Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EspPrivStoreAtt116.exe

Overview

General Information

Sample name:EspPrivStoreAtt116.exe
Analysis ID:1590902
MD5:3653a466ffb4ccb78a2898a781dea130
SHA1:7c3a5e4267dfd27585a37b590543c4d9dec73ee2
SHA256:8b09a8bf369165115ad04e9c7f7c0058b506b560ec0324657188592e66cbcd8a
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • EspPrivStoreAtt116.exe (PID: 3128 cmdline: "C:\Users\user\Desktop\EspPrivStoreAtt116.exe" MD5: 3653A466FFB4CCB78A2898A781DEA130)
    • conhost.exe (PID: 6972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7060 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3292 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5688 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5908 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5968 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1476 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7148 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5052 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 764 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7104 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1440 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3876 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3920 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3364 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2072 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2820 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6412 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4592 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7108 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 528 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4308 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4912 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7148 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7104 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5036 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6728 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3688 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2300 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6472 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1520 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1868 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7064 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 984 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EspPrivStoreAtt116.exeVirustotal: Detection: 61%Perma Link
Source: EspPrivStoreAtt116.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
Source: EspPrivStoreAtt116.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6A84D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF747D6A84D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D8F840 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF747D8F840
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D8D750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF747D8D750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D863E0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF747D863E0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D86D00 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF747D86D00
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D69C10 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF747D69C10
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D69B40 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF747D69B40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6CB20 CryptHashData,0_2_00007FF747D6CB20
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6CB30 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF747D6CB30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6CAD0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF747D6CAD0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF747D4F9F0
Source: EspPrivStoreAtt116.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF747D79410
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: EspPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D567E0 malloc,recv,send,WSAGetLastError,0_2_00007FF747D567E0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcionattprivatestore655.exe
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcionattprivatestore655.exeC:
Source: EspPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: EspPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: EspPrivStoreAtt116.exe, 00000000.00000003.2153452773.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153688822.0000029F6DFA2000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF79000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF8C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153688822.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153452773.0000029F6DFA2000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153495880.0000029F6DF8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ace6
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/um
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/DATA=
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D8D750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF747D8D750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6A84D0_2_00007FF747D6A84D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D585D00_2_00007FF747D585D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D592900_2_00007FF747D59290
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D572900_2_00007FF747D57290
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D5FEA00_2_00007FF747D5FEA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D41E400_2_00007FF747D41E40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D41AA00_2_00007FF747D41AA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6A90C0_2_00007FF747D6A90C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6A9150_2_00007FF747D6A915
