtol
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                          • API String ID: 3596500743-988243589
                                          • Opcode ID: a27ae542bc9c7f338d1e45ad8eab28fe8a94b20ee21e0465aef1e32ec5bb0263
                                          • Instruction ID: 5b3a97dd7d807e6c6e120818a1600b5f23a1baf4e16d4494aec7b71bc9c242c5
                                          • Opcode Fuzzy Hash: a27ae542bc9c7f338d1e45ad8eab28fe8a94b20ee21e0465aef1e32ec5bb0263
                                          • Instruction Fuzzy Hash: 28F13373F1A5029AEB24AF2688801BFB3A1AB44358F910275DE1E537F4DFBDE4219351
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                          • API String ID: 0-2774518510
                                          • Opcode ID: 4278448de5e25e7ecdc0f5521d108953abca0f41ef069b5eaf54d66151aaa72b
                                          • Instruction ID: 8459d5f043860e0f585131a3a90e3ab6f6ee67c5b5ec857f238c0a6149970f83
                                          • Opcode Fuzzy Hash: 4278448de5e25e7ecdc0f5521d108953abca0f41ef069b5eaf54d66151aaa72b
                                          • Instruction Fuzzy Hash: DF422E25E0E7C245EB55AE2780803BBB7A1EB51744F8680B5CB5E4B1B1DF3E9470E722
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                          • String ID: @
                                          • API String ID: 3606780921-2766056989
                                          • Opcode ID: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                          • Instruction ID: fc330d60f1109662b99fde5f4766bf51e200a13f5b00d345d98570b6049fdea9
                                          • Opcode Fuzzy Hash: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                          • Instruction Fuzzy Hash: 5821953261A68196E760DF22E89166BB360FBC5B84F815135FB8E03A39CF3DD455DB10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                          • String ID:
                                          • API String ID: 313767242-0
                                          • Opcode ID: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                          • Instruction ID: 8e5fab139f04fbe010cef842a49588b6317d6f032625f0769fdf21e343b3edf7
                                          • Opcode Fuzzy Hash: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                          • Instruction Fuzzy Hash: 48318972606B8189EB609FA1E8807EEB360FB94744F41443AEB4D47775DF39D158C720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                          • String ID: @
                                          • API String ID: 3016261861-2766056989
                                          • Opcode ID: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                          • Instruction ID: 213c8a74724ddefd825963c11391ba7216ab9ba27df9564c3fc51899a239d641
                                          • Opcode Fuzzy Hash: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                          • Instruction Fuzzy Hash: 4441B022B056908EF7109F76D8913EE7BB1FB46348F444465DE8813A6ACB3DC12AE750
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF7A406CED8,?,?,?,?,?,?,00007FF7A408411E), ref: 00007FF7A406CF56
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF7A406CED8,?,?,?,?,?,?,00007FF7A408411E), ref: 00007FF7A406D0BD
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A406D21C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                          • API String ID: 3985033223-3943651191
                                          • Opcode ID: 48636ec374e8a814b59a9f980e5bf74f894227fdcbfd8e1e5b2cfb21ca3e5cc0
                                          • Instruction ID: b3ace4d8719328f79b13d1550e322486fa4111d35663ad68aef86865e3ad76f2
                                          • Opcode Fuzzy Hash: 48636ec374e8a814b59a9f980e5bf74f894227fdcbfd8e1e5b2cfb21ca3e5cc0
                                          • Instruction Fuzzy Hash: 079137326096C185E720AF26A4403BBFBA0EB85790F894271DAAE477F6CF7ED011D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: calloc$ErrorLastbind
                                          • String ID: bind() failed; %s
                                          • API String ID: 2604820300-1141498939
                                          • Opcode ID: 5b999fcd4ad9b612eaa9be729eecbec0961fea4b134fd6518c06109505d39a49
                                          • Instruction ID: 23d00dee3826a62783504a0262e934b2a8233058049a54ae8ae427b66767da35
                                          • Opcode Fuzzy Hash: 5b999fcd4ad9b612eaa9be729eecbec0961fea4b134fd6518c06109505d39a49
                                          • Instruction Fuzzy Hash: D2510662B09B818AFB14AF22D4903FA67A0FB04B44F454475CF4C473A1DF3EE4619B51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                          • API String ID: 0-1379995092
                                          • Opcode ID: 6fe4d5b75646ab6122b07eb1061459e9abcdc209cb5e48310bfdb0b9ebada0bf
                                          • Instruction ID: f87f16777954a30d8aa5e841c6b6c7af71015c749264ea03ac46246a3cdf5c44
                                          • Opcode Fuzzy Hash: 6fe4d5b75646ab6122b07eb1061459e9abcdc209cb5e48310bfdb0b9ebada0bf
                                          • Instruction Fuzzy Hash: 34426A3290A98345E7246E1A958037BE790FF40794FC28270DE9E476F4DF7ED861AB21
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                          • String ID:
                                          • API String ID: 2933794660-0
                                          • Opcode ID: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                          • Instruction ID: b041266e0775dd18635cae403ccebb1f28d855c71bf7d980a664200767d5f9c0
                                          • Opcode Fuzzy Hash: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                          • Instruction Fuzzy Hash: D2114C22B16B0189EB00DF61EC842A973B4F758758F850E35EA6D827B5DF38D1649350
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _getpidhtons
                                          • String ID:
                                          • API String ID: 3416910171-0
                                          • Opcode ID: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                          • Instruction ID: a02ad41b9e1c8d393d1eea36a22ce1737bf5ca9ce2f41fb585d3caeddc077ec2
                                          • Opcode Fuzzy Hash: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                          • Instruction Fuzzy Hash: 37113026A247D0CAD304CF35E5401AD7770FB5CB84B44962AFB9987B29EB78D690C744
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@
                                          • String ID:
                                          • API String ID: 1029415015-0
                                          • Opcode ID: 4d63e86f281f0f8040124130d05909f5cac1b0fcea5ece721468537f7454344d
                                          • Instruction ID: 2d60ffad8201aa108154043a3e6d8264d456d24fe99c59063ac714496f505ad8
                                          • Opcode Fuzzy Hash: 4d63e86f281f0f8040124130d05909f5cac1b0fcea5ece721468537f7454344d
                                          • Instruction Fuzzy Hash: D581DD22B0AB9988EB04DF6AD4C03AD7B70EB15B88F954062DF4D077A5DF3AE090D350
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                          • Instruction ID: e6c3990c77fb2b4c1defcb1eacfd2f2f66773c8ef366d9a5daff3c1c9f0a0d94
                                          • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                          • Instruction Fuzzy Hash: C6611462A0AB8442DB14DF2AE58027AA661FB597D4F528231DE5D47BA8EF3EF4509300
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                          • Instruction ID: ffa2c7bec823cd2073079c2b8440b7982804365f52e1bbce5bd6bd55328bdb1f
                                          • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                          • Instruction Fuzzy Hash: 7E41B63371154487E78CCE3AC865AAE73A2F3D8304F85C23DDA0AC7395DA369905CB40
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction ID: aad8330729fcc673a4934e9f33aafd8724422ee92569e41d0fa28db8fca3fc34
                                          • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction Fuzzy Hash: 9DF08C25325767BEFE00893B4624FBD6E419BC0B41FA368B58C80020CB869F54A3D714
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                          • Instruction ID: 04c5ed6155a2b366dafe29c36da2bc49da4c265284498db0318d8dba951c8ad1
                                          • Opcode Fuzzy Hash: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                          • Instruction Fuzzy Hash: B0A00121A1B80294EA04AF82AD90026A2A1ABA0700B8614B5E54D450769F3EA520E260
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strcmp$strncpy$strchr
                                          • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                          • API String ID: 1395212091-3550120021
                                          • Opcode ID: 6446a3e7d0d39adb556c5438fee0a6bd7db61fdde8ef19c9152e9fb084ef710b
                                          • Instruction ID: 503dd385f86df625df18f2d8629f08058040294f0a72c803ca16596b9cba2b9d
                                          • Opcode Fuzzy Hash: 6446a3e7d0d39adb556c5438fee0a6bd7db61fdde8ef19c9152e9fb084ef710b
                                          • Instruction Fuzzy Hash: 57023B10B1A517A1FA10BF56DCC11BBD264AF11348FC250B2F80E865BAEF9FE525B721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$CounterPerformanceQuery
                                          • String ID: Closing connection %ld
                                          • API String ID: 3490100708-2599090834
                                          • Opcode ID: 080af9e2ca16cfd9b857ae429070580705c104ca6000b78338abac87a5f3054c
                                          • Instruction ID: 615bb35b10727e4132706477645c2c07544f394287ddd0272013bc1d2195f983
                                          • Opcode Fuzzy Hash: 080af9e2ca16cfd9b857ae429070580705c104ca6000b78338abac87a5f3054c
                                          • Instruction Fuzzy Hash: 50C18076609B8182E740AF22E4802AE7334FB84F98F494671DE9D07779CF3A9165D331
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                          • API String ID: 1294909896-2200874227
                                          • Opcode ID: a4c82bcc725e61103f523d7bac1625522059787e4daccbbb1ad99cbdf31118d3
                                          • Instruction ID: 018ce5de61d9cc996af9eb7be3d0958cc6bd836c45844c631137e7e5ce855ed8
                                          • Opcode Fuzzy Hash: a4c82bcc725e61103f523d7bac1625522059787e4daccbbb1ad99cbdf31118d3
                                          • Instruction Fuzzy Hash: 41028421A0EB4282EA50AF12A8803BBE790FB447C4F864075DE4D47275DF3DF565E761
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree$strpbrk
                                          • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                          • API String ID: 2737852498-2994854565
                                          • Opcode ID: 49e5a8093cbab499398c211c2167271c9e8bd267777574003e8ceb441dc91b87
                                          • Instruction ID: 4fa89bedf91e835c3fe95a1eccf516113c0dbe2c2a6b58055318955b603740a6
                                          • Opcode Fuzzy Hash: 49e5a8093cbab499398c211c2167271c9e8bd267777574003e8ceb441dc91b87
                                          • Instruction Fuzzy Hash: 13D1DA11B0AB5285EA10FF2394806BAA3A0BF55B84FC645B1DD4D0B7B1EF3DE425E721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy$htonl
                                          • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                          • API String ID: 82385936-242323837
                                          • Opcode ID: 70d35f79a67b94333284927e9e998538639b5e22fc3dda229c8068922391dd39
                                          • Instruction ID: 0ee4b08a77685efc61cc57980992134ee591f05b966bab045a904ee4e5f8a500
                                          • Opcode Fuzzy Hash: 70d35f79a67b94333284927e9e998538639b5e22fc3dda229c8068922391dd39
                                          • Instruction Fuzzy Hash: 18C16D32B09A428AE750AF66E8806AEB7B0FB44B84F914475DE4D47B74CF3DE414E760
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: ff93a7ff90db5c03afc919c651086042200295bbab4818e17e53cf2dce08d76c
                                          • Instruction ID: 7b1f1ba8c0b3d74dfceaf332d98d3f916f749bc6838b5b9873c92282722db6c3
                                          • Opcode Fuzzy Hash: ff93a7ff90db5c03afc919c651086042200295bbab4818e17e53cf2dce08d76c
                                          • Instruction Fuzzy Hash: 44710976649B8185D740AF22E4D07BD73B8FB84F89F590971CE9D4A238CF399065E231
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 1391767211-579821726
                                          • Opcode ID: 53764ca374fa5be4f36d8b293ee585c78b8cceb808cd4e95475ab6e87e17874e
                                          • Instruction ID: 8cc288d32ac4068bac13c32a20881c13882e183ca72b66d23330447d7a23da5d
                                          • Opcode Fuzzy Hash: 53764ca374fa5be4f36d8b293ee585c78b8cceb808cd4e95475ab6e87e17874e
                                          • Instruction Fuzzy Hash: 19221722A19B8585EB14DF7AD9803AE7721FB457A4F810271DA9D07AF6DF3DE090E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: calloc$_strdupfreehtonsmemset
                                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                          • API String ID: 130798683-4053692942
                                          • Opcode ID: 4da9d9f1cbb209fe43fb6dcd8b467026ebfaf9e3e059f8631a373749ab627460
                                          • Instruction ID: a902e6092b855f421f2d28200a12089531ea167511c56580a389ecfcd810a213
                                          • Opcode Fuzzy Hash: 4da9d9f1cbb209fe43fb6dcd8b467026ebfaf9e3e059f8631a373749ab627460
                                          • Instruction Fuzzy Hash: 27E1D632A0A68286E760AF12D5803BFB760FB84B84F864171DA8D07775DF3EE564D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 1346393832-579821726
                                          • Opcode ID: 0dadecece245a67f675a5d2e96cc5f0bc4a0f7ec8ea6dd8922b7aa2d9f5add5a
                                          • Instruction ID: 7908f8aa8eccbbfa4094366435022a14dba6578c4c4249d6add3607d2abe7973
                                          • Opcode Fuzzy Hash: 0dadecece245a67f675a5d2e96cc5f0bc4a0f7ec8ea6dd8922b7aa2d9f5add5a
                                          • Instruction Fuzzy Hash: 2C120662A19B8585EB04EF7AD5843AEB721EB417A4F810771DA5C03AF9DF7DE090E310
                                          APIs
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E4A6
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E4CC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E4DD
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E54B
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E57C
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E59C
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E5AE
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E610
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E681
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E698
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E753
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E7C7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7A407DBDF), ref: 00007FF7A407E7D0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$free$_strdupcalloc
                                          • String ID: LDAP$base$one$onetree$sub$subtree
                                          • API String ID: 112326314-884163498
                                          • Opcode ID: 5b60497df80a076f26ec4b03495979baa124a4041d4c6624708c24347fefd159
                                          • Instruction ID: 0dba61d3b29f44589b9f64f3a72265dbd1332f428d03834fbe57b315d332814e
                                          • Opcode Fuzzy Hash: 5b60497df80a076f26ec4b03495979baa124a4041d4c6624708c24347fefd159
                                          • Instruction Fuzzy Hash: DDB1E922A0BB8282FA91AF16949067BA390FF44784FC64471DE4D077B1EF3DE421DB61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memchrstrtol
                                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                          • API String ID: 1626215102-895336422
                                          • Opcode ID: d5aa77bd481b7722d0f735f1f26a1f6737cc15dd079a17b9800053efdba2dedf
                                          • Instruction ID: 791937cc7dad7847b985330dee0127ff7e52334e803f79d4c4f0ca9d07e9e854
                                          • Opcode Fuzzy Hash: d5aa77bd481b7722d0f735f1f26a1f6737cc15dd079a17b9800053efdba2dedf
                                          • Instruction Fuzzy Hash: 9361C260A0EA4291FA14AF13A8842BBA750BF40790FC38671DD1E476F1DF3ED126E721
                                          APIs
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046067
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046073
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C9A4
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C9AC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C9D3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C9DC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404CA60
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404CA69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                          • API String ID: 1294909896-1595554923
                                          • Opcode ID: b9bc93528b88626dfd995c68e28a706383ab7ecc8f2ad09ecd60a740e55feb49
                                          • Instruction ID: f7f797d1421b33ecfcd6ea5e93b90207930a11f7c32017f8ae5dd50d139aeea1
                                          • Opcode Fuzzy Hash: b9bc93528b88626dfd995c68e28a706383ab7ecc8f2ad09ecd60a740e55feb49
                                          • Instruction Fuzzy Hash: F5E18522B0E642D1FA65AF139580276A790BB00B84FCB44B5DE4D47671DF3EE974A360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                          • API String ID: 1294909896-115817326
                                          • Opcode ID: bf748c0bfe573282f24827a6f623e2d7589755981eeb7209e45fd191d81c4a99
                                          • Instruction ID: 8f5bfc4181e9b25034656c9f23c2fa406fd93f4043087024f8e8907f7cfc2e8e
                                          • Opcode Fuzzy Hash: bf748c0bfe573282f24827a6f623e2d7589755981eeb7209e45fd191d81c4a99