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D8F7D00_2_00007FF747D8F7D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D8D7500_2_00007FF747D8D750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3974B0_2_00007FF747D3974B
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D417500_2_00007FF747D41750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D685D00_2_00007FF747D685D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3956D0_2_00007FF747D3956D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D863E00_2_00007FF747D863E0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D753000_2_00007FF747D75300
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3D3100_2_00007FF747D3D310
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D492A00_2_00007FF747D492A0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D631A00_2_00007FF747D631A0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D5A1500_2_00007FF747D5A150
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D310000_2_00007FF747D31000
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D50F100_2_00007FF747D50F10
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D6CEE00_2_00007FF747D6CEE0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D81EC00_2_00007FF747D81EC0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3DEA00_2_00007FF747D3DEA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D80E900_2_00007FF747D80E90
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D79E300_2_00007FF747D79E30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D65CF00_2_00007FF747D65CF0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D53C400_2_00007FF747D53C40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3EC300_2_00007FF747D3EC30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D3AC0D0_2_00007FF747D3AC0D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D7DB300_2_00007FF747D7DB30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D50B50 appears 70 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D56400 appears 326 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D5ABB0 appears 37 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D5AC40 appears 33 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D596C0 appears 46 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D43940 appears 49 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D56280 appears 380 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D59790 appears 36 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D5AD20 appears 34 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF747D90B6C appears 47 times
Source: classification engineClassification label: mal56.evad.winEXE@67/18@1/2
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D4279A FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF747D4279A
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6972:120:WilError_03
Source: EspPrivStoreAtt116.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EspPrivStoreAtt116.exeVirustotal: Detection: 61%
Source: EspPrivStoreAtt116.exeReversingLabs: Detection: 63%
Source: EspPrivStoreAtt116.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\EspPrivStoreAtt116.exe "C:\Users\user\Desktop\EspPrivStoreAtt116.exe"
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: EspPrivStoreAtt116.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EspPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D59290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF747D59290
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeWindow / User API: threadDelayed 4756Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeWindow / User API: threadDelayed 5201Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 3578Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-47905
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exe TID: 7056Thread sleep time: -237800s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exe TID: 7056Thread sleep time: -260050s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D9067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF747D9067C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D90A18 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF747D90A18
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D59290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF747D59290
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D90824 SetUnhandledExceptionFilter,0_2_00007FF747D90824
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D9067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF747D9067C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D90384 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF747D90384
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D90894 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF747D90894
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D65370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF747D65370
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D75300 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF747D75300
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D7C060 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF747D7C060
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D57F40 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF747D57F40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF747D7BE00 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF747D7BE00
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590902 Sample: EspPrivStoreAtt116.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 56 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 AI detected suspicious sample 2->43 8 EspPrivStoreAtt116.exe 1 2->8         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 8->35 37 127.0.0.1 unknown unknown 8->37 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 16 other processes 8->17 process6 process7 19 taskkill.exe 1 11->19         started        21 sc.exe 1 13->21         started        23 taskkill.exe 1 15->23         started        25 taskkill.exe 1 17->25         started        27 taskkill.exe 1 17->27         started        29 taskkill.exe 1 17->29         started        31 9 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EspPrivStoreAtt116.exe61%VirustotalBrowse
EspPrivStoreAtt116.exe63%ReversingLabsWin64.Trojan.Generic
EspPrivStoreAtt116.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe0%Avira URL Cloudsafe
http://167.114.85.75/esphvcionattprivatestore655.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/esphvcionattprivatestore655.exe0%Avira URL Cloudsafe
http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:0%Avira URL Cloudsafe
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeEspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcionattprivatestore655.exeC:EspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:EspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcionattprivatestore655.exeEspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      https://keyauth.win/api/1.1/umEspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://keyauth.win/api/1.2/DATA=EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://keyauth.win/api/1.1/ace6EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://curl.haxx.se/docs/http-cookies.htmlEspPrivStoreAtt116.exefalse
              high
              https://curl.haxx.se/docs/http-cookies.html#EspPrivStoreAtt116.exefalse
                high
                https://keyauth.cc/panel/bronkzware/LoaderEspPrivStoreAtt116.exe, 00000000.00000003.2153452773.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153688822.0000029F6DFA2000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF79000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF8C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153688822.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153452773.0000029F6DFA2000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DFA6000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2153495880.0000029F6DF8B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://keyauth.win/api/1.2/EspPrivStoreAtt116.exe, 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.3373469192.0000029F6DF4C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.26.0.5
                  keyauth.winUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1590902
                  Start date and time:2025-01-14 16:47:48 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 34s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:38
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:EspPrivStoreAtt116.exe
                  Detection:MAL
                  Classification:mal56.evad.winEXE@67/18@1/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 48
                  • Number of non-executed functions: 226
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.175.87.197
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  TimeTypeDescription
                  10:49:27API Interceptor179733x Sleep call for process: EspPrivStoreAtt116.exe modified
                  10:50:44API Interceptor388x Sleep call for process: conhost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.0.5AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                    B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                        ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                            IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                              dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                file.exeGet hashmaliciousUnknownBrowse
                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      keyauth.winPlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSemail.emlGet hashmaliciousunknownBrowse
                                      • 172.64.41.3
                                      http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                      • 188.114.96.3
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      http://brillflooring.comGet hashmaliciousUnknownBrowse
                                      • 188.114.96.3
                                      Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.21.64.1
                                      0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                      • 172.65.251.78
                                      http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                      • 104.20.0.15
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.18.95.41
                                      Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                      • 172.67.68.212
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0ehttp://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.26.0.5
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.0.5
                                      http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.0.5
                                      No context
                                      Process:C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):302
                                      Entropy (8bit):3.6129496847513636
                                      Encrypted:false
                                      SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXV/12To3G3oJXV/1WXqowvxOwVGt:H041ls/1HJ/1wcV4
                                      MD5:C7F3DB7690DFC6AF6C4758A6E97F62F8
                                      SHA1:853E06686F94A41861B9379D7C4DF2345561A93C
                                      SHA-256:3F9AECCCCC7B4411BCD809C0093342741B094C43BF546060544E078D76B8C522