                                          • Instruction Fuzzy Hash: 5991A721B0E65391FA10AF12A58037BE7A4EF04784FA641B1DA5D473B1EF6EE421E361
                                          APIs
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                          • memcpy.VCRUNTIME140 ref: 00007FF7A4036496
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7A4036528
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7A4036569
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40366B3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40366F2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4036740
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4036781
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40367DE
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4036898
                                            • Part of subcall function 00007FF7A408FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7A40343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A408FB32
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40368D9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40369A6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40369E7
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A4036A0A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                          • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                          • API String ID: 264867259-3075834232
                                          • Opcode ID: 5e328f9cc9d509dbc5f0c620a2ea8f70044036c914e68ed5f3d7a5609f240f6d
                                          • Instruction ID: 32a22cbfba5b5f8cdec72a57be95325714e73365eecccb4369186068f17c0b1b
                                          • Opcode Fuzzy Hash: 5e328f9cc9d509dbc5f0c620a2ea8f70044036c914e68ed5f3d7a5609f240f6d
                                          • Instruction Fuzzy Hash: A4121862F09A4245EB24EF26E58036EA761EB447E4F814770DA6D03AF9DF7DE094E310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                          • String ID:
                                          • API String ID: 1087521380-0
                                          • Opcode ID: c54aa30acb8f7759c872955e7afee6932479ba7e1a429da66d45e5394a038d2b
                                          • Instruction ID: dd00ed7fb537a4dffb3f36495f83bf047231e8fe6fcc69fbfe6005ceab071db8
                                          • Opcode Fuzzy Hash: c54aa30acb8f7759c872955e7afee6932479ba7e1a429da66d45e5394a038d2b
                                          • Instruction Fuzzy Hash: 7BB1B612A0B74245EE55AF27559437AA7A0AF44B94F8905B4CE4D037F0DF6DE4A0EB30
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                          • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                          • API String ID: 1094891576-1753329177
                                          • Opcode ID: cdf8c0cb6e217632b26f767d22fc60d678b1afa39e111239682b6c2d268fb68e
                                          • Instruction ID: aa6ccb067aaece2406003d23fc51ffc463dd5e4dab2000a1b7a4ed46c8855d64
                                          • Opcode Fuzzy Hash: cdf8c0cb6e217632b26f767d22fc60d678b1afa39e111239682b6c2d268fb68e
                                          • Instruction Fuzzy Hash: 02D1E232A0A68684EB20AF32D4843FBA760FB40798F868571DA5D076F5DF3EE411D361
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                          • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                          • API String ID: 3103143820-2414412286
                                          • Opcode ID: a36134f17173d3b68bf390f24a32a1e2c938ac05ee6e864fa08eba1b0f79a6e0
                                          • Instruction ID: b7afc1588bd6eea3b7e8b6e8d644af62501774154773f4ee8fc4370f9eb3f2bb
                                          • Opcode Fuzzy Hash: a36134f17173d3b68bf390f24a32a1e2c938ac05ee6e864fa08eba1b0f79a6e0
                                          • Instruction Fuzzy Hash: 36D1BA22B09A8252EA54EF22E4C06BBE3A0FB45794F954071DB4D03675DF3DE570EB12
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                          • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                          • API String ID: 2243338858-131330169
                                          • Opcode ID: a534b1e47e6b89b57045d23a567eff78843472f2b3767f7a7f203d093dd9f04f
                                          • Instruction ID: 9fa00fdaf2c712003e82a912ffdcfb13f30bc1202705aa451d10ced85dfc8c46
                                          • Opcode Fuzzy Hash: a534b1e47e6b89b57045d23a567eff78843472f2b3767f7a7f203d093dd9f04f
                                          • Instruction Fuzzy Hash: 8191E622B0EB8292FA54AF26948437BB3A0FB45780F854075DA4D137B5DF3ED464DB22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                          • API String ID: 0-3760664348
                                          • Opcode ID: ba7ac1c59c272a734a09856cab2d48d876e589ad64bd29fff285cd490e7639ef
                                          • Instruction ID: 3ab20a6f580e8be1455391fdf4c6c7b5e1465cf929bc39c07d5850249174546b
                                          • Opcode Fuzzy Hash: ba7ac1c59c272a734a09856cab2d48d876e589ad64bd29fff285cd490e7639ef
                                          • Instruction Fuzzy Hash: 88E11262A0E28199E754AF26D48037BFB91EB45784F858076DA4E073B5CF7EE060D721
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40355DE
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403560C
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403561A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4035654
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40356A5
                                          • memset.VCRUNTIME140 ref: 00007FF7A40354D3
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                            • Part of subcall function 00007FF7A4036320: memcpy.VCRUNTIME140 ref: 00007FF7A4036496
                                            • Part of subcall function 00007FF7A4031FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032131
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4035812
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403583E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403584C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4035887
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40358DA
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40359C1
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7A40359D9
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7A40359E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                          • String ID: value
                                          • API String ID: 2102519606-494360628
                                          • Opcode ID: 85c86dc14542eb07a4e2cce666541bb6ed81f2a7a3d6649cdfb2e986ccf9b187
                                          • Instruction ID: d96038022e48fd8f8a098d77ad91abd6c3ce1b33bf9bb1c58537469fc004be8f
                                          • Opcode Fuzzy Hash: 85c86dc14542eb07a4e2cce666541bb6ed81f2a7a3d6649cdfb2e986ccf9b187
                                          • Instruction Fuzzy Hash: 23F12B22A0978185EB14DF35D5C43AEAB60FB457A4F414671EAAD03AF9CF3DE095D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup
                                          • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                          • API String ID: 1922034842-2519073162
                                          • Opcode ID: f678b0adb032897e825a3959cded84015825f3098b179514a4a53f8d0ccb62c7
                                          • Instruction ID: 439e31faf036b423c398fc3fef5f8ac0993a0c861014cc45ebc7baa1ee20db51
                                          • Opcode Fuzzy Hash: f678b0adb032897e825a3959cded84015825f3098b179514a4a53f8d0ccb62c7
                                          • Instruction Fuzzy Hash: 6A91C821B0A64259FB61BE139490377E690AF007C4FC640B5DE4E476B5EEAEE521E322
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7A408063F), ref: 00007FF7A408D93D
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF7A408063F), ref: 00007FF7A408D95F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7A408063F), ref: 00007FF7A408D970
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7A408063F), ref: 00007FF7A408D99E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: ../$/..$/../$/./
                                          • API String ID: 111713529-456519384
                                          • Opcode ID: 857da92cb3a3f1754f39fc764212752e7e357566b0f0400f53a9762f759e9239
                                          • Instruction ID: f137f9c2c97b16ba54e0f8cdc0e286f10f62a25370b6520b9c76d748494ccd9f
                                          • Opcode Fuzzy Hash: 857da92cb3a3f1754f39fc764212752e7e357566b0f0400f53a9762f759e9239
                                          • Instruction Fuzzy Hash: 1071FF21E0E58285FB616F12969027BFBE0EF517A1F8542B1CA9D036B1DE2DE471E330
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4042471,?,?,?,?,00007FF7A40335A1), ref: 00007FF7A40521D8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4052221
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: callocfree
                                          • String ID: <$<$<$`$v
                                          • API String ID: 306872129-2056843887
                                          • Opcode ID: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                          • Instruction ID: b7a4af26af4046b49d05858d6714562558c352a424d87dedd6299ee1f083ef43
                                          • Opcode Fuzzy Hash: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                          • Instruction Fuzzy Hash: E3917B32909BC186E3009F35D4443E977A0FB95B5CF495238DF981B3AADF7AA095D720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID:
                                          • API String ID: 2653869212-0
                                          • Opcode ID: 306aad4d0ea3c6bfe9c064be411fbf8ea1d668f028eb4b2160ad37fce30746d2
                                          • Instruction ID: f8e9f6843f8aefbe0d90e5971d23e3ed3a8db779cfa9a825ac3bf45d0434500e
                                          • Opcode Fuzzy Hash: 306aad4d0ea3c6bfe9c064be411fbf8ea1d668f028eb4b2160ad37fce30746d2
                                          • Instruction Fuzzy Hash: 08B17E32A0AB458AEA55AF26E58437EB3A0FB44B44F854575CB8E43770DF39E070E321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                          • API String ID: 111713529-3006446216
                                          • Opcode ID: 200754a7ecd74751d0d0f218d2af814f9b8d9ce5487ad7d3185f1178ac2759fe
                                          • Instruction ID: 4d1d06880184fbb465c65e8e8901d7ab972d63820361750a961dd66d75596cf5
                                          • Opcode Fuzzy Hash: 200754a7ecd74751d0d0f218d2af814f9b8d9ce5487ad7d3185f1178ac2759fe
                                          • Instruction Fuzzy Hash: A671CA93A0E7C145F711AF2694842BBFBA1EF85749F9A44B2CA4D033B2DE2ED055D321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                          • API String ID: 2190258309-1086287758
                                          • Opcode ID: 1779b8da94a52f304d77eab76b8d7191a6ca75d21197fcb052c39a47429940b3
                                          • Instruction ID: 65d8e6a1367b22189751cd7e5b93c70a8bff59a07a457f01c788bb7564d3d475
                                          • Opcode Fuzzy Hash: 1779b8da94a52f304d77eab76b8d7191a6ca75d21197fcb052c39a47429940b3
                                          • Instruction Fuzzy Hash: 5CB18332B0AB468AEB10AF22E5802AEB7A0FB44B94F910575DE4D43B74DF3DD564D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                          • API String ID: 1294909896-1220118048
                                          • Opcode ID: 1d1110436c56714bc0a77362081bcd18c01486656a23b9c45d484ea6f6e93efa
                                          • Instruction ID: 627efacb42feca5b07febc28d57fb14113db83aa9d4bfdfef1e2874a7a25889a
                                          • Opcode Fuzzy Hash: 1d1110436c56714bc0a77362081bcd18c01486656a23b9c45d484ea6f6e93efa
                                          • Instruction Fuzzy Hash: 03716461A0A74651EA14BF6396801FBA350FB89780FC540B2EE4D037BAEF3ED521D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloctolower
                                          • String ID: %%%02x
                                          • API String ID: 1244608590-4020994737
                                          • Opcode ID: b8f44fdf09287624069804cbfaa0b43cc3d274ce18ca51c3b5f051757dda9693
                                          • Instruction ID: 914e9edb64d8149e657ca131ab65573becd0b910b65120157dcae28d098f2abc
                                          • Opcode Fuzzy Hash: b8f44fdf09287624069804cbfaa0b43cc3d274ce18ca51c3b5f051757dda9693
                                          • Instruction Fuzzy Hash: F4A1DB52A0EA8245EB616F33559037BBBD0BF05784F8A44B1DD8D062F2DE2EE414E732
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID:
                                          • API String ID: 111713529-0
                                          • Opcode ID: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                          • Instruction ID: c858d806e1b18d6444daae53d6571a2e94a78e6c4c3e6e63a86ca3e1d06a6e07
                                          • Opcode Fuzzy Hash: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                          • Instruction Fuzzy Hash: 30619176B06B4182E725DF16A48466AB3A0FB48B80B864575CF4E43B70EF7DE464D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                          • API String ID: 1294909896-2312071747
                                          • Opcode ID: 21c751e9b2b13f4c4e8684717d5abce3fd5f37e63914cf2bb64e56457c2a437a
                                          • Instruction ID: c96d042ff7e9b5fba9cbd3b5ae3e3698142687daaafec22eb91bc729d8bc1ce9
                                          • Opcode Fuzzy Hash: 21c751e9b2b13f4c4e8684717d5abce3fd5f37e63914cf2bb64e56457c2a437a
                                          • Instruction Fuzzy Hash: D0D1EC21A0EB8249EA64BF2395803BBE250FB40754FC14675DA6D036F1DF3EA475E722
                                          APIs
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                            • Part of subcall function 00007FF7A4036320: memcpy.VCRUNTIME140 ref: 00007FF7A4036496
                                            • Part of subcall function 00007FF7A4031FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032131
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403A861
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403A88F
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403A89D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403A8D7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403A934
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403A9ED
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403AA1B
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7A403AA29
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403AA63
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403AAB4
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A403AAFE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                          • String ID: value
                                          • API String ID: 3212548336-494360628
                                          • Opcode ID: 3a6df990b5da4fd9237ac89baa1238f9e86b9bdc232acfe0d6c5be0c13518a52
                                          • Instruction ID: b93e725ebe175991d36f2e16b360b499b6e663fc812fd8d9d01827e7975705f7
                                          • Opcode Fuzzy Hash: 3a6df990b5da4fd9237ac89baa1238f9e86b9bdc232acfe0d6c5be0c13518a52
                                          • Instruction Fuzzy Hash: 61A1F722A19A8185FB04DF75E5843AE7721FB413A4F810731EA6C02AF9CF7DE091E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                          • String ID: Unknown error %d (%#x)
                                          • API String ID: 4262108436-2414550090
                                          • Opcode ID: 70ac6fc894958f091a176e274659f3c0b84131676b378976f3925d20ef354e43
                                          • Instruction ID: 82c2ba1ad3df2ead337838d0563f92f9e2b63930007019be194c712a15280980
                                          • Opcode Fuzzy Hash: 70ac6fc894958f091a176e274659f3c0b84131676b378976f3925d20ef354e43
                                          • Instruction Fuzzy Hash: B331B52570A34289EA157F23685027AE751AF84BC0FC604B9DA4E077B6DF3EE421A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$calloc$malloc
                                          • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                          • API String ID: 3103867982-1477229593
                                          • Opcode ID: 9abc1dd8dd0e32e615b50650f2bfac574f46aaa96820c5a7c7ab5d149deeb8e1
                                          • Instruction ID: 6578a2723d03d67f71b9e17a22024f38005b138230b1d294edf564295bdd4e90
                                          • Opcode Fuzzy Hash: 9abc1dd8dd0e32e615b50650f2bfac574f46aaa96820c5a7c7ab5d149deeb8e1
                                          • Instruction Fuzzy Hash: FBC18E72A06B41C6EB10EF26E4902AEB7A5FB44B88F810076DE4D87778DF39D464D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                          • API String ID: 2190258309-1457932261
                                          • Opcode ID: d5c1120f4bc75899f32dbe632d47590707ac1fe0258b511d562e32d4e462238a
                                          • Instruction ID: 5ac96b3100d21701bcf637f8eea286619f9154c34b0717631e6f475839939567
                                          • Opcode Fuzzy Hash: d5c1120f4bc75899f32dbe632d47590707ac1fe0258b511d562e32d4e462238a
                                          • Instruction Fuzzy Hash: A061DF22A0A78284EB11AF2299843FBB790FB44794F8545B1DD4D073B9EF3EE164D320
                                          APIs
                                          • memset.VCRUNTIME140 ref: 00007FF7A407A69B
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A407A7C5
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046067
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046073
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A407A77F
                                            • Part of subcall function 00007FF7A4045FA0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A4045FB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freestrncpy$_strdupmemset
                                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                          • API String ID: 3826632026-748038847