                                      SHA-512:F05B260B2A5CCDD4C15EB42DA458B476CC6DFC8F1318587CE690581AF1D2FB785C98C7B8CCABAEF62DDE528BBD4D25D8AEB54241978C4D2C1CCC1DD1876D9A2D
                                      Malicious:false
                                      Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant ESP (HVCI DESLIGADO): ..[2] Iniciar Valorant ESP (HVCI HABILITADO): ....[+] Selecione a opcao:
                                      Process:C:\Windows\System32\cmd.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):44
                                      Entropy (8bit):4.003997527334849
                                      Encrypted:false
                                      SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                      MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                      SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                      SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                      SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                      Malicious:false
                                      Preview:The system cannot find the file specified...
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):6.420268214401962
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:EspPrivStoreAtt116.exe
                                      File size:510'464 bytes
                                      MD5:3653a466ffb4ccb78a2898a781dea130
                                      SHA1:7c3a5e4267dfd27585a37b590543c4d9dec73ee2
                                      SHA256:8b09a8bf369165115ad04e9c7f7c0058b506b560ec0324657188592e66cbcd8a
                                      SHA512:a0a1f67e3df1224fd57baefe57df2438993422d29f1f8965118de636eca6f5eb39c76b210e6e4a703d41df6a7ee2cf9f6e81b2b1d8d365d9d2a5fa331bdde157
                                      SSDEEP:12288:GMPtninPfug6cNLjkEWBBu2cl71MzRUMk:ntninnugrNpWBU2S71AUMk
                                      TLSH:28B47D56A7A817E9D1A7C03CC547C603E7B6B4991311DBDB43A0CA791F237E26E3A720
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x140060368
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677DDF0D [Wed Jan 8 02:12:29 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:551e5f19de2baa264d46ee5c6718793c
                                      Instruction
                                      dec eax
                                      sub esp, 28h
                                      call 00007F52FC90D6C8h
                                      dec eax
                                      add esp, 28h
                                      jmp 00007F52FC90D017h
                                      int3
                                      int3
                                      jmp 00007F52FC90D97Eh
                                      int3
                                      int3
                                      int3
                                      inc eax
                                      push ebx
                                      dec eax
                                      sub esp, 20h
                                      dec eax
                                      mov ebx, ecx
                                      xor ecx, ecx
                                      call dword ptr [00001D9Bh]
                                      dec eax
                                      mov ecx, ebx
                                      call dword ptr [00001D8Ah]
                                      call dword ptr [00001DE4h]
                                      dec eax
                                      mov ecx, eax
                                      mov edx, C0000409h
                                      dec eax
                                      add esp, 20h
                                      pop ebx
                                      dec eax
                                      jmp dword ptr [00001DE0h]
                                      dec eax
                                      mov dword ptr [esp+08h], ecx
                                      dec eax
                                      sub esp, 38h
                                      mov ecx, 00000017h
                                      call dword ptr [00001DD4h]
                                      test eax, eax
                                      je 00007F52FC90D1A9h
                                      mov ecx, 00000002h
                                      int 29h
                                      dec eax
                                      lea ecx, dword ptr [00019492h]
                                      call 00007F52FC90D36Eh
                                      dec eax
                                      mov eax, dword ptr [esp+38h]
                                      dec eax
                                      mov dword ptr [00019579h], eax
                                      dec eax
                                      lea eax, dword ptr [esp+38h]
                                      dec eax
                                      add eax, 08h
                                      dec eax
                                      mov dword ptr [00019509h], eax
                                      dec eax
                                      mov eax, dword ptr [00019562h]
                                      dec eax
                                      mov dword ptr [000193D3h], eax
                                      dec eax
                                      mov eax, dword ptr [esp+40h]
                                      dec eax
                                      mov dword ptr [000194D7h], eax
                                      mov dword ptr [000193ADh], C0000409h
                                      mov dword ptr [000193A7h], 00000001h