                                          • Opcode ID: d2f07001c2f69f4ee10fc8dac9839346342ada0b1b8db9734aab457d2f6b462d
                                          • Instruction ID: 859fcc4dcb479eba80be375bacf56175cd5667ae6416d1850c91b0f5fdad91b4
                                          • Opcode Fuzzy Hash: d2f07001c2f69f4ee10fc8dac9839346342ada0b1b8db9734aab457d2f6b462d
                                          • Instruction Fuzzy Hash: 37718D31A0EAC280FB20AF16D4816FAA360FB84784FC64072DA4C47275EF7ED165DB61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                          • API String ID: 1294909896-3837278924
                                          • Opcode ID: 65c2ac1c1737b22f8914ba6aff2be67b8ef5a4c7b7b142e748a2b3bbf6257687
                                          • Instruction ID: f41ec88603efc0290277e439b1f4a566e240232773c47ae7567b241eec3ab155
                                          • Opcode Fuzzy Hash: 65c2ac1c1737b22f8914ba6aff2be67b8ef5a4c7b7b142e748a2b3bbf6257687
                                          • Instruction Fuzzy Hash: 25D1C062609A8281EB10DF25D0803BABB61FB85B88FC68172DA4D073B5DF3ED116D721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: sendto$ErrorLast
                                          • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                          • API String ID: 4042023021-4197595102
                                          • Opcode ID: c6839c84e6b9a63ec9843bc45f807c9d82cf459fa3db2870afdf0a6d5b62c1db
                                          • Instruction ID: 6b9772efa4b90da2015ba2bdb0027b4794da849c6f252fbd49e5ef28682029ef
                                          • Opcode Fuzzy Hash: c6839c84e6b9a63ec9843bc45f807c9d82cf459fa3db2870afdf0a6d5b62c1db
                                          • Instruction Fuzzy Hash: 86B1C172609A82C6E7519F26D4803BA77A0FB88F88F854076DE4D4B778DF3AD411DB21
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                          • API String ID: 1802528911-931584821
                                          • Opcode ID: d56252f6b80ea051241c5109bd59262046ebf78b474f7167e0eae9e28f2b2d3a
                                          • Instruction ID: 7a5dc60dc11fa141f89eff4aaeba57958280391c3f0d1afca0d17166cb166a80
                                          • Opcode Fuzzy Hash: d56252f6b80ea051241c5109bd59262046ebf78b474f7167e0eae9e28f2b2d3a
                                          • Instruction Fuzzy Hash: 5691C032A09AC185F721AF15E8847EAA3B0FB44768F850231EE8C07BA5DF3ED155D750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup$freestrchrstrncmpstrtol
                                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                          • API String ID: 2070079882-2404041592
                                          • Opcode ID: 0d3683d8005d69ee5ffb3116067f3daafc3a7abd7e6190d03c1856025e8e0299
                                          • Instruction ID: bcc93e21bc2b80620b8dc675a24c7d14cf48cb135ce588bbe2c5bb12e93a9530
                                          • Opcode Fuzzy Hash: 0d3683d8005d69ee5ffb3116067f3daafc3a7abd7e6190d03c1856025e8e0299
                                          • Instruction Fuzzy Hash: CE513A11E4A6C645FB11AF1798903BBA7D0DF01784FDA80B1DE4D062F1DE2ED465E721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                          • String ID: Set-Cookie:$none
                                          • API String ID: 4109794434-3629594122
                                          • Opcode ID: 913f7715d8d12d44a7185297608bd26f8fbfa3b0ccd1ff80d61ee16f17f028ee
                                          • Instruction ID: 003e57ca6c2efe41661142ba681af39d8533338b46d370043fcb9aa8d9f73c46
                                          • Opcode Fuzzy Hash: 913f7715d8d12d44a7185297608bd26f8fbfa3b0ccd1ff80d61ee16f17f028ee
                                          • Instruction Fuzzy Hash: 8B51F921A0F78241FA54BF23589027BE690FF45790F9544B8DD8E067B1DF6EE4A2A720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                          • API String ID: 3510742995-1652449680
                                          • Opcode ID: 4771c451f9aa9f06f84511dd60e3dffbe4946d72cc0a08215ffcad3856c162cd
                                          • Instruction ID: 3764c069a4affffb2d9cabfa1b33a0ebae9765bd70a6219700a96b83cac5f900
                                          • Opcode Fuzzy Hash: 4771c451f9aa9f06f84511dd60e3dffbe4946d72cc0a08215ffcad3856c162cd
                                          • Instruction Fuzzy Hash: 9AA1B631A0EA82C1E750EF22D8943BBA350EB44B94F865471DE1D4B2B5EF3ED561E321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                          • API String ID: 1294909896-3146291949
                                          • Opcode ID: 8eba24e530ea5caf0d5228b31d68a2a44e2efc3ce809489f896ec9afce8c4c99
                                          • Instruction ID: cd35f65dae3a394b702ca5064f453a994514ed224ddf5b8bf95e472b1240f869
                                          • Opcode Fuzzy Hash: 8eba24e530ea5caf0d5228b31d68a2a44e2efc3ce809489f896ec9afce8c4c99
                                          • Instruction Fuzzy Hash: 7491CD21B0E75251FA94BF2794C437BE290EF44784F864071EE4E072B1DFADE460A3A2
                                          APIs
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055E94
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EAA
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EBE
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055ED2
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EE6
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EFA
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055F0E
                                            • Part of subcall function 00007FF7A4055E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055F22
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4054F22
                                            • Part of subcall function 00007FF7A407EE50: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE65
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE7F
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE9A
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EEB6
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EED2
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EEEA
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF02
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF1A
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF32
                                            • Part of subcall function 00007FF7A407EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF4A
                                            • Part of subcall function 00007FF7A407EE50: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF64
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A4055126
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A4055169
                                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7A40552AE
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7A405532B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup$free$callocstrtoul
                                          • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                          • API String ID: 954404409-4150109901
                                          • Opcode ID: 6758a42c2f5dc663757ed3170074909e8fe14141e5650ad0774a33f90f12d84c
                                          • Instruction ID: 4fd075b891a29ab1670f1740686dccc8e21ee17c06f523e56115353141b02158
                                          • Opcode Fuzzy Hash: 6758a42c2f5dc663757ed3170074909e8fe14141e5650ad0774a33f90f12d84c
                                          • Instruction Fuzzy Hash: E3C1B931B0AA8255E768AE26C9803FAA790FB44344F854571DB0D876B9DF3EF530E361
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                          • API String ID: 1865132094-1312055526
                                          • Opcode ID: 0c5a8c626145ccd31312ed3adb36d6ec9ea656c920a47348e4de85ad5a28c5a4
                                          • Instruction ID: 7080eb6a4eb6d28911a9e965b848cc68fda7c99e2d738dd069c247bf55e22fb6
                                          • Opcode Fuzzy Hash: 0c5a8c626145ccd31312ed3adb36d6ec9ea656c920a47348e4de85ad5a28c5a4
                                          • Instruction Fuzzy Hash: 7971EE21A0E783C0E760AF2694843BFA790EB45B84F9A4471DE4D47675CF3ED451A372
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40518FD
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405191A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405192E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405194A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051967
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405198A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A405199E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519B2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519D8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A40519EC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A00
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A4F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A5C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4051A85
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                          • Instruction ID: cc4177d961e8430e834bbc7c8564157bd1d30dad1a074952ece2a130338a90b6
                                          • Opcode Fuzzy Hash: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                          • Instruction Fuzzy Hash: 2F511032A4A68185EB14BF22D4D02FE63A0FF84F84F894571DE4E4B275CF3A9061A371
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                          • API String ID: 1294909896-1896214517
                                          • Opcode ID: f970d2abf6ebd31af7a74623f51555fddbd863e7c20e7615ecd7745c04e63c2a
                                          • Instruction ID: 760e29025eb33fa6459e67c3754f8c6a8f81e7b35a5aad3395a239281cb469d4
                                          • Opcode Fuzzy Hash: f970d2abf6ebd31af7a74623f51555fddbd863e7c20e7615ecd7745c04e63c2a
                                          • Instruction Fuzzy Hash: 5FD18C7350E68285EB609F12A9803AAB3B0FB84755F460176DE8C077B8CF3DD495D724
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup$free$strrchr$_access_stat64
                                          • String ID:
                                          • API String ID: 2557200964-0
                                          • Opcode ID: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                          • Instruction ID: 465dba4a8d83a2cb4ad2af14d7388dc4d4143d37fc49b18acf9c9c0760bc2c88
                                          • Opcode Fuzzy Hash: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                          • Instruction Fuzzy Hash: F341732170AB0689FA10BF13A4D427AA2A0FF48B91F854574DE4D07BB0EF3DE425E320
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE65
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE7F
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EE9A
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EEB6
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EED2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EEEA
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF02
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF1A
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF32
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF4A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4054EC5,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A407EF64
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup$callocfree
                                          • String ID:
                                          • API String ID: 1183638330-0
                                          • Opcode ID: 6c5616982f5c6c375460ad02fc021eb938bf1702e2b18ac9b8deb50ac20e7ea7
                                          • Instruction ID: be2c9af4efbdcab29b8f8f6a553610ebea928be9a21c4db46b50b313cd878910
                                          • Opcode Fuzzy Hash: 6c5616982f5c6c375460ad02fc021eb938bf1702e2b18ac9b8deb50ac20e7ea7
                                          • Instruction Fuzzy Hash: 8D310325B07F0286EE99EF57A09463962E0FF48B41B890975DA1D02B70EF3DE470E671
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy$strchr
                                          • String ID:
                                          • API String ID: 1615377186-0
                                          • Opcode ID: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                          • Instruction ID: 019a7b3885870ce92866c8e595690c3b3c25165934149d7823e9f97dd3254dfe
                                          • Opcode Fuzzy Hash: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                          • Instruction Fuzzy Hash: 7251E42270B78149EA24AF26A59027BE290FF44BC4F898474DE8D07774DF3EE425D721
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7A4054619
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: ec7257cd3be6c82d29b538beb3472177542acba6a0cd96cc2d8ebd84b6f6d315
                                          • Instruction ID: 7af9b18040b1fa709ad534169a15e49101117c4bc0011783ae3236463aecb6aa
                                          • Opcode Fuzzy Hash: ec7257cd3be6c82d29b538beb3472177542acba6a0cd96cc2d8ebd84b6f6d315
                                          • Instruction Fuzzy Hash: E471D626A0AB8286E725AF36D4943ABA6A0FB44744F564071CB5D07370DF3EE434E722
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7A4054619
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 3b630d0dd12ce498ebf1f535dbbab8bc5a09ce093ad7ef4cbfe157d581e54d98
                                          • Instruction ID: f563f92e124c9bdb6d25712ebde1a859639793a822d18eb1585dc48639f7e3af
                                          • Opcode Fuzzy Hash: 3b630d0dd12ce498ebf1f535dbbab8bc5a09ce093ad7ef4cbfe157d581e54d98
                                          • Instruction Fuzzy Hash: 3451D762A0AB8286E715AF22D4943AFA7A0FB44784F964071CB5D47370DF3EE460D722
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                          • API String ID: 0-1262176364
                                          • Opcode ID: 7bae63f19e37e3fb9f309421ccc8831b6ecd1a4f345f0f5779c77e36524648ef
                                          • Instruction ID: e778af810d62958e38c9996875066d6ae4dfe2e71896881432e71bc441cb472d
                                          • Opcode Fuzzy Hash: 7bae63f19e37e3fb9f309421ccc8831b6ecd1a4f345f0f5779c77e36524648ef
                                          • Instruction Fuzzy Hash: F9410B21B0AA4285EA10BF17D4C01BBE360FF40B90FD240B5DA4D07671DF7EE464AB61
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7A4064E1A), ref: 00007FF7A4058E2F
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7A4064E1A), ref: 00007FF7A4058E81
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7A4064E1A), ref: 00007FF7A4058EA5
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7A4064E1A), ref: 00007FF7A4058EF5
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7A4064E1A), ref: 00007FF7A4058F38
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupstrchr
                                          • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                          • API String ID: 153040452-3976116069
                                          • Opcode ID: 024d4d83ac230c9c6f52cf5451fd3a19ad3b9e01ef546a6ac0a0c9dd9433d233
                                          • Instruction ID: 9a2395032d422d2e9c6f2ffef5ed4c1bfbd371df504d58368d01c17fe579b142
                                          • Opcode Fuzzy Hash: 024d4d83ac230c9c6f52cf5451fd3a19ad3b9e01ef546a6ac0a0c9dd9433d233
                                          • Instruction Fuzzy Hash: 3541C522709B8581E610AF12E8843ABB7A0FB44B84F954475EE8D47770DF3DD476E311
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                          • API String ID: 2653869212-571364039
                                          • Opcode ID: 4880fc878ee8a328644335253566701241f7638a4e2592a4d53fc1479a97712c
                                          • Instruction ID: 907b0649e62ea235157eb51bad96de48c317911902bc80c3b091f4514b3734db
                                          • Opcode Fuzzy Hash: 4880fc878ee8a328644335253566701241f7638a4e2592a4d53fc1479a97712c
                                          • Instruction Fuzzy Hash: 8741B562A0A78248EB10AF2299841FBB761FF05789F8504B1CE4D1777AEF3DE164D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchr
                                          • String ID: Unknown error %u (0x%08X)
                                          • API String ID: 1897771742-1058733786
                                          • Opcode ID: a207ab5efef610c7d340f30c8d5af441e25e81c8d5035ffeb4f3945ff7161809
                                          • Instruction ID: b2343495b7175b268d86cf1431ad0d0bcce890caeca6f0060b937000ec203c37
                                          • Opcode Fuzzy Hash: a207ab5efef610c7d340f30c8d5af441e25e81c8d5035ffeb4f3945ff7161809
                                          • Instruction Fuzzy Hash: 94215422B0A74186E7116F23A84422BEA90AB94BD0FC64579DE4A03775CF3ED461A771
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                          • API String ID: 600764987-2710416593
                                          • Opcode ID: ad520cff00791436f665a9c7ebc751bfe0d4d410ed940af3941ef55134a63b2e
                                          • Instruction ID: f0e37c777f0f8bb5b422e59740d0f33b4b8dafc2139730db97c3fb6bf17cc4ca
                                          • Opcode Fuzzy Hash: ad520cff00791436f665a9c7ebc751bfe0d4d410ed940af3941ef55134a63b2e
                                          • Instruction Fuzzy Hash: 0931892660E7C189E761AF61E4903ABB794FB84740FC10479DA8D02AB6CF3DD554E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                          • API String ID: 600764987-1965992168
                                          • Opcode ID: adb4d3cc1ad15402be98744665676a234ebf3bef7a905d6a1a81ce6623857e9d
                                          • Instruction ID: ad304b33f4e5f4ffa7f9bd33e78eb8d2dec65a22da25908822f5028d576b3fc9
                                          • Opcode Fuzzy Hash: adb4d3cc1ad15402be98744665676a234ebf3bef7a905d6a1a81ce6623857e9d
                                          • Instruction Fuzzy Hash: 1C31892660E7C189E661AF61E4903AFB794FB84740FC10479DA8D02AB6CF3DD554E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                          • API String ID: 600764987-2628789574
                                          • Opcode ID: 089ccadd014c3ee78b622b01899f77aba2584c1a400cd428feca2a335efb15ad
                                          • Instruction ID: 057220812077d1f41079a76717e06751d623c025984f8ca0b4554d94ae5172d7