                                      mov dword ptr [000000B1h], 00000000h
                                      Programming Language:
                                      • [IMP] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x710800x70.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f400x140.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x606e80x60800663f6c1b9737e67c2a6764e4ebff456eFalse0.5325529266515544data6.334586632421333IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x620000x16ec40x17000ed19f2f03e8e4c95b88fa40516677ba6False0.3795219089673913data5.599387100824537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x790000xe080x40052aed000567e6839374d043cd5841bf5False0.2138671875data2.4461568678801138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x7a0000x405c0x42001f44589aeb34f25d94952a45d7939e4fFalse0.47407670454545453data5.699721075250355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x800000x4ec0x60043a6897ca7133ec62c7e8be294ec97b7False0.5162760416666666data4.831811206446416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                      USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                      ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                      SHELL32.dllShellExecuteA
                                      MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                      urlmon.dllURLDownloadToFileA
                                      Normaliz.dllIdnToAscii
                                      WLDAP32.dll
                                      CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                      WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                      VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                      VCRUNTIME140_1.dll__CxxFrameHandler4
                                      api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                      api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                      api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                      api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                      api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                      api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                      api-ms-win-crt-utility-l1-1-0.dllqsort
                                      api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                      api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:48:50.129962921 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.129991055 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.130068064 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.165471077 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.165491104 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.656239986 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.656346083 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.660722017 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.660732031 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.660953045 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.668724060 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.715326071 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.831197023 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.831280947 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:48:50.832359076 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.865513086 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:48:50.865531921 CET44349708104.26.0.5192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:48:50.106045961 CET5380453192.168.2.51.1.1.1
                                      Jan 14, 2025 16:48:50.113044977 CET53538041.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:48:50.106045961 CET192.168.2.51.1.1.10x45b3Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:48:50.113044977 CET1.1.1.1192.168.2.50x45b3No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:48:50.113044977 CET1.1.1.1192.168.2.50x45b3No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:48:50.113044977 CET1.1.1.1192.168.2.50x45b3No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                      • keyauth.win
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549708104.26.0.54433128C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-14 15:48:50 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                      Host: keyauth.win
                                      Accept: */*
                                      Content-Length: 74
                                      Content-Type: application/x-www-form-urlencoded
                                      2025-01-14 15:48:50 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                      Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                      2025-01-14 15:48:50 UTC1324INHTTP/1.1 200 OK
                                      Date: Tue, 14 Jan 2025 15:48:50 GMT
                                      Content-Type: application/json; charset=UTF-8
                                      Content-Length: 475
                                      Connection: close
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6oENCvJR4qY%2FjVBc4Fux40Lb2sED3M3Qo6%2B9%2BMTDbRoGhmBL6PkVZXeNVzzCcXONvh9d4KKTHbu%2BSn09UENjHGfCwsaz9yIrHAyifYwdKIIce3gpfGb7LbXhuu6m"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Acknowledge: Credit to VaultCord.com
                                      X-Powered-By: VaultCord.com
                                      content-security-policy: upgrade-insecure-requests
                                      permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                      referrer-policy: strict-origin-when-cross-origin