                                          • Opcode Fuzzy Hash: 089ccadd014c3ee78b622b01899f77aba2584c1a400cd428feca2a335efb15ad
                                          • Instruction Fuzzy Hash: 9431892660E7C189E661AF61E4903ABB794FBC4740FC10479DA8D02A76CF3DD554D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                          • API String ID: 600764987-1052566392
                                          • Opcode ID: 2f4f5cac2e3c43b7562cef83c936687109589ef06298fa9f03c17c2dbd503f5a
                                          • Instruction ID: ac5ec0f145082ef6c73cec58317bae27b486e450bc600669f46436a1eae7797c
                                          • Opcode Fuzzy Hash: 2f4f5cac2e3c43b7562cef83c936687109589ef06298fa9f03c17c2dbd503f5a
                                          • Instruction Fuzzy Hash: 5C31892660E7C189E661AF61E4903AFB794FB84740FC10479DA8D02AB6CF3DD554E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                          • API String ID: 600764987-3862749013
                                          • Opcode ID: 56e2ddeb5580827647768440bcc176f8b6946ce4dee5d87353e15cb9a0a16672
                                          • Instruction ID: 134eb37c435b42edb9d2af6386a3e23d9700f44c0d8f572da8512cab87f0a21c
                                          • Opcode Fuzzy Hash: 56e2ddeb5580827647768440bcc176f8b6946ce4dee5d87353e15cb9a0a16672
                                          • Instruction Fuzzy Hash: 5D31892660E7C189E661AF61E4903ABB794FBC4740FC10479DA8D02A76CF3DD554D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                          • API String ID: 600764987-1502336670
                                          • Opcode ID: 1995ff10ed04dce21260e3a967019fbcd735387925a1af334264184213179178
                                          • Instruction ID: e7ca0044914c42253cdcaa6ec5192300cd58fdfb1eff0587633fca7a2b3d57a9
                                          • Opcode Fuzzy Hash: 1995ff10ed04dce21260e3a967019fbcd735387925a1af334264184213179178
                                          • Instruction Fuzzy Hash: 0F31A92260E7C189E661AF21E4903ABB790FBC4740FC10479DA8D02AB6CF3DD564D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                          • API String ID: 600764987-1381340633
                                          • Opcode ID: 942faa6bf7be1711fa1d0b7566088d42f301b9f5789a6e1556235a281404a159
                                          • Instruction ID: 62bf31ba51d77fb5487cb24d22ad167cbc2108df54f51348159e693cefc65a08
                                          • Opcode Fuzzy Hash: 942faa6bf7be1711fa1d0b7566088d42f301b9f5789a6e1556235a281404a159
                                          • Instruction Fuzzy Hash: 6531A92260E7C189E661AF21E4903AFB790FBC4740FC10479DA8D02AB6CF3DD564D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                          • API String ID: 600764987-618797061
                                          • Opcode ID: f5330ccc4088d604f1c4fdc059b1ac81f642d8961113e143d29ca4ea7cab1393
                                          • Instruction ID: 1044382be339ad730b8ccbc84c96d1983e8cd3328f2c036f2c953a5a510942b9
                                          • Opcode Fuzzy Hash: f5330ccc4088d604f1c4fdc059b1ac81f642d8961113e143d29ca4ea7cab1393
                                          • Instruction Fuzzy Hash: DE31982260E7C189E721AF61E8903ABB790FBC4740FC1057ADA8D02AB6CF3DD554D760
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_time64
                                          • String ID:
                                          • API String ID: 3087401894-0
                                          • Opcode ID: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                          • Instruction ID: fa3297b7d3741ee034f5a8e41e64f5536c2af2325239e6fab18ffab29094d8ea
                                          • Opcode Fuzzy Hash: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                          • Instruction Fuzzy Hash: A0213036A0AA4185DB20AF23E98452AA370FB48FC1F560971DE9D03734CE3ED451E360
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                          • API String ID: 0-808606891
                                          • Opcode ID: dc9dd6f78c51c9d00d5e7a5a116f0ea754b32ee68f05b370b316dc6568bbd5a6
                                          • Instruction ID: d22b059233e395bd02f48545077e2da69ac58fcba88fcf03231818068d00d4fb
                                          • Opcode Fuzzy Hash: dc9dd6f78c51c9d00d5e7a5a116f0ea754b32ee68f05b370b316dc6568bbd5a6
                                          • Instruction Fuzzy Hash: C3B1A02250AA4185E728AF2AD58023DBF71E715B58FE185B6C64D032F4CF3AF8A1D360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                          • API String ID: 1169197092-907567932
                                          • Opcode ID: a0251eed2c70bbd49aa1dbbc1ce3cfa3298b332a8a1cd3e14d86184fd550fdd0
                                          • Instruction ID: 94e5b379dbd46f66cb31d05cf642aee2d0c68becedc9c5e3c84bcfc1c740ce39
                                          • Opcode Fuzzy Hash: a0251eed2c70bbd49aa1dbbc1ce3cfa3298b332a8a1cd3e14d86184fd550fdd0
                                          • Instruction Fuzzy Hash: 4B71E921A0928265F7147F1385942B7FAC1AF01784F8680B8DA8B475B1DF7EE434B332
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$strchrstrtol
                                          • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                          • API String ID: 137861075-1224060940
                                          • Opcode ID: e19e7a17892ef0fd4547017b0856966097517799dc59ca407be5fc436240d304
                                          • Instruction ID: 96d4d88c597d63d41de4555b5db33bdafcbc115da3938b92ef672ea261653e12
                                          • Opcode Fuzzy Hash: e19e7a17892ef0fd4547017b0856966097517799dc59ca407be5fc436240d304
                                          • Instruction Fuzzy Hash: 1E510622A0AAC244EB71AF13A8803EBA790FB41B94F958575DE8C077B5CF3ED121D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                          • API String ID: 2653869212-3672398475
                                          • Opcode ID: b407aa12ab9d603bb7481d1789e94b5a93f7aa65e4bcc9714295407214bc55c9
                                          • Instruction ID: 6722908c0d6fe6d3f580f8d1714f0ca51585fcba7ecfbc3b1c550b5ec831560c
                                          • Opcode Fuzzy Hash: b407aa12ab9d603bb7481d1789e94b5a93f7aa65e4bcc9714295407214bc55c9
                                          • Instruction Fuzzy Hash: EE419862A0A78284EB11AF2299841FBB760FF05789F8944B1CE4D177B9DF3DE160D321
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE0C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE16
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE20
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE2A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE34
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE3E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE48
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE52
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE5C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE66
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A407EE32,?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407FE70
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 6b448fd4be533d4b3f4b30fa29817f0af00be32d1e32d0b028ea1c3c8ba10bd8
                                          • Instruction ID: bd53119e09d1172ea9f6fb7fbc2d88d2dff6dd1f00440cfc81acb0ab30e88619
                                          • Opcode Fuzzy Hash: 6b448fd4be533d4b3f4b30fa29817f0af00be32d1e32d0b028ea1c3c8ba10bd8
                                          • Instruction Fuzzy Hash: 1201F567B55901C6D724AF27E8945396330FF88F89B611971CE6E42234CE2AD865E370
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: mallocmemcpy
                                          • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                          • API String ID: 4276657696-1832275178
                                          • Opcode ID: fd768c2aa5eae75a5a2e6dc2aa22c2356e80d146e042891e7013a1ccd583ede0
                                          • Instruction ID: ce4be8d2a0d1b42197d0142ae810387ff22cd3a3be08903f3c81b67b8a8a281f
                                          • Opcode Fuzzy Hash: fd768c2aa5eae75a5a2e6dc2aa22c2356e80d146e042891e7013a1ccd583ede0
                                          • Instruction Fuzzy Hash: 36A16F62A0AF8685EA65AF22A5803BAB3A0FF44B84F854171DE4C03775DF3DD461D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                          • API String ID: 3313557100-1003742340
                                          • Opcode ID: 4cb88a9bb682ff8cf7b43de263370166180d9ca97bd046b12c59ddd90dd32cdf
                                          • Instruction ID: 5fada35e37e2077146d2498b143160d7735873bacd1b5ece2bbcb070fac6174c
                                          • Opcode Fuzzy Hash: 4cb88a9bb682ff8cf7b43de263370166180d9ca97bd046b12c59ddd90dd32cdf
                                          • Instruction Fuzzy Hash: 2B81BF2260AB8181DA50EF26D5803ABB360FB44786F864471EF9D47B65DF3ED4A0D750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: d77bbf88a504c9176559139c5e71d2011c5d623afa97ab2ba937b66deb4465e9
                                          • Instruction ID: ed559017b81bbe91191236f031910c6583f9e67f6b78619e617945d96b57c470
                                          • Opcode Fuzzy Hash: d77bbf88a504c9176559139c5e71d2011c5d623afa97ab2ba937b66deb4465e9
                                          • Instruction Fuzzy Hash: 34614962A0A78145EB18AF2386941BBB751FF05795F8545B5CA0E077F5EE3DE024A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: 5b4011869b0755b7bd384421eda15a8f17f7ed763e6d0546f24f4cd3c10d53e7
                                          • Instruction ID: 1991b42fcf36c8e9f443d0058013c55dfd0386f714b9b5f43a7c8b3840f349f0
                                          • Opcode Fuzzy Hash: 5b4011869b0755b7bd384421eda15a8f17f7ed763e6d0546f24f4cd3c10d53e7
                                          • Instruction Fuzzy Hash: 2D614C51A0A38244FB18AF234A941BBBB51EF15785F8945B5CE4E077F9EE3DE025E320
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7A4064DF8), ref: 00007FF7A4081920
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7A4064DF8), ref: 00007FF7A4081957
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7A4064DF8), ref: 00007FF7A408197E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                          • API String ID: 1294909896-3948863929
                                          • Opcode ID: e9e475ad4b3651e4003d17a8e6ef36f07f97d20f7521292248c766d0bd55578f
                                          • Instruction ID: bd2ca20293cf985fae4e088187c9e4ea916d76e89bd79748a33934e983e766fa
                                          • Opcode Fuzzy Hash: e9e475ad4b3651e4003d17a8e6ef36f07f97d20f7521292248c766d0bd55578f
                                          • Instruction Fuzzy Hash: 2B61B032A0AB8181E7609F16E4847ABB7A4FB44B84F814136DA8D4B7B4DF3ED451D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                          • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                          • API String ID: 1392894463-1168109407
                                          • Opcode ID: 9ee667e3ef2b8362d973f2be99724709101bc31ecf6e59961fe177d2da80cc60
                                          • Instruction ID: b1dc0021239283cf352959adc41754facbb80138f758821214b8dbf92bc1d78a
                                          • Opcode Fuzzy Hash: 9ee667e3ef2b8362d973f2be99724709101bc31ecf6e59961fe177d2da80cc60
                                          • Instruction Fuzzy Hash: 8D41DD22A0EA8241EA50BF1794802BBA750FF417C4FCA4175DA5D472B5DF2EE411E731
                                          APIs
                                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF7A4076F27
                                            • Part of subcall function 00007FF7A40774D0: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A4077506
                                            • Part of subcall function 00007FF7A40774D0: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A407755B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _fstat64_openstrchr
                                          • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                          • API String ID: 3410096895-1509146019
                                          • Opcode ID: 7a1e08496ae78c723fe99c1666c883e19df85d3e60aab7009e4ff462fa17d17e
                                          • Instruction ID: c7d8107cab8cc92c941b6c3a5c0d63a046d407177cd6b16422db06fbc6485a5b
                                          • Opcode Fuzzy Hash: 7a1e08496ae78c723fe99c1666c883e19df85d3e60aab7009e4ff462fa17d17e
                                          • Instruction Fuzzy Hash: EEB1D831A0AA8346E720AF2795803BBE791FB847C4F864071DE4D47775EE3EE4219B61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$mallocrealloc
                                          • String ID: 0123456789-$<DIR>$APM0123456789:
                                          • API String ID: 359134164-4291660576
                                          • Opcode ID: f6c3b07ae69c7a76d4dcae46c8e10b4f490ffa99a37a4308854842f81971856a
                                          • Instruction ID: b4778f64cc3dd974409891a81b40c867015a8f715f6c9a89e1fcb2fb292326aa
                                          • Opcode Fuzzy Hash: f6c3b07ae69c7a76d4dcae46c8e10b4f490ffa99a37a4308854842f81971856a
                                          • Instruction Fuzzy Hash: C2B1823290A705C6EB24AF26E19433AB7E0FB44B49F564175CA4E077B4CF3AE461D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: %s?%s$Failed sending Gopher request
                                          • API String ID: 111713529-132698833
                                          • Opcode ID: 03f6d069cb451dec0e6154f66f1d59009e5cea7867a2aa75751e37c4f7ea109f
                                          • Instruction ID: af40008026f2a8e73ec9897cdd46dbc4b952ece768e41c967d2de8dd94cddd37
                                          • Opcode Fuzzy Hash: 03f6d069cb451dec0e6154f66f1d59009e5cea7867a2aa75751e37c4f7ea109f
                                          • Instruction Fuzzy Hash: 1F51F822B0BA8281F690AF27A8801BBA390FB447E4F854671DE6D437F5DE3DD0119B51
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 8a8ff242f02a9236229a831a3fccc6dff901718e43974036dda4f5f8c8ed984b
                                          • Instruction ID: 184c2a0d9a29c9cc5ff8cd2e57e2359309fb5a0d03f42692e2ba998952a8ff4c
                                          • Opcode Fuzzy Hash: 8a8ff242f02a9236229a831a3fccc6dff901718e43974036dda4f5f8c8ed984b
                                          • Instruction Fuzzy Hash: EC61F432A19A8185EB14DF75E9843EE7720EB453A4F414731EA6C02AF9CF7DE091D710
                                          APIs
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A4077506
                                          • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A407755B
                                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A40775CC
                                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A40775D9
                                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A40776EB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _close$_fstat64_openstrchr
                                          • String ID: Can't get the size of %s$Can't open %s for writing
                                          • API String ID: 423814720-3544860555
                                          • Opcode ID: e5c8fb1ec35a5549d700875c8203deee49073a84587174603ce729f0572fed4b
                                          • Instruction ID: cc48ef9b654306086944d539acf100fdcca3912098728016c57671effd1a48de
                                          • Opcode Fuzzy Hash: e5c8fb1ec35a5549d700875c8203deee49073a84587174603ce729f0572fed4b
                                          • Instruction Fuzzy Hash: E251F42170AE8282EA14BF27A4802BBE791FB84BD0F864475DA4E473B5DE7DF4119721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdupstrtol
                                          • String ID: %%%02x
                                          • API String ID: 2999891020-4020994737
                                          • Opcode ID: 6a801598b4c74b21c1fa39b5fd3dd7a905dae2e9e63405a51e711a2ace6544f3
                                          • Instruction ID: e67f05d617beedd3e6d2d019651b5be499c4e276d0d4f212aa70f04487506ade
                                          • Opcode Fuzzy Hash: 6a801598b4c74b21c1fa39b5fd3dd7a905dae2e9e63405a51e711a2ace6544f3
                                          • Instruction Fuzzy Hash: 0A51DC11A0FA8255FA61AF32509437AAB90BF41794F8A01B1DD9D077F1DE2EE414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1496848336-4020994737
                                          • Opcode ID: 47e6af600c9d1d346c1937aab269d8273d8af942b88f53c16fc3d7d3e07b8469
                                          • Instruction ID: a9a399f9ef4b4c1614670cf7a3b25682362b5806ab9ba96bd6636858a938078e
                                          • Opcode Fuzzy Hash: 47e6af600c9d1d346c1937aab269d8273d8af942b88f53c16fc3d7d3e07b8469
                                          • Instruction Fuzzy Hash: 8D41FD12A0EA8245EA61AF33509437AABD0BF45794F8A05F1DD9D073F1DE2EE414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 111713529-517259162
                                          • Opcode ID: 4ad8c825ccfcb54f95674c0dcb7cdfa92c224264c5baeb7d6188afb13df6f0f6
                                          • Instruction ID: c53f9edcd67f9cd623bab2c7c1e24784672722271d94372db0713674f527b6a7
                                          • Opcode Fuzzy Hash: 4ad8c825ccfcb54f95674c0dcb7cdfa92c224264c5baeb7d6188afb13df6f0f6
                                          • Instruction Fuzzy Hash: 2F31AA51A0A74244FA14AF6399841FBB750EF05789F8944B5CE4D073BAEF3DE120E321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-599393795
                                          • Opcode ID: 9abdc7800897664ab45268b87967cada86f487af973ba71b71faca93e2bc1046
                                          • Instruction ID: 4f25f2a0464d6351a0e8f144abecc6b8134bb3fdaef49848a749e194e222b79a
                                          • Opcode Fuzzy Hash: 9abdc7800897664ab45268b87967cada86f487af973ba71b71faca93e2bc1046
                                          • Instruction Fuzzy Hash: DE61EA61A0A78244EB10AF269E841BBFB90EF05785FC644B5DA4D07779DF3EE161E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 901724546-1663925961