                                      strict-transport-security: max-age=31536000; includeSubDomains
                                      x-content-security-policy: img-src *; media-src * data:;
                                      x-content-type-options: nosniff
                                      x-frame-options: DENY
                                      x-xss-protection: 1; mode=block
                                      Access-Control-Allow-Headers: *
                                      Access-Control-Allow-Methods: *
                                      Access-Control-Allow-Origin: *
                                      Server: cloudflare
                                      CF-RAY: 901ec5c90805431c-EWR
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1665&min_rtt=1633&rtt_var=635&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2344&recv_bytes=862&delivery_rate=1788120&cwnd=237&unsent_bytes=0&cid=3f17444e6fb8ea52&ts=185&x=0"
                                      2025-01-14 15:48:50 UTC45INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69
                                      Data Ascii: {"success":true,"code":68,"message":"Initiali
                                      2025-01-14 15:48:50 UTC430INData Raw: 7a 65 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 61 65 36 32 39 65 30 34 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73 74 6f
                                      Data Ascii: zed","sessionid":"ae629e04","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","custo


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:48:45
                                      Start date:14/01/2025
                                      Path:C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\EspPrivStoreAtt116.exe"
                                      Imagebase:0x7ff747d30000
                                      File size:510'464 bytes
                                      MD5 hash:3653A466FFB4CCB78A2898A781DEA130
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:2
                                      Start time:10:48:45
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:3
                                      Start time:10:48:45
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:10:48:45
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:48:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:48:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:48:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:9
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:13
                                      Start time:10:48:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:10:48:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:10:48:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:10:48:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:10:48:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:10:48:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:10:48:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:10:48:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:10:48:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:10:48:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:10:48:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff70b350000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:10:48:51
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff6a7770000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:10:48:52
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6936f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:22.9%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:105
                                        execution_graph 47355 7ff747d4823b 47356 7ff747d48251 47355->47356 47357 7ff747d48282 47355->47357 47392 7ff747d5fea0 47356->47392 47358 7ff747d4832a 47357->47358 47362 7ff747d48280 47357->47362 47360 7ff747d48344 47358->47360 47365 7ff747d483e4 47358->47365 47682 7ff747d5d120 24 API calls 47360->47682 47364 7ff747d47610 292 API calls 47362->47364 47369 7ff747d47b8b 47362->47369 47363 7ff747d4826a 47679 7ff747d659a0 47363->47679 47364->47369 47367 7ff747d47610 292 API calls 47365->47367 47365->47369 47367->47369 47368 7ff747d48351 47370 7ff747d47610 292 API calls 47368->47370 47372 7ff747d48c32 47369->47372 47376 7ff747d48c23 47369->47376 47379 7ff747d48db0 17 API calls 47369->47379 47388 7ff747d47c2e 47369->47388 47638 7ff747d57b00 47369->47638 47644 7ff747d56280 19 API calls 47369->47644 47645 7ff747d47610 47369->47645 47684 7ff747d51d40 47369->47684 47708 7ff747d46330 15 API calls 47369->47708 47709 7ff747d65af0 22 API calls 47369->47709 47373 7ff747d48371 47370->47373 47374 7ff747d4837a 47373->47374 47375 7ff747d483d6 free 47373->47375 47378 7ff747d48391 47374->47378 47380 7ff747d48383 free 47374->47380 47375->47369 47710 7ff747d56280 19 API calls 47376->47710 47683 7ff747d5c6e0 28 API calls 47378->47683 47379->47369 47380->47369 47385 7ff747d483c7 free 47385->47369 47386 7ff747d483a2 47386->47385 47387 7ff747d56280 19 API calls 47387->47388 47388->47369 47388->47387 47393 7ff747d5ff38 47392->47393 47394 7ff747d5ff71 free _strdup 47393->47394 47397 7ff747d5ff9b 47393->47397 47626 7ff747d5ff4e 47393->47626 47394->47397 47394->47626 47398 7ff747d60065 47397->47398 47399 7ff747d60051 free 47397->47399 47400 7ff747d60084 47398->47400 47751 7ff747d596c0 15 API calls 47398->47751 47399->47398 47402 7ff747d600cf free 47400->47402 47403 7ff747d6012d 47400->47403 47400->47626 47405 7ff747d600e2 free 47402->47405 47412 7ff747d60191 47403->47412 47752 7ff747d64d90 337 API calls 47403->47752 47413 7ff747d60233 47405->47413 47414 7ff747d6025a 47405->47414 47406 7ff747d60179 47409 7ff747d60180 free 47406->47409 47406->47412 47409->47626 47410 7ff747d601ce free 47410->47405 47410->47626 47412->47410 47753 7ff747d64d90 337 API calls 47412->47753 47413->47414 47754 