                                          • Opcode ID: 47d8be27700f296a11b72f90afc98f6705cfe901cbe2814c0c12018f30ada7c7
                                          • Instruction ID: 8a541fac7a52d65311ecda529b2093557bd594ec62f2b6f3ff5d777bc84b3aa8
                                          • Opcode Fuzzy Hash: 47d8be27700f296a11b72f90afc98f6705cfe901cbe2814c0c12018f30ada7c7
                                          • Instruction Fuzzy Hash: A8517813B0A68245FA18AF1795843BBB350EF41BD0F890171CA9F077F1EE2ED025A321
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID:
                                          • API String ID: 1169197092-0
                                          • Opcode ID: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                          • Instruction ID: 8e08c69df6f4bf82a8ce1979c28b5c80f352cf37c1cf18b2ef8e568eb24d14ee
                                          • Opcode Fuzzy Hash: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                          • Instruction Fuzzy Hash: F651A022B1BB8186EB55CF66F080129B3A0FB48B84B491575EF8D07B68EF39D4B1D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-3876350232
                                          • Opcode ID: d49d0fec6018ad6c37eadfc80c8b36a17024eb9138f7c190acf9ab5c99e4fe88
                                          • Instruction ID: d425e64403d9e9e6bf856dddafd8021c4d887f0c4f137af515a0e72259dc7bd4
                                          • Opcode Fuzzy Hash: d49d0fec6018ad6c37eadfc80c8b36a17024eb9138f7c190acf9ab5c99e4fe88
                                          • Instruction Fuzzy Hash: D251A821A0A78284FB10AF2299801BBBB51FB05785FCA54B1DA4D172BADF3DE564D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: dfcbbc16d3bd6a6aff9960da1f9d9e569395f30e8f586d22ed38cdd3c36d727d
                                          • Instruction ID: 007eda3b893bd8141e0200fb89c162a4fc656ed44eaa0fa130e49390b4156bea
                                          • Opcode Fuzzy Hash: dfcbbc16d3bd6a6aff9960da1f9d9e569395f30e8f586d22ed38cdd3c36d727d
                                          • Instruction Fuzzy Hash: 4D41F762A0A78244EA10AF238A841FBB761FF15785F854571CE0D077B5EF7DE1249320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: cdd882aa0eb0c59bba6af1d881fe4002e072876f2fb64ac32148e530adc62b87
                                          • Instruction ID: 33afd9cd352ff2aeea39b36a5acbcfcc8e5e6195826a1ae3871907120dd3f7b5
                                          • Opcode Fuzzy Hash: cdd882aa0eb0c59bba6af1d881fe4002e072876f2fb64ac32148e530adc62b87
                                          • Instruction Fuzzy Hash: AA416432A09B4386E721AF22D48023AB3A4FF94F84F954575DA8E53734CF79D860E361
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                          • Instruction ID: 56ab9da18c1a43ceb04cf7c97ff1f473dc379c098e8498413888034045c51e3d
                                          • Opcode Fuzzy Hash: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                          • Instruction Fuzzy Hash: FC311C3670AA5185D720AF12E98422AA374FB84FC4F550571DE9D07B78CE7ED461E720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                          • Instruction ID: 356c16259ae322f444e91e99b747d2d48a304df9eae85b8bb81db5e6280ef362
                                          • Opcode Fuzzy Hash: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                          • Instruction Fuzzy Hash: 7701E966756A0186DB14AF22E894529A330FF88FC5B551971CD9E43334CE2DD864E330
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpymemset
                                          • String ID:
                                          • API String ID: 1579693990-0
                                          • Opcode ID: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                          • Instruction ID: eb0e2f06bdb6e358b38a61ab21eac4a94739c7d0cf1c1632afbfb362d0443b68
                                          • Opcode Fuzzy Hash: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                          • Instruction Fuzzy Hash: 7191A521B0A74242FA64BF2755D037BA290EF84BC5F964074DE4D477B6EF2EE421A324
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7A40598B8), ref: 00007FF7A4059A05
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7A40598B8), ref: 00007FF7A4059A1F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64$Internal error removing splay node = %d
                                          • API String ID: 1114863663-13178787
                                          • Opcode ID: 2c182daf1c2e6d25c5e7bf0efd11d6bda6f881fcecf2cdaad549c930c6f98041
                                          • Instruction ID: 6dba43590377d3489fc1806486f6fe49537a7034e9a1d28337bfab46eb8f1465
                                          • Opcode Fuzzy Hash: 2c182daf1c2e6d25c5e7bf0efd11d6bda6f881fcecf2cdaad549c930c6f98041
                                          • Instruction Fuzzy Hash: 9FA10533A0A64186DB209F16E48477EBBA4FB48B48F878175DA8D43275DF3DD218D760
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7A404B23A,?,?,?,?,?,?,?,00007FF7A404B007), ref: 00007FF7A4068221
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7A40683C3
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7A40683E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                          • API String ID: 2644425738-1191287149
                                          • Opcode ID: 720e810a07ba9ee7a915715f5eb5251aab670f7d7701d63ee000b7329d776947
                                          • Instruction ID: 8dd16ac5d53eabd84d781def02319ae91fc05ce5398ed26979bb80fcbef99e9f
                                          • Opcode Fuzzy Hash: 720e810a07ba9ee7a915715f5eb5251aab670f7d7701d63ee000b7329d776947
                                          • Instruction Fuzzy Hash: 66513623B0F68651EE21AF26948017FE2A1AB45788FC64070DE4F06775DF7EE461E322
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 573759493-910067264
                                          • Opcode ID: 0274bb0e400fd016776ae599146ae9ddd6b264a5e5dc0fb4a6732b712856ce7f
                                          • Instruction ID: 6d01b0d9331b44e690f15c0e9e75bbe7dcab9c991e983264263266948b84fb8e
                                          • Opcode Fuzzy Hash: 0274bb0e400fd016776ae599146ae9ddd6b264a5e5dc0fb4a6732b712856ce7f
                                          • Instruction Fuzzy Hash: B4613621E0E59244FB15AF26968427BFB91EB01781FC640B1D68D42AB6CF7FD521E720
                                          APIs
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035E71
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035EB5
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035ECD
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035F52
                                            • Part of subcall function 00007FF7A408FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7A40343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A408FB32
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035F84
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035F9F
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A4035FBC
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 1155477157-0
                                          • Opcode ID: c83a54589fa87dc50eab96c109bff6bbfd11847a837944325d67e2738dc9878a
                                          • Instruction ID: 83a19c23640e833112c09463b807d0411d2e733fed182c75fed6b6b050460f8f
                                          • Opcode Fuzzy Hash: c83a54589fa87dc50eab96c109bff6bbfd11847a837944325d67e2738dc9878a
                                          • Instruction Fuzzy Hash: 1E51E932A05B8181EB08EF26D64826AA761FB14BD4F954A31DE2D473F5CF39F1A1E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                          • API String ID: 2190258309-3231818857
                                          • Opcode ID: 8ead59d0cc5f3b0d3cd798f73adf085f83e2e1a8f83e072cb6227eff2c3bee4e
                                          • Instruction ID: 3ef65cdb41088d3dabe65b1c8a8f955c7e107f9ff21ec6efc1c2c358ceabbbd6
                                          • Opcode Fuzzy Hash: 8ead59d0cc5f3b0d3cd798f73adf085f83e2e1a8f83e072cb6227eff2c3bee4e
                                          • Instruction Fuzzy Hash: 8051E363A0E6C285EA10DF27A9846BBF7A4EB45781F850071DA8D03775DF3EE125E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Digest$stale$true
                                          • API String ID: 1294909896-2487968700
                                          • Opcode ID: fa91a0250978750f9259b25ace6eee135c3ef38397716072aef58d0f62bb0c78
                                          • Instruction ID: 8d61a106773af64919dbbea796438b5901d8e348d346f74abde08d4ac24899f3
                                          • Opcode Fuzzy Hash: fa91a0250978750f9259b25ace6eee135c3ef38397716072aef58d0f62bb0c78
                                          • Instruction Fuzzy Hash: FF51D622A0AA4246EB20AF22E59037BB3A0FF54785F8541B5DA8D472F1DF2DD531E730
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memchrmemcpyrecvfrom
                                          • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                          • API String ID: 3107918033-477593554
                                          • Opcode ID: 0c93f5223128682b2c0041b548f434a10e6fe3b52573237400c3c347fc413c6c
                                          • Instruction ID: 5025a2b82e710c45043e3a7c16bee30a6a5c73d3bc638a20cf5020fd08c39de3
                                          • Opcode Fuzzy Hash: 0c93f5223128682b2c0041b548f434a10e6fe3b52573237400c3c347fc413c6c
                                          • Instruction Fuzzy Hash: 2A514871A0D98285EB64EF2294903BBB390FB40B49F864072DA4D477B5DE3ED421DB21
                                          APIs
                                            • Part of subcall function 00007FF7A4036DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7A40323DB), ref: 00007FF7A4036E5E
                                            • Part of subcall function 00007FF7A4036DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7A40323DB), ref: 00007FF7A4036E6C
                                            • Part of subcall function 00007FF7A4036DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7A40323DB), ref: 00007FF7A4036E82
                                            • Part of subcall function 00007FF7A4033BC0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4033C06
                                            • Part of subcall function 00007FF7A4035DE0: memcpy.VCRUNTIME140(?,?,?,00007FF7A4031DCA), ref: 00007FF7A4035E71
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032479
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40324B8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032506
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032554
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                          • String ID: at line $, column
                                          • API String ID: 2665656946-191570568
                                          • Opcode ID: e3e18ae7d8bdb10a3831579929a218dcf241e4e20c85fb7eaf6288b65ea3a085
                                          • Instruction ID: f7a7bd831a01cd1158ba5bcca806569e887975e1b17c547d9c4e9b833f10cbe7
                                          • Opcode Fuzzy Hash: e3e18ae7d8bdb10a3831579929a218dcf241e4e20c85fb7eaf6288b65ea3a085
                                          • Instruction Fuzzy Hash: 4B510562B05B8189FB04EF75D5843AD7721EB447A8F414274DA6C13BFADE39E0A5E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                          • API String ID: 1294909896-1255959952
                                          • Opcode ID: 6763051c228c31c864c50f42b3268d148b359703256ab87795060e244ba2952e
                                          • Instruction ID: 2a076bc490be95420b8c647a1104655eecfb0461475bb1527bf6e6515569b65d
                                          • Opcode Fuzzy Hash: 6763051c228c31c864c50f42b3268d148b359703256ab87795060e244ba2952e
                                          • Instruction Fuzzy Hash: 7551F622A0A64296FB11EF62D5C02BAB790FF50795F864071DA4D872B1DF3EE471D3A0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: a836fe27a0d5cae35f9326d9bbdda8680830951909b3b77083bcb3be45e33309
                                          • Instruction ID: bbcc5ac24ecd623aa0653b0948fd0d397ad5c3bfe5bb803a73d627efd7d317f2
                                          • Opcode Fuzzy Hash: a836fe27a0d5cae35f9326d9bbdda8680830951909b3b77083bcb3be45e33309
                                          • Instruction Fuzzy Hash: 8641DB12A0EA8245EA61AF32509437BAB90BF41794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 316bb1082a1ff7fe208b000f1608c5f407bf4d7f4cc0991fefd91e9ebab00efb
                                          • Instruction ID: a844b8088a2b9fc53e89882c8bb7f65a6b881b992557f91c3166d19a6aa5b570
                                          • Opcode Fuzzy Hash: 316bb1082a1ff7fe208b000f1608c5f407bf4d7f4cc0991fefd91e9ebab00efb
                                          • Instruction Fuzzy Hash: C341DB12A0EA8254EA61AF32509437AAB90BF45794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: aae2820c9649b90ef2d383910c1fadb4125827575a96e270d23418d742a52359
                                          • Instruction ID: f7c47d73bb3fabb124eae190492edc57f171075061d51d366c7f86ed1d55c802
                                          • Opcode Fuzzy Hash: aae2820c9649b90ef2d383910c1fadb4125827575a96e270d23418d742a52359
                                          • Instruction Fuzzy Hash: CA41DB12E0EA8254FA61AF32509437AAB90BF45794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 0ab6ac1c18ef0320f00ca7f7923387b5228cdbe9ffea08c42e176cd2e22e9a25
                                          • Instruction ID: 74f90ad76e28a1cb1aec7303f2cf0989828ff7cd14e645799b7ce0ffe0d98e12
                                          • Opcode Fuzzy Hash: 0ab6ac1c18ef0320f00ca7f7923387b5228cdbe9ffea08c42e176cd2e22e9a25
                                          • Instruction Fuzzy Hash: C141DB12E0EA8254FA61AF32509437AAB90BF45794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 23aa1005768f67b0a7803d65c085971b2caefa34fb9e22005dc80a51b15d3ea0
                                          • Instruction ID: 1a0036422835f5b5b8ddf8ac126568ec1a04cb70cc9371e5850d1909b2c133c4
                                          • Opcode Fuzzy Hash: 23aa1005768f67b0a7803d65c085971b2caefa34fb9e22005dc80a51b15d3ea0
                                          • Instruction Fuzzy Hash: 4041FB02E0EA8254FA61AF32509437AAB90BF01794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: f228cae64e71e781229f9b6479e405da6372a9773d43e5d1e04a0a821faac6b0
                                          • Instruction ID: 9e2f3329434dba89efa6306a0d2df807102db6cf193dc84380ac2ca6078edbf0
                                          • Opcode Fuzzy Hash: f228cae64e71e781229f9b6479e405da6372a9773d43e5d1e04a0a821faac6b0
                                          • Instruction Fuzzy Hash: 4D41DB12E0FA8254FA61AF32509437AAB90BF45794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: bd63b37f65a71803bae912e8edbf27233404d76ff63f84e9c836a8ed04050242
                                          • Instruction ID: c82272c27ac216247f2d1f07c38c7c4fe543009ccdd0140a24fcdc21059f32f0
                                          • Opcode Fuzzy Hash: bd63b37f65a71803bae912e8edbf27233404d76ff63f84e9c836a8ed04050242
                                          • Instruction Fuzzy Hash: 1841DB12A0EA8254EA61AF32509437AAB90BF45794F8A05F1DD9D073F1DE2EA414E732
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr
                                          • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                          • API String ID: 2830005266-711804848
                                          • Opcode ID: e99b9d8e9f113d2fb1ae666f3e3339b9bff7e13fa51ae1e990fb26d58e4bd974
                                          • Instruction ID: 5e7ec9d4eaddf10b481787993ec2ff305fa8ebce4b3ce766f3fd2a7fd0bcd335
                                          • Opcode Fuzzy Hash: e99b9d8e9f113d2fb1ae666f3e3339b9bff7e13fa51ae1e990fb26d58e4bd974
                                          • Instruction Fuzzy Hash: C8418A31B1E68291EA54FF1B64800BBE390DF45784F9E40B0DA4E07776EE9EE411A729
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _time64
                                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                          • API String ID: 1670930206-870032562
                                          • Opcode ID: 1482dd197fc30249b75023598b4a51e44251721b587a5b4df71408df51d1a5b0
                                          • Instruction ID: b6e4cdc9e6f5b56cbb75caef9170567194a81438ef0a9ad1de2b5decef190dba
                                          • Opcode Fuzzy Hash: 1482dd197fc30249b75023598b4a51e44251721b587a5b4df71408df51d1a5b0
                                          • Instruction Fuzzy Hash: 3E41F872715A1587DB20DF2BE08056AB7A0FB98F88F915031DE0C87774DE3AE561DB41
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-3155708153
                                          • Opcode ID: 9390edc3f400d876a4391df1fadf0e16e53e9297dc30be422b19365ee7073859
                                          • Instruction ID: 50dc39f21ffc5f9f191fe54adab7eaf5e665f101f1243b96a0812c7feeb91ca4
                                          • Opcode Fuzzy Hash: 9390edc3f400d876a4391df1fadf0e16e53e9297dc30be422b19365ee7073859
                                          • Instruction Fuzzy Hash: 4E41A762A0A78144EA10BF2399841FBB761EF05785FC554B1DE4D0B7B6EF3EE124A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                          • API String ID: 2190258309-3662781045
                                          • Opcode ID: b395d39516c44ad864a1eaaf70241685fcfc5f6f8e61584dd39769494ddd85ac
                                          • Instruction ID: 97af0e3e9f54c61dfc3571ae32f6611ec9415a88468bfacf57948ffa0784a253
                                          • Opcode Fuzzy Hash: b395d39516c44ad864a1eaaf70241685fcfc5f6f8e61584dd39769494ddd85ac
                                          • Instruction Fuzzy Hash: BC419123A0AA8285EB10EF26E5801ABF360FB44B85FD90472DA8D07775DF3ED565D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-659367561
                                          • Opcode ID: 753980499a01d3a6e5fd097534c5de725a24fe47e6e6276afe50a599a360c2d7
                                          • Instruction ID: 2943907ecd01f58cc2bcdd7cadec4e24f2fb1d680b7c548d3703a50737dcc1c0
                                          • Opcode Fuzzy Hash: 753980499a01d3a6e5fd097534c5de725a24fe47e6e6276afe50a599a360c2d7
                                          • Instruction Fuzzy Hash: A041AC51A0B74244EE10AF2399841BBBB51EF05785FC554B1DE4D077B6EF3EE124A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: .
                                          • API String ID: 1865132094-916926321
                                          • Opcode ID: b63ea8ecd14ad69126fd20cd5c861c4bc34c19ec2643a61da08846b8492e2fd4
                                          • Instruction ID: 2662f627162f993b3451488f24b57450060088658c8595b8c7db13177bc9bdb8
                                          • Opcode Fuzzy Hash: b63ea8ecd14ad69126fd20cd5c861c4bc34c19ec2643a61da08846b8492e2fd4
                                          • Instruction Fuzzy Hash: D2419322E0AF8586E650AF12D48077BA3A0FB44B80F964171DE4D47670DF7EE461DBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: d7856b8d5f777aa892999a3c922b1d7cfea9bb5a062f3762ac05135a2f3dafbf
                                          • Instruction ID: 33db4c2581984f48dbe00fc4a53c60d4eef8bc4bd427168b24b72f90a3b1ec47
                                          • Opcode Fuzzy Hash: d7856b8d5f777aa892999a3c922b1d7cfea9bb5a062f3762ac05135a2f3dafbf
                                          • Instruction Fuzzy Hash: 8941A461A0A78244EA14AF2399841BBB751EF05789F8944B1CE4D1B7B9EF3DE124E320
                                          APIs
                                            • Part of subcall function 00007FF7A406C850: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C878
                                            • Part of subcall function 00007FF7A406C850: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C89E
                                            • Part of subcall function 00007FF7A406C850: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C8BF
                                            • Part of subcall function 00007FF7A406C850: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C8D0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4080DDF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4080E28
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A4080E31
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$realloc$EnvironmentVariable
                                          • String ID: %s%s.netrc$%s%s_netrc$HOME
                                          • API String ID: 4174189579-3384076093
                                          • Opcode ID: 5a46b0e3afca5a6a4ec30040578a373ec9295e4f61d04f1fde2b3d00aa97b5a7
                                          • Instruction ID: 392c4aab08ba7e83e659332441eb3c211c643a0ff81843c7a5f261132668c973
                                          • Opcode Fuzzy Hash: 5a46b0e3afca5a6a4ec30040578a373ec9295e4f61d04f1fde2b3d00aa97b5a7
                                          • Instruction Fuzzy Hash: 9C317E22A0AB4285EA20AF13B880167F6A0FF84BD0F964575ED8C07775DF3DE425E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 3519880569-1663925961
                                          • Opcode ID: 34a48ab91b12ca1c89951ef2c113a6f5388b11eaa1205b049ac34310286ba828
                                          • Instruction ID: 6aeb7e38e09ac59107963de2c9e1fa05d405bdc53d231ff9b00c50e35909ac10
                                          • Opcode Fuzzy Hash: 34a48ab91b12ca1c89951ef2c113a6f5388b11eaa1205b049ac34310286ba828
                                          • Instruction Fuzzy Hash: A731B462B0A78245EE14AF17A5842BBA360FF84BD4F890571CE4D177B5EF3DE0119310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanf_strdupfree
                                          • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                          • API String ID: 860312144-3309259123
                                          • Opcode ID: 9b6c21fb7c6599bea0d2966efac14e01a133b0400a08b8162234a834becce6a6
                                          • Instruction ID: ac930ca89fba53953e0c7a16a7746ef2c94892ff7f442986d7568648df295993
                                          • Opcode Fuzzy Hash: 9b6c21fb7c6599bea0d2966efac14e01a133b0400a08b8162234a834becce6a6
                                          • Instruction Fuzzy Hash: 53318435B0A65291EA50BF27D4C017FE290FF84780F9248B2DA0E47275DF6EE471A762
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1941130848-1663925961
                                          • Opcode ID: 7e56c2e8ba74402fe288d4c1ef97076b8df79f77a710d275dba80dddc7bb11cb
                                          • Instruction ID: dce477e1166f53a9d087d0c69dc2ee20fa8ae835e0fbaa5c36cccb9cf54b1079
                                          • Opcode Fuzzy Hash: 7e56c2e8ba74402fe288d4c1ef97076b8df79f77a710d275dba80dddc7bb11cb
                                          • Instruction Fuzzy Hash: 35215363B0AA8285EA10DF16A4846ABB364FF45BC4F850471DE4D07775EF2DD111D720
                                          APIs
                                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A4055F85
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A4055FB1
                                          • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A4055FB9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A4055FDB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7A40532CC), ref: 00007FF7A4055FF2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_errnostrerrorstrtoul
                                          • String ID: Invalid zoneid: %s; %s
                                          • API String ID: 439826447-2159854051
                                          • Opcode ID: 2552f959700923b3427cb8006f2c82a18131d612df883aff6fa4de5977450510
                                          • Instruction ID: d9cf8765e464629da29e741830098f7d3d0e8275be2a736427a2f9ce7f64dd19
                                          • Opcode Fuzzy Hash: 2552f959700923b3427cb8006f2c82a18131d612df883aff6fa4de5977450510
                                          • Instruction Fuzzy Hash: 3A11D632A0B64286EB50AF23E8C057AA370FF85B44F954471DA4D83A74DE2ED860E720
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055E94
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EAA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EBE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055ED2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EE6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055EFA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055F0E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A4055F22
                                            • Part of subcall function 00007FF7A407EE20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4055F3B,?,?,00000000,00007FF7A4051983,?,?,00000000,00007FF7A4051F05), ref: 00007FF7A407EE35
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: cc701dd807a2de35d7b90ce0a0f5c20ef81b97b0dbdd88433eb2069ca0843ede
                                          • Instruction ID: fb96cd70828dc5bce96b076b324f4af437e282efd770ea54594871facc9888a0
                                          • Opcode Fuzzy Hash: cc701dd807a2de35d7b90ce0a0f5c20ef81b97b0dbdd88433eb2069ca0843ede
                                          • Instruction Fuzzy Hash: 9D11B336609F80C1D710AF22E9941E973B4FBC9FCAB590531DE9A4F668CF3880A5D230
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                          • Instruction ID: 378aa545782c939a8529675a80748b7cd5a078d99c41644b26bb5f2490b38102
                                          • Opcode Fuzzy Hash: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                          • Instruction Fuzzy Hash: F731132271E74181EE18AF2796841AAE251EB04BE0FC60A71DE6D477F5CF3DE061E310
                                          APIs
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7A4033C35,?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4034FB3
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7A4033C35,?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4034FC1
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF7A4033C35,?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4034FFA
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7A4033C35,?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4035004
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7A4033C35,?,?,?,?,?,00007FF7A4031D9B), ref: 00007FF7A4035012
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A4035041
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: 13b12c59ad332770c5e2ef552953df7cc1051dc384361dca5f05cbda1b42f09a
                                          • Instruction ID: 4d4d83ae6d76fe5020381d0231881f046a14ad47bb44115cdb9947869a0be0e2
                                          • Opcode Fuzzy Hash: 13b12c59ad332770c5e2ef552953df7cc1051dc384361dca5f05cbda1b42f09a
                                          • Instruction Fuzzy Hash: 3A41E62170A68145EA24AF27A64426BE750EB04BE4F990670EF6D0B7F5CF3DF061A310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-2901970132
                                          • Opcode ID: d1af9e19bfd3234d3eeaf2121e00c9d2f5c8de4f447ef79f15fbd6379bd1cdda
                                          • Instruction ID: bf49a45ac2687b74a645dcb4ace5a6ca02098c59e97f10c6dda996c751342159
                                          • Opcode Fuzzy Hash: d1af9e19bfd3234d3eeaf2121e00c9d2f5c8de4f447ef79f15fbd6379bd1cdda
                                          • Instruction Fuzzy Hash: FB41D562A0A78148EB10AF2289841FBB761FF05789F894571DE0D0B7B9EF3DE124D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 49062338fa728a480f03ffc8c73f599868ed05a6081dec6f2208dcaaeaa7c8b2
                                          • Instruction ID: e0d251fff6640931f14c88eb6f4eeb391e1f325e5112cd7a2009accc1c14d92e
                                          • Opcode Fuzzy Hash: 49062338fa728a480f03ffc8c73f599868ed05a6081dec6f2208dcaaeaa7c8b2
                                          • Instruction Fuzzy Hash: 2D419662A0A78148EB14AF2399841FABB51FF05789F8944B1DE4D177B9EF3DE160D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: PLAIN
                                          • API String ID: 3313557100-4000620671
                                          • Opcode ID: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                          • Instruction ID: f339e879770697535c02715e05d1b27beac516d50ea99c5e81ba3358b07d2f96
                                          • Opcode Fuzzy Hash: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                          • Instruction Fuzzy Hash: 6531E472A09B8182EB109F52A5802ABB790FB45BE4F854671DE9C477B6DE3DD015D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-2901970132
                                          • Opcode ID: fea23052cc03ec577b2374940ed169039e7147ae94743ab8b869cfc91bf29e50
                                          • Instruction ID: 2b4f8c65d81dd688c8cd83cf14b64b9fb12daaf9a87b5e0d3ebfd90a84a9fd10
                                          • Opcode Fuzzy Hash: fea23052cc03ec577b2374940ed169039e7147ae94743ab8b869cfc91bf29e50
                                          • Instruction Fuzzy Hash: 98319762A0A78144EB10BF6299801FBB761FF05789F855471DE4D1B7B6EF3DE124A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: callocfreememcpystrchr
                                          • String ID: CAPA$Got unexpected pop3-server response
                                          • API String ID: 2887963327-1591402739
                                          • Opcode ID: 8f7bb6eff1932f0ffaac0f1d66c4d701fe0cc7ba242ca57fc2f904d82a641f28
                                          • Instruction ID: bed812e9dd93fffd6a6383646860683104506f06dfd5767bff487476cc6b920a
                                          • Opcode Fuzzy Hash: 8f7bb6eff1932f0ffaac0f1d66c4d701fe0cc7ba242ca57fc2f904d82a641f28
                                          • Instruction Fuzzy Hash: B731C762B0BB8242FA15BF12948027BB294BB01750FC502B5DB1D032B1CF7EE475A722
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%s%lx$Signature
                                          • API String ID: 2190258309-1406629954
                                          • Opcode ID: 8f7e6674a1c1ba69b688cbb497cb26438ce796b53516a398fe8ab6d44bb0a6f9
                                          • Instruction ID: 4aad7b66419f072ee50a6163c5d317aaacb7fdee94719ae5523e71de8d15d06c
                                          • Opcode Fuzzy Hash: 8f7e6674a1c1ba69b688cbb497cb26438ce796b53516a398fe8ab6d44bb0a6f9
                                          • Instruction Fuzzy Hash: 9231C463B0A68285EA20AF27A5846BBB361FF45BC5F950471DE4D07775EE2EE010E720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupcallocfree
                                          • String ID:
                                          • API String ID: 1236595397-0
                                          • Opcode ID: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                          • Instruction ID: f092858c4f7f0d1423c509d60690ac49b6dcd2f4eed080add096ba4c614e30a7
                                          • Opcode Fuzzy Hash: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                          • Instruction Fuzzy Hash: 9F31A533A0AB8581EB419F26D0903BBA7A0FB85B84F590470DE4D077B5DF2ED4659B21
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 3d01aac320b6837197919b4d404cc678e73ef002af64dabce31c7302412ab6f4
                                          • Instruction ID: 120a6835f4707cc4032428b72030934b4e71e3f29eccde48ff3740c068060a58
                                          • Opcode Fuzzy Hash: 3d01aac320b6837197919b4d404cc678e73ef002af64dabce31c7302412ab6f4
                                          • Instruction Fuzzy Hash: F231A851A0B74244FA14AF6399841FBBB50EF05789F8954B1DE4E076BAEF3DE120A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: 632438d9ac447024213cf64137fedb5f060d340c63d455fcb278728206f4af24
                                          • Instruction ID: 11aa7eecaadc959964ec51a4412012985f5926c9ad2cbc640489f21908ca2a41
                                          • Opcode Fuzzy Hash: 632438d9ac447024213cf64137fedb5f060d340c63d455fcb278728206f4af24
                                          • Instruction Fuzzy Hash: 51319751A0A74244EA10AF6299841FBB750EF05789F8954B5DE4D073BAEF3DE120A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: 9677d2b0a011c57c10e4aa2445b7a7815ea8b8af1046fe33e2643f36df8bb4f2
                                          • Instruction ID: 7d22eb1dcbb2d36f8601b7351b689b5fdc96200b9447f4883ee2a1be320b9df5
                                          • Opcode Fuzzy Hash: 9677d2b0a011c57c10e4aa2445b7a7815ea8b8af1046fe33e2643f36df8bb4f2
                                          • Instruction Fuzzy Hash: 4531A751A0A78244FB10AF6399841FBBB50EF05789F8944B5DE4D077BAEF3DE120A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: OS/400$SITE NAMEFMT 1
                                          • API String ID: 3061335427-2049154998
                                          • Opcode ID: 4a9e05dfc51966e101f837aa05a72b838e2f85a4623016fdb596f5f70d8ea46e
                                          • Instruction ID: 1c169bc4513f8973dd858edfdb3f8af5a3f93d9b9166188033b0b4b294272126
                                          • Opcode Fuzzy Hash: 4a9e05dfc51966e101f837aa05a72b838e2f85a4623016fdb596f5f70d8ea46e
                                          • Instruction Fuzzy Hash: 7431E631E0EE8245E7B46F1294803BAA360BB457A4F8104B1CB8E13671DE3DD466EB21
                                          APIs
                                            • Part of subcall function 00007FF7A4034320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                            • Part of subcall function 00007FF7A4033C40: memcpy.VCRUNTIME140 ref: 00007FF7A4033C93
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40326F2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A4032740
                                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF7A4032790
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7A40327DD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                          • String ID: out_of_range
                                          • API String ID: 2484256320-3053435996
                                          • Opcode ID: 4910cf63ee3357ecd4b6187b3e6a3d560b349bb99ce6059dd4b311dc1bc49d05
                                          • Instruction ID: b1e6bf3bce55620c871b282d7b740c254911268fbe37ea5fac90c382e2d505e7
                                          • Opcode Fuzzy Hash: 4910cf63ee3357ecd4b6187b3e6a3d560b349bb99ce6059dd4b311dc1bc49d05
                                          • Instruction Fuzzy Hash: 0B51C132A1AB4198EB04DF76D9803AD7360FB44798F814675EA6C03AF5DF39E1A5D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _errno_strdupstrcspnstrncmpstrspn
                                          • String ID: 0123456789abcdefABCDEF:.
                                          • API String ID: 2191890455-446397347
                                          • Opcode ID: 3b096047c27d3cc3aeb4b63a3ee3fdb4ca5a52993c628db9d172197649922165
                                          • Instruction ID: 2ded34a54796dbd0bce02d8375e7837acb7f6102e23ac6bfc37e9dd07dda34cf
                                          • Opcode Fuzzy Hash: 3b096047c27d3cc3aeb4b63a3ee3fdb4ca5a52993c628db9d172197649922165
                                          • Instruction Fuzzy Hash: 88412912A0EAC545EB219F22999037BB790EF06744FC600B1DA4D437F5CF2EE465EB22
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                          • API String ID: 573759493-632690687
                                          • Opcode ID: ef0608db8336db747be93a541bb0dfd36b2db52adac83aae4fe57bd2a8464754
                                          • Instruction ID: ba5065e512f57a56fecc84e2b6c3e2971f5aaf8c957875e8f22f0b6b2ee55778
                                          • Opcode Fuzzy Hash: ef0608db8336db747be93a541bb0dfd36b2db52adac83aae4fe57bd2a8464754
                                          • Instruction Fuzzy Hash: C9410621A0EA9285F721EF26968027BFB91EB01741FCA41B1C68D02AB5CF7FD561D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: tolower$_time64
                                          • String ID: :%u$Hostname in DNS cache was stale, zapped
                                          • API String ID: 4068448496-2924501231
                                          • Opcode ID: 78cbedec7f8cce32c60e4a6791c285383e5d29da9d607bd30dc434ffb4fa044e
                                          • Instruction ID: e9a246c0f1323f2470a8141fe913cfda71f536fb61bc95ff308e106f67d31e78
                                          • Opcode Fuzzy Hash: 78cbedec7f8cce32c60e4a6791c285383e5d29da9d607bd30dc434ffb4fa044e
                                          • Instruction Fuzzy Hash: 3641182261AA8291EB10EF22E4807FAA754FB44B98F858272EF5D077B5DF3DE015D311
                                          APIs
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034351
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A4034416
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A403446A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A4034471
                                            • Part of subcall function 00007FF7A408FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7A40343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A408FB32
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID: https://keyauth.win/api/1.2/
                                          • API String ID: 1155477157-3933380396
                                          • Opcode ID: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                          • Instruction ID: 9a14df6d1535d1ee5f8f1eccb644383ba10cee843582a8387e9547936b43cff9
                                          • Opcode Fuzzy Hash: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                          • Instruction Fuzzy Hash: DA310822B0764544EE1CEE27969427A9640DB05FE8FA60670DE2D0BBF5DE3DF0A29310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_close_openmalloc
                                          • String ID: Couldn't open file %s
                                          • API String ID: 3412525164-447283422
                                          • Opcode ID: 0074623fa6ff74a2ece1bd6b24346a1457ce3b464ab42e5d9aa92a68c6f9fb29
                                          • Instruction ID: a1b40878101e19088bc5d3860c966cb432ce13efaf1b2b0365f82b3aed14459b
                                          • Opcode Fuzzy Hash: 0074623fa6ff74a2ece1bd6b24346a1457ce3b464ab42e5d9aa92a68c6f9fb29
                                          • Instruction Fuzzy Hash: A041D631609B8182EB149F26E48027FEBA1FB45BD4F458171EA9C477B4CF3DE0219B22
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnofreememcpyrecv
                                          • String ID: Recv failure: %s
                                          • API String ID: 267823591-4276829032
                                          • Opcode ID: c0b2c462bbfc6f6cf3140b48251a684da05401aabcc64ed099c3ee0977bb49c1
                                          • Instruction ID: a1df75a41af7dce8df232c1ab613a4ff0e6f7f240f7d4f2651d88a4e7fa25858
                                          • Opcode Fuzzy Hash: c0b2c462bbfc6f6cf3140b48251a684da05401aabcc64ed099c3ee0977bb49c1
                                          • Instruction Fuzzy Hash: 1931DF76B0AB4585EB10AF12E8807AAA360FB48FD8F918535DE1C073A5DF3DD465E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                          • API String ID: 1865132094-195851662
                                          • Opcode ID: 122321848ef144a5eb798953ca0c1d251624023bb86852256078e91e6d61a04a
                                          • Instruction ID: d3588f506e46718f45c1f45ced2e2a21530f74a0c294d1bab68690f9a6f66d62
                                          • Opcode Fuzzy Hash: 122321848ef144a5eb798953ca0c1d251624023bb86852256078e91e6d61a04a
                                          • Instruction Fuzzy Hash: 4C41C832B0968181E754EF16E4903AAA790EB84B88F89C071DB4D47375CF3ED4A1D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                          • API String ID: 3985033223-1703240927
                                          • Opcode ID: 3ce65709de6a11b471791b862f119d509be451c9fa4fb6099a890ec0be2c445e
                                          • Instruction ID: 741e656d633761ea822b68373104f623b7f5d031deb949f3f80c7ba25351f7c6
                                          • Opcode Fuzzy Hash: 3ce65709de6a11b471791b862f119d509be451c9fa4fb6099a890ec0be2c445e
                                          • Instruction Fuzzy Hash: 1041F761A0AA4285EF019F02E48037AE760FF44BD4F8686B1DE6D037F5DF6EE4219721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: isupper$_strdupfree
                                          • String ID: FALSE
                                          • API String ID: 3359907120-3701058176
                                          • Opcode ID: 2d34f2484a597a418e879eedd12a99bf32e8c0fb114649a4688457f18027e939
                                          • Instruction ID: 22396fc5454754cbfdcef7fb3478b41890124286d5d010d350db49ae33958bf7
                                          • Opcode Fuzzy Hash: 2d34f2484a597a418e879eedd12a99bf32e8c0fb114649a4688457f18027e939
                                          • Instruction Fuzzy Hash: B5314D22F0F59644FB22EF2A568433AFBD0D701761F8606B1C999019F5CE6F9052D730
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfreestrpbrk
                                          • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                          • API String ID: 1812939018-579818044
                                          • Opcode ID: dbaaae04e0c0637cee1d8c578a156e15624b493c6880e1ad6b2898319cc183af
                                          • Instruction ID: 9103e9691353e06a0092504ee65d8f786492033b2fd890cc5ad924575bed961c
                                          • Opcode Fuzzy Hash: dbaaae04e0c0637cee1d8c578a156e15624b493c6880e1ad6b2898319cc183af
                                          • Instruction Fuzzy Hash: F731F862A19BC181EB01EF26E4806BAE3A1FB94B80F854271EA4D077F1DF7DD511D711
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %s: %s$FALSE$TRUE
                                          • API String ID: 1865132094-3430445539
                                          • Opcode ID: 48ef4f44275e059f43570315525e70aaac057089a6ab25aef8f9a0ec08dab94e
                                          • Instruction ID: f15cda98199aa77ec372b3dad39355a26512343f3b3d648492c8bd6847677076
                                          • Opcode Fuzzy Hash: 48ef4f44275e059f43570315525e70aaac057089a6ab25aef8f9a0ec08dab94e
                                          • Instruction Fuzzy Hash: 6401C851A0E78285EA60BF57A9803BBA350EB45B84F8544B1CE4D03371DF2DD055E360
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
                                          • API String ID: 0-3012371547
                                          • Opcode ID: f3c5e376eb702dc3b8db46d3d4b3b824100d05c1c16a0a2f98ddfe0418445b78
                                          • Instruction ID: afcdb10934764a2b3d53ecfd02954c3df7dcc8a05427b1e18e93f1b7fcc1918c
                                          • Opcode Fuzzy Hash: f3c5e376eb702dc3b8db46d3d4b3b824100d05c1c16a0a2f98ddfe0418445b78
                                          • Instruction Fuzzy Hash: 2861237360938296E704AF2AD4802AAFF92EB41754F854175DB4E437B5EB7EE020DB21
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                          • API String ID: 1294909896-1891748601
                                          • Opcode ID: 0acd3c62f0affb71bdb4f5983a9c6071fe3b6f68cc3a26af6e82112c5b8b5546
                                          • Instruction ID: 9e1c113205fa5509a467fabc2421f2493f6f892e4365633b9728bae645bb0b11
                                          • Opcode Fuzzy Hash: 0acd3c62f0affb71bdb4f5983a9c6071fe3b6f68cc3a26af6e82112c5b8b5546
                                          • Instruction Fuzzy Hash: 7751FD6190EA8245EA64FF3290D03BBE250FB40364F814275D76D076F2DF3EE4A1A762
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3401966785-3412697401
                                          • Opcode ID: fdcb7d946d6f4c56cd4cb5e04898495fa3908ca8b450039cfbc1a8853e139c9d
                                          • Instruction ID: 900f1abd5229a0666a7dff705f7bc763e1f67b682b09660e21448de9f3be96d5
                                          • Opcode Fuzzy Hash: fdcb7d946d6f4c56cd4cb5e04898495fa3908ca8b450039cfbc1a8853e139c9d
                                          • Instruction Fuzzy Hash: 1B418D52B1A65205FB055E278A94336B752E7007F1F854671CA6E43BF5CDAED0A1F320
                                          APIs
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7A408DEB0), ref: 00007FF7A408DF5F
                                            • Part of subcall function 00007FF7A4068210: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7A404B23A,?,?,?,?,?,?,?,00007FF7A404B007), ref: 00007FF7A4068221
                                            • Part of subcall function 00007FF7A4068210: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7A40683C3
                                            • Part of subcall function 00007FF7A4068210: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7A40683E0
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7A408DEB0), ref: 00007FF7A408DFCE
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7A408DEB0), ref: 00007FF7A408DFE8
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7A408DEB0), ref: 00007FF7A408E01E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: xn--
                                          • API String ID: 2644425738-2826155999
                                          • Opcode ID: ab7718be76a938f92153ff67d8a3bc09bce830bfbfa01c6d64e135e4cc2c1985
                                          • Instruction ID: c10cf9698974af6df94f32139929da9052aa85071ef03f10c8a560160805f85a
                                          • Opcode Fuzzy Hash: ab7718be76a938f92153ff67d8a3bc09bce830bfbfa01c6d64e135e4cc2c1985
                                          • Instruction Fuzzy Hash: 6641E751B0E28645FB54AE234A5437BE282DF85BC1F8581B0DE0DC7BF2DE2ED0616760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _errnofreememcpy
                                          • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                          • API String ID: 738009125-4268564757
                                          • Opcode ID: a3fde4d6c4e737fc03a995c0e1cce9bfe319c94d4b915a96f34b7866e6dbaaba
                                          • Instruction ID: 480d9638861f4443f743fd4cd7d7b156b5ac376bc835953d2559262e6642d92e
                                          • Opcode Fuzzy Hash: a3fde4d6c4e737fc03a995c0e1cce9bfe319c94d4b915a96f34b7866e6dbaaba
                                          • Instruction Fuzzy Hash: 8151E66270D7C292EB54AF26D4802FAF360FB45784F854072EA4D03AB5DFBEE0219352
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: 550720ba448e89e296b3177c9229f94ff39cbd34f470cd30af1fe67ce97d91dd
                                          • Instruction ID: 2b2b77ac253b5c209a7dae0b90475c4b55bbf078709fe474aa08664400998108
                                          • Opcode Fuzzy Hash: 550720ba448e89e296b3177c9229f94ff39cbd34f470cd30af1fe67ce97d91dd
                                          • Instruction Fuzzy Hash: E621AF23B09AC186EA109F26E8842ABB360FB44BD8F490572DE5D477B5DF3DD111D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Failure sending QUIT command: %s$QUIT
                                          • API String ID: 1294909896-1162443993
                                          • Opcode ID: 33393fb904642c3d0dcdb626aeb8b9e9c3a7be83ef8c359fc7733d2ec1a96521
                                          • Instruction ID: 10c6d1b939af62539d585fa29065f9f594f69314e306abc87fa77f804594f491
                                          • Opcode Fuzzy Hash: 33393fb904642c3d0dcdb626aeb8b9e9c3a7be83ef8c359fc7733d2ec1a96521
                                          • Instruction Fuzzy Hash: 9F316531A0AB8285EB50EF2394903BBB3A0FB45B84F894475DA4D07A76CF2DD061D731
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$calloc$memcpy
                                          • String ID:
                                          • API String ID: 3478730034-0
                                          • Opcode ID: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                          • Instruction ID: 690f4b0f77a21416bbc2a7a01815c6eb8aaa4dc14c8594ea8ecb7f57eb58ecb9
                                          • Opcode Fuzzy Hash: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                          • Instruction Fuzzy Hash: E421E572B0A78186E710AF13945022BFAA1FB48BD0F964674DA9E5B7B4DF7DD0609320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupmalloc
                                          • String ID:
                                          • API String ID: 4236146995-0
                                          • Opcode ID: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                          • Instruction ID: 6c989c8ae1a080274f9736bcf3e48f14c2000b9c82a69545b49e0e73d3e26ec2
                                          • Opcode Fuzzy Hash: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                          • Instruction Fuzzy Hash: 5D218162B06B8581EB819F2290947AA63E1FB89B94F480074DE4D0B764EF2ED4A0D731
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: 39f8e22e6010466b82858a205a4893210a525d4427fd0ac6815d1becb6796e30
                                          • Instruction ID: 274ca9440bc8d6bb7b4941f6a254ec5d0c0ae5dd5b655bd14981456727b3021d
                                          • Opcode Fuzzy Hash: 39f8e22e6010466b82858a205a4893210a525d4427fd0ac6815d1becb6796e30
                                          • Instruction Fuzzy Hash: 94215363B0AA8285EA10EF27E5846ABB360FF44BC5F850472DE4D07775EE2ED151D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: fdad2967fd82f3e3d00c658805d2c6cd49370dd863365039cb22b4e2afd20a66
                                          • Instruction ID: 89b40bda29950d54239aa4f0775301b4af73fdc10e97922ecb949de6bac0629c
                                          • Opcode Fuzzy Hash: fdad2967fd82f3e3d00c658805d2c6cd49370dd863365039cb22b4e2afd20a66
                                          • Instruction Fuzzy Hash: 0F213063A0AA8285EA10EF26E4846ABB364FF84B84F850472DE4D07775EE2ED151D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: 71971b022ae8657752d3f71a5c925b7cafabf4b199b24d0758c8f45fcc128391
                                          • Instruction ID: 897c6e76d1742c7611cfe1e351b078c323aa45872a276de7cf8fe20338cfdc0c
                                          • Opcode Fuzzy Hash: 71971b022ae8657752d3f71a5c925b7cafabf4b199b24d0758c8f45fcc128391
                                          • Instruction Fuzzy Hash: 78214163B0AA8286EA10EF26E4846ABB364FF84BC4F850472DE4D07775EF2DD151D710
                                          APIs
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A4042E89), ref: 00007FF7A40437EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strncpy
                                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                          • API String ID: 3301158039-3625861382
                                          • Opcode ID: c676b4948ad8de873c01a31b3ac823a8978589e2fd7550f958a9477d6e004ffe
                                          • Instruction ID: 65d1cf7376941a9aacf94f8e0a04c88a6a6aa7e1e53b6db063c1fba8430bcc80
                                          • Opcode Fuzzy Hash: c676b4948ad8de873c01a31b3ac823a8978589e2fd7550f958a9477d6e004ffe
                                          • Instruction Fuzzy Hash: 77113DA1F2D24350EA2C5F1AE5D427A9A60DF04780FCA60F1D64D067B5CD7FE4A4A710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                          • Instruction ID: 250b2ec29bfc023f2bda619a37b3ab20561f7fde89ca9ffc8a5ce5fad7d003a2
                                          • Opcode Fuzzy Hash: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                          • Instruction Fuzzy Hash: 29115B3660AB4186E620AF53E58022AB370FB89B91F454175DF8E03B71CF3EE4B19720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: FALSE$TRUE
                                          • API String ID: 1865132094-1412513891
                                          • Opcode ID: bf6eb78e637c81cfb17562e742971b14b543e94c4e502e08d1207421d1d34735
                                          • Instruction ID: 465a97ada2b85fdea2200986a3ceddfef26fba09480cc4a18116e816ae1410fc
                                          • Opcode Fuzzy Hash: bf6eb78e637c81cfb17562e742971b14b543e94c4e502e08d1207421d1d34735
                                          • Instruction Fuzzy Hash: 374159E1B1B35644FF41AF23968037AB7E1EB10795F8645B1CE0D063F0DE6FA051A220
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _time64$ErrorLast
                                          • String ID: TFTP response timeout
                                          • API String ID: 3339832089-3820788777
                                          • Opcode ID: f198b81d17f944958fe3fa7deee032b74760f22e3bc0fdc82b00a8e68ecdc853
                                          • Instruction ID: 243f4045bdf77010804cc4bffba119b62b5c1a9535131229a7cd913048fb540d
                                          • Opcode Fuzzy Hash: f198b81d17f944958fe3fa7deee032b74760f22e3bc0fdc82b00a8e68ecdc853
                                          • Instruction Fuzzy Hash: FF41B43160EA41C5E760AF26D4802BBA750FB45BA4F824271DE1D437F9DF3DD4119B61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: %s%lx
                                          • API String ID: 573759493-530121141
                                          • Opcode ID: 83e0216097b128f78bbf8f25ef3adfbb666302a4def33d60308c1bae42cbcd87
                                          • Instruction ID: a7cc0996119e0f0ae8f76944034270c2d95d5ea1c8f34b30222d0ff04f403487
                                          • Opcode Fuzzy Hash: 83e0216097b128f78bbf8f25ef3adfbb666302a4def33d60308c1bae42cbcd87
                                          • Instruction Fuzzy Hash: 81312721F0F5A249FB21BF2A96C037ABB91DB11742F9645B1C58A01AB5DE5F9021E730
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: fwrite
                                          • String ID: ...$...
                                          • API String ID: 3559309478-2253869979
                                          • Opcode ID: 302b132ee88cad9bd6f6907226ec01a6f59867d5edaea7f1bdfe6eb2bdd96f98
                                          • Instruction ID: afc1d9aa064937d493aa631736fddf86d4bc270e81acd31c66697bf564aa0a7b
                                          • Opcode Fuzzy Hash: 302b132ee88cad9bd6f6907226ec01a6f59867d5edaea7f1bdfe6eb2bdd96f98
                                          • Instruction Fuzzy Hash: D431262260AA8181EB14EF12D4847FAA3A0FB84B44F828171DA5D037B4CF3FD065C791
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: acceptgetsocknameioctlsocket
                                          • String ID: Connection accepted from server$Error accept()ing server connect
                                          • API String ID: 36920154-2331703088
                                          • Opcode ID: 3fdf254b2d797b3df25c41a06fa42f0211d52f1d92e7b9613cb59294973e1530
                                          • Instruction ID: 638a99f0617a85f471da7e91d79f7ede80094690977e484b32b8e74f36b2d6ae
                                          • Opcode Fuzzy Hash: 3fdf254b2d797b3df25c41a06fa42f0211d52f1d92e7b9613cb59294973e1530
                                          • Instruction Fuzzy Hash: 3A31F62170AA8186EB50EF22E4803ABF350FB48BA4F850274DA6D077F5CF3EE0109B51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s$LIST "%s" *
                                          • API String ID: 0-1744359683
                                          • Opcode ID: 85719f75dcdb96e6197976c791e40f2de33a90732eb886bb89f893e41dc579a2
                                          • Instruction ID: 7d03ba54b7a8581916ca6f7ede8d626525dbe5282cd1491846d9436b3130f847
                                          • Opcode Fuzzy Hash: 85719f75dcdb96e6197976c791e40f2de33a90732eb886bb89f893e41dc579a2
                                          • Instruction Fuzzy Hash: 45118121F0A74191EA54EF16E4801BAE360FB44BC4F894471EE0E07771DF6EE561D351
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 03f7a82f17a8786903f37281df382a9cd04d1e7e65cde419154ad756da80fe8a
                                          • Instruction ID: f4cab00e602a93e437e176f622de187922264443d6fad731a576ccee66562b35
                                          • Opcode Fuzzy Hash: 03f7a82f17a8786903f37281df382a9cd04d1e7e65cde419154ad756da80fe8a
                                          • Instruction Fuzzy Hash: 8311993270AB4585EAA19F15E580366B360AB44790F994271CF9D437B4EF3DD424D724
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: SENT$Sending data failed (%d)
                                          • API String ID: 1802528911-3459338696
                                          • Opcode ID: 6e33643bc433ae606133d3d86b99e8efca57a3561be742b79e0d0dd8d9a006e5
                                          • Instruction ID: a2a415ba2d36f0eb3f00684107b0d722150cb0ac12a92e74924b430176a2a3c3
                                          • Opcode Fuzzy Hash: 6e33643bc433ae606133d3d86b99e8efca57a3561be742b79e0d0dd8d9a006e5
                                          • Instruction Fuzzy Hash: 3801F532709A82C5DB50AF2BE88045ABB20FB84FC4B8A4175DB5D43732DF3AD551C791
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A40622C5), ref: 00007FF7A4061EE8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A40622C5), ref: 00007FF7A4061EF1
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A40622C5), ref: 00007FF7A4061F6A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A40622C5), ref: 00007FF7A4061F7B
                                          • memcpy.VCRUNTIME140(?,?,00000000,00007FF7A40622C5), ref: 00007FF7A4061FA4
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID:
                                          • API String ID: 3401966785-0
                                          • Opcode ID: 64d3edcc426b7471abd7909f8ebfd8dc1fd57c216fe30615d90dc291891f8035
                                          • Instruction ID: de06e676587a7fd3446eb6a785179339391700fdfc484154e051364af4e44972
                                          • Opcode Fuzzy Hash: 64d3edcc426b7471abd7909f8ebfd8dc1fd57c216fe30615d90dc291891f8035
                                          • Instruction Fuzzy Hash: 5631A022B0AB4191EB10AF12E48036AE2A0EB14BD4F850675EE6E0B7F5DF7DD460A311
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 1294909896-910067264
                                          • Opcode ID: 3a97b54dd8c20e641dcfa4d9801de4b2c1f4c98a54d6da2505f9c7397ccb92bd
                                          • Instruction ID: 1c34cfca30ae3782ebe2a13dd134d0da0fe372a36ec4ea454762a8459b790c65
                                          • Opcode Fuzzy Hash: 3a97b54dd8c20e641dcfa4d9801de4b2c1f4c98a54d6da2505f9c7397ccb92bd
                                          • Instruction Fuzzy Hash: 36514C62A0E69544EB10AF229A8427BF765EB01791FC540B2D94D02F74DF7ED4A1E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                          • API String ID: 1294909896-2632828617
                                          • Opcode ID: 837cbaf7fcdd32052fcb9ee980a98d0f492b635fa62e58f140a762f412d0c416
                                          • Instruction ID: 99f6f2b040f3e079c8bc1a93b8f9c44e0ce29df58145cfde0eef8cbf5cde8b88
                                          • Opcode Fuzzy Hash: 837cbaf7fcdd32052fcb9ee980a98d0f492b635fa62e58f140a762f412d0c416
                                          • Instruction Fuzzy Hash: 2841E861A0D69685EA60BF12A6842BAF790EB41791FC64071DE4D03775CF3EE066D720
                                          APIs
                                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A403D1A8), ref: 00007FF7A403D66E
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A403D1A8), ref: 00007FF7A403D69C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A403D1A8), ref: 00007FF7A403D705
                                            • Part of subcall function 00007FF7A408FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7A40343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7A4031B59), ref: 00007FF7A408FB32
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A403D712
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                          • String ID:
                                          • API String ID: 2942768764-0
                                          • Opcode ID: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                          • Instruction ID: 27f7f7b4d09acd9f069b23fc9f2417bf3d1d20137b1fefef0d679b9215dd7ea3
                                          • Opcode Fuzzy Hash: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                          • Instruction Fuzzy Hash: 1041C362706A4585EA18AF36D28427EA751FF44BA0F964671CA2D077F4DF2EF0A1D310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                          • Instruction ID: 87ff2548ab7a9f13a661980cb43323e7c7ce111275e75c36bfa5255e2aeecea1
                                          • Opcode Fuzzy Hash: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                          • Instruction Fuzzy Hash: C7310922A0AB4181DA20FF13A98026BA250FB04BE0F954675DEAD177F5DF3DD0A1D390
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF7A406D2EB), ref: 00007FF7A408B19E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: 073ba612a2cbe85256b1cde721385677e7217a76d979108c03dc8feec761c9f4
                                          • Instruction ID: 2f2b54bbf56971da81a0973b313dc111b7fd88c36c67fd67520719c965f331cb
                                          • Opcode Fuzzy Hash: 073ba612a2cbe85256b1cde721385677e7217a76d979108c03dc8feec761c9f4
                                          • Instruction Fuzzy Hash: F841B232609B4182EA50AF16B5801AAB3A0FB84BD0F554575EFDE03B71DF3DE4A1D310
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF7A406EB30,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF7A408B5D3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A408B65C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: ff90f14b9c377f659e10b31d5fbc85e538c30466ebb5cf373757226f49f20229
                                          • Instruction ID: 363b38d29e94a4b1b9e3917e46b8298cbeba4eb67aebb9236bc811e1fda537f5
                                          • Opcode Fuzzy Hash: ff90f14b9c377f659e10b31d5fbc85e538c30466ebb5cf373757226f49f20229
                                          • Instruction Fuzzy Hash: 8A418232A09B4582E650AF26B5801ABF3A0FB44B90F554674DF8E03BB1DF3DE4A1D710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: 68a1c3225f446567fab754bf297663ac6e7eeb9fa881a6b95c3919f4eb555c52
                                          • Instruction ID: 9c73fcbd3632b6bfedad60b7318e199209277e9dc9bc9cb9dbc5ee4adc9f1fd0
                                          • Opcode Fuzzy Hash: 68a1c3225f446567fab754bf297663ac6e7eeb9fa881a6b95c3919f4eb555c52
                                          • Instruction Fuzzy Hash: 09312A2170A64188EE14AF2792842BEE751EB04BE0F850770EA6D077F5CF7DF061A310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: 928039aa2313746df886399aeceaee311cbda049cd91d4980384f92b41959262
                                          • Instruction ID: cb12d28793790c344c9d44f3abf632390e9ff97ce2932b13f2c4ac80c33f8675
                                          • Opcode Fuzzy Hash: 928039aa2313746df886399aeceaee311cbda049cd91d4980384f92b41959262
                                          • Instruction Fuzzy Hash: 5431F62170A78154EE18AF27A78426AA655EB04BE0F950770DE6D0B7F5CF7DF061A310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                          • API String ID: 1294909896-918878739
                                          • Opcode ID: 5c811be7c639e6a817eeb1eaaef6f6908bb5a2a36ecbc2e96e5375d9d862ee5c
                                          • Instruction ID: 1663fb2123da6cfb9afb62cf2f6b61a923a1c8a329f37f6f30f8c49e71d6c981
                                          • Opcode Fuzzy Hash: 5c811be7c639e6a817eeb1eaaef6f6908bb5a2a36ecbc2e96e5375d9d862ee5c
                                          • Instruction Fuzzy Hash: 5C311B62A0AB8584EB109F22DA802AAB761F744791FD540B1DB4D03B75CF7EE461E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                          • API String ID: 1294909896-1153420294
                                          • Opcode ID: 979e85848d636c6c0b0c76a7e7eb724a988065f1e42c35c4c663c2ae8dca01c9
                                          • Instruction ID: 10d1aa4f8897987e68a46d0d113431240e7c7cecf6d9017b58f9ddd4174d01be
                                          • Opcode Fuzzy Hash: 979e85848d636c6c0b0c76a7e7eb724a988065f1e42c35c4c663c2ae8dca01c9
                                          • Instruction Fuzzy Hash: 6831D421A0EB8188EB60BF62D9806ABB390FB45B81FD64071DB4D07272CF7ED565E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3056473165-3412697401
                                          • Opcode ID: 336f45e28875de01f45820a47226f16eb8b9e84abcdede310df3c5d974aec670
                                          • Instruction ID: 1fcec62e615ea9c365395bef8e1e27c25ff415640c8e71b21137750c3644ee3d
                                          • Opcode Fuzzy Hash: 336f45e28875de01f45820a47226f16eb8b9e84abcdede310df3c5d974aec670
                                          • Instruction Fuzzy Hash: 962105A6B0B64204EF01AE179A44376B762EB04BE4F8645B1CD1D03BF4DE7ED051A320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: isupper$_strdupfree
                                          • String ID:
                                          • API String ID: 3359907120-0
                                          • Opcode ID: 3eb6ae45e014ede4233dc602f349cd239cdeeee396bdebc478bda1a783cc93d4
                                          • Instruction ID: e8e8445790d8b3a2a22680606d8826004676fdd4faabf1d6141978ba0138de99
                                          • Opcode Fuzzy Hash: 3eb6ae45e014ede4233dc602f349cd239cdeeee396bdebc478bda1a783cc93d4
                                          • Instruction Fuzzy Hash: 3E21F821F0F59645FB22EF2A46C433ABBD1DB11741F8605B0C58A019B5CE6F9121D730
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: strstr$calloc
                                          • String ID: ;type=
                                          • API String ID: 3224321581-3507045495
                                          • Opcode ID: 01dc25b4bb57f54fc853f615e9b1a19bf24263f803805d96a8c15628a7dbba92
                                          • Instruction ID: d7c82aaabf894a33707fbcae9bfd86fd604728319d42b7da9bb0c43b980b619c
                                          • Opcode Fuzzy Hash: 01dc25b4bb57f54fc853f615e9b1a19bf24263f803805d96a8c15628a7dbba92
                                          • Instruction Fuzzy Hash: C0213632509AC285EB149F26E4803BAB7A0FB14784F894175DB9D07BF6DF3DE0A19720
                                          APIs
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C878
                                          • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C89E
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C8BF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A4050DC9,?,?,?,?,00007FF7A405016B), ref: 00007FF7A406C8D0
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: realloc$EnvironmentVariablefree
                                          • String ID:
                                          • API String ID: 2828309815-0
                                          • Opcode ID: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                          • Instruction ID: bed02722f6a84ace548e6a8c85f37cedbf04088571c24d9aa8a87de0c7e6f9f3
                                          • Opcode Fuzzy Hash: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                          • Instruction Fuzzy Hash: 5C114221B0E74289E670AF1355C023BE291FB49BC0F560475DD5E43B74DE7EE4506751
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Proxy-Connection: Keep-Alive
                                          • API String ID: 1294909896-2835282938
                                          • Opcode ID: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                          • Instruction ID: bc9bfaf7396174a467defcfc5a66d62f9a72f7dec0070639b0ecde33e3f6e69d
                                          • Opcode Fuzzy Hash: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                          • Instruction Fuzzy Hash: 19010472B06A4152FA156F46A5803BAE260AF44BE0F454674CEAA073F4DF7CD8A5D360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree$strchr
                                          • String ID:
                                          • API String ID: 1739957132-0
                                          • Opcode ID: 0dd7f80735f85da8f984343497c1d3cfee0a952a3c0d7bbcc3984797b00619ee
                                          • Instruction ID: e20ca7544f7999b840116f62591fca3808d475ce4415270fcdd608f6253ad6f5
                                          • Opcode Fuzzy Hash: 0dd7f80735f85da8f984343497c1d3cfee0a952a3c0d7bbcc3984797b00619ee
                                          • Instruction Fuzzy Hash: E501D611B1F78145EE55BF1B62C417AA2D1AF48FC0F8905B0DE4D43B74EE1DD8619320
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7A406D1D3), ref: 00007FF7A406D8C2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7A406D1D3), ref: 00007FF7A406D913
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupmalloc
                                          • String ID: (){ %*]
                                          • API String ID: 3515966317-731572209
                                          • Opcode ID: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                          • Instruction ID: c0e37b4a752d859f098573969f80a48766f7a572d2821e51366e2df89d30a472
                                          • Opcode Fuzzy Hash: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                          • Instruction Fuzzy Hash: CA314901B0E64658FB216F1754C437AEBD19F56754FDA41B1CD8F032F2CA5FA425A232
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupmalloc
                                          • String ID: identity
                                          • API String ID: 3515966317-1788209604
                                          • Opcode ID: d4c4bbbc2fa7c735205f47a9b6ef7a324f82185f1d3be52344d8deb9db7dadb3
                                          • Instruction ID: 76e36e0701a09d2e91945217a1b9ca5b45b8df552e4f85643d8f76ed0b32904e
                                          • Opcode Fuzzy Hash: d4c4bbbc2fa7c735205f47a9b6ef7a324f82185f1d3be52344d8deb9db7dadb3
                                          • Instruction Fuzzy Hash: BC31E821E0AA4581EB019F169480377A7A0EF04BE4F8A9671DE6D033F5EE2EE4259721
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: mallocrealloc
                                          • String ID:
                                          • API String ID: 948496778-3916222277
                                          • Opcode ID: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                          • Instruction ID: 6015f6d46490676ceb5217fea975ccf45c8e87da4692b314a99d49f6ce4777b5
                                          • Opcode Fuzzy Hash: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                          • Instruction Fuzzy Hash: 3A11937260AB8181DB449F26E18026AB3A0FB08FD4F848575DE5E077A8EF39D5A4C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %I64d-
                                          • API String ID: 1865132094-19666937
                                          • Opcode ID: abda5eb413ce93b11bf73c89973972c6922633c2c4b0e22d6fcd2faa1f33085e
                                          • Instruction ID: cb1ed37d5d0e296bb48b86734d6134f3a565218a6174c3a17a984c7eb742a93e
                                          • Opcode Fuzzy Hash: abda5eb413ce93b11bf73c89973972c6922633c2c4b0e22d6fcd2faa1f33085e
                                          • Instruction Fuzzy Hash: 10112972A07682C0EF149F6684893F613A1FB54B44F5D4071C90C8E275DF2F54A79331
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: TRUE
                                          • API String ID: 1865132094-3412697401
                                          • Opcode ID: 3eb87d98ead6b4b41aa3a49ae51076edf6b329d4f89bb2bede70efb61867991e
                                          • Instruction ID: 84da6598ee7802cccff790abc83861d7c2dec6bf2d5564ec5d95666250fc2f6e
                                          • Opcode Fuzzy Hash: 3eb87d98ead6b4b41aa3a49ae51076edf6b329d4f89bb2bede70efb61867991e
                                          • Instruction Fuzzy Hash: A0019BA6B0B65544EB019F13D94037A7761EB04BD5F8548B1CE0E067B4DE7ED091E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: %s: %s
                                          • API String ID: 3985033223-1451338302
                                          • Opcode ID: 59a004d23c9a7171389107e4b7ac2ba63d9e7849cde71739f0039903f637d0dc
                                          • Instruction ID: 1441bd0a0c8a4ad3ead7d08e91bbcffd3e6548160b08dd132f6eeeb800ed2277
                                          • Opcode Fuzzy Hash: 59a004d23c9a7171389107e4b7ac2ba63d9e7849cde71739f0039903f637d0dc
                                          • Instruction Fuzzy Hash: F2F0A451A0E78141EA60BF13A9807FBA350EB45BC4F894471CE4E07372DF2DD165E720
                                          APIs
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046067
                                            • Part of subcall function 00007FF7A4046040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A4050640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7A4042471), ref: 00007FF7A4046073
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C546
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C556
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7A404C564
                                          • memset.VCRUNTIME140 ref: 00007FF7A404C59F
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID:
                                          • API String ID: 2717317152-0
                                          • Opcode ID: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                          • Instruction ID: 3a43e40d20a0c5a9be5e7e7f275c446b35184403385d4cea4632b651b42c96db
                                          • Opcode Fuzzy Hash: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                          • Instruction Fuzzy Hash: 83210933E18B91A3E214DF22D6903A9A360F799744F529225EB9D43A22DF75F1F1D310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                          • Instruction ID: b20ec33092eae043116c5d95c73bf92a0eb88a355dcab6cd76957d1c58b62654
                                          • Opcode Fuzzy Hash: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                          • Instruction Fuzzy Hash: 8E111C22A0AA0181EB50AF26E5D063DB3A4FF94F85F954971CA4E02774CE3DD860E360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                          • Instruction ID: d69d24cd6a936514e4a3202acc328485892fb29bdb1edef9fef816daceea9ad8
                                          • Opcode Fuzzy Hash: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                          • Instruction Fuzzy Hash: A3112536605B80C6E750AF26E580369B3A4F784F84F984176DE8E57338CF39E8A5D760
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A408124E), ref: 00007FF7A4085176
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A408124E), ref: 00007FF7A4085197
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A408124E), ref: 00007FF7A40851B2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7A408124E), ref: 00007FF7A40851C0
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.3300655249.00007FF7A4031000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A4030000, based on PE: true
                                          • Associated: 00000001.00000002.3300641148.00007FF7A4030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300690968.00007FF7A4092000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300709050.00007FF7A40A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.3300724162.00007FF7A40AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff7a4030000_PlusPrivStoreAtt116.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                          • Instruction ID: 75523eb0d143450165fe5d0ac16284f0b6b50e142379ab5a6457559fe0a94053
                                          • Opcode Fuzzy Hash: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                          • Instruction Fuzzy Hash: C711E536606B0186EB14AF26E98012DB3B8FF94F897510576CE5D43778CF39C860D3A0