7ff747d596c0 15 API calls 47413->47754 47416 7ff747d60316 free 47414->47416 47417 7ff747d602de free 47414->47417 47414->47626 47418 7ff747d60305 47416->47418 47764 7ff747d596c0 15 API calls 47417->47764 47420 7ff747d6034d 47418->47420 47426 7ff747d60336 47418->47426 47418->47626 47765 7ff747d4c510 6 API calls 47420->47765 47422 7ff747d60359 47766 7ff747d84830 59 API calls 47422->47766 47424 7ff747d60372 47424->47426 47424->47626 47425 7ff747d605bc free 47438 7ff747d605df 47425->47438 47456 7ff747d6033b 47426->47456 47767 7ff747d4d480 free free 47426->47767 47428 7ff747d60448 47430 7ff747d6048f strchr 47428->47430 47448 7ff747d60461 47428->47448 47429 7ff747d603e0 47768 7ff747d4c710 26 API calls 47429->47768 47432 7ff747d604a4 strchr 47430->47432 47430->47448 47437 7ff747d604b7 strchr 47432->47437 47432->47448 47433 7ff747d606e7 47442 7ff747d60710 47433->47442 47444 7ff747d6074b 47433->47444 47434 7ff747d6059c 47770 7ff747d56280 19 API calls 47434->47770 47435 7ff747d603f5 47769 7ff747d4d480 free free 47435->47769 47437->47448 47438->47433 47439 7ff747d60615 47438->47439 47771 7ff747d629a0 strchr strchr strchr malloc memcpy 47439->47771 47440 7ff747d60515 47440->47434 47440->47448 47773 7ff747d596c0 15 API calls 47442->47773 47443 7ff747d605ab 47443->47626 47774 7ff747d596c0 15 API calls 47444->47774 47448->47425 47449 7ff747d6061d 47450 7ff747d6063b 47449->47450 47451 7ff747d60630 free 47449->47451 47449->47626 47453 7ff747d60666 47450->47453 47457 7ff747d60650 memcpy 47450->47457 47452 7ff747d6068f 47451->47452 47460 7ff747d606b3 47452->47460 47772 7ff747d596c0 15 API calls 47452->47772 47455 7ff747d6066b strchr 47453->47455 47454 7ff747d60749 47454->47460 47483 7ff747d6096f 47454->47483 47454->47626 47458 7ff747d6067b free 47455->47458 47459 7ff747d60678 47455->47459 47456->47428 47456->47440 47456->47626 47457->47455 47458->47452 47459->47458 47460->47443 47460->47454 47775 7ff747d7ee50 23 API calls 47460->47775 47463 7ff747d60c00 calloc 47466 7ff747d60c2f 47463->47466 47463->47626 47464 7ff747d60962 47468 7ff747d7ee20 13 API calls 47464->47468 47465 7ff747d609ae 47472 7ff747d609ea free 47465->47472 47473 7ff747d60b3e 47465->47473 47474 7ff747d60a0a 47465->47474 47711 7ff747d62270 47466->47711 47467 7ff747d60a68 47789 7ff747d56280 19 API calls 47467->47789 47468->47443 47471 7ff747d607c7 47471->47464 47471->47626 47776 7ff747d7ef90 47471->47776 47788 7ff747d596c0 15 API calls 47472->47788 47473->47474 47478 7ff747d60b62 free 47473->47478 47474->47463 47474->47626 47475 7ff747d60c43 47484 7ff747d60cb0 47475->47484 47490 7ff747d60c77 47475->47490 47475->47626 47481 7ff747d60b8d 47478->47481 47482 7ff747d60b80 47478->47482 47479 7ff747d60a81 47487 7ff747d60b22 47479->47487 47494 7ff747d60adf 47479->47494 47481->47482 47489 7ff747d60ba0 47481->47489 47793 7ff747d596c0 15 API calls 47482->47793 47483->47465 47483->47467 47483->47479 47483->47494 47485 7ff747d60cde 47484->47485 47486 7ff747d60cb5 47484->47486 47795 7ff747d61eb0 7 API calls 47485->47795 47491 7ff747d62270 25 API calls 47486->47491 47791 7ff747d56280 19 API calls 47487->47791 47488 7ff747d6087a 47780 7ff747d7ee20 47488->47780 47792 7ff747d596c0 15 API calls 47489->47792 47794 7ff747d61eb0 7 API calls 47490->47794 47511 7ff747d60cdc 47491->47511 47494->47465 47500 7ff747d60b09 47494->47500 47790 7ff747d56280 19 API calls 47500->47790 47502 7ff747d60cfb 47508 7ff747d62270 25 API calls 47502->47508 47502->47511 47502->47626 47504 7ff747d60c98 free 47504->47511 47505 7ff747d60882 47505->47483 47506 7ff747d608aa strstr 47505->47506 47507 7ff747d6093f 47505->47507 47509 7ff747d608c2 47506->47509 47507->47483 47508->47511 47509->47507 47785 7ff747d59790 47509->47785 47512 7ff747d62270 25 API calls 47511->47512 47511->47626 47513 7ff747d60ef0 free free free 47512->47513 47515 7ff747d60f2e 47513->47515 47513->47626 47514 7ff747d610eb 47517 7ff747d61231 47514->47517 47514->47626 47799 7ff747d68580 _gmtime64 47514->47799 47515->47514 47516 7ff747d60f91 47515->47516 47522 7ff747d61075 47515->47522 47515->47626 47796 7ff747d4a330 62 API calls 47516->47796 47721 7ff747d62310 47517->47721 47518 7ff747d610c0 47518->47514 47524 7ff747d610d4 47518->47524 47518->47626 47521 7ff747d6111d 47525 7ff747d61123 47521->47525 47542 7ff747d61139 47521->47542 47522->47518 47523 7ff747d61094 47522->47523 47526 7ff747d62270 25 API calls 47522->47526 47527 7ff747d62270 25 API calls 47523->47527 47523->47626 47798 7ff747d61eb0 7 API calls 47524->47798 47800 7ff747d56280 19 API calls 47525->47800 47526->47523 47527->47518 47531 7ff747d610e8 47531->47514 47532 7ff747d6123f 47533 7ff747d61270 47532->47533 47540 7ff747d6165c 47532->47540 47532->47626 47534 7ff747d61603 47533->47534 47537 7ff747d61367 47533->47537 47538 7ff747d61280 47533->47538 47810 7ff747d61eb0 7 API calls 47534->47810 47535 7ff747d61066 47535->47522 47541 7ff747d61370 47537->47541 47558 7ff747d613e1 47537->47558 47538->47534 47556 7ff747d6128a 47538->47556 47539 7ff747d61619 47547 7ff747d62020 62 API calls 47539->47547 47539->47626 47550 7ff747d62270 25 API calls 47540->47550 47554 7ff747d616b5 47540->47554 47544 7ff747d62270 25 API calls 47541->47544 47542->47517 47551 7ff747d59790 13 API calls 47542->47551 47542->47626 47543 7ff747d6105e 47797 7ff747d4a2a0 9 API calls 47543->47797 47545 7ff747d61380 47544->47545 47562 7ff747d62020 62 API calls 47545->47562 47545->47626 47546 7ff747d62270 25 API calls 47557 7ff747d60fd8 47546->47557 47555 7ff747d6163c 47547->47555 47548 7ff747d612db 47559 7ff747d612ff 47548->47559 47548->47626 47802 7ff747d648a0 28 API calls 47548->47802 47550->47554 47560 7ff747d61205 47551->47560 47552 7ff747d61474 47576 7ff747d61551 47552->47576 47588 7ff747d6148f 47552->47588 47553 7ff747d616e1 47577 7ff747d617d1 47553->47577 47598 7ff747d61704 47553->47598 47553->47626 47554->47553 47561 7ff747d62270 25 API calls 47554->47561 47554->47626 47563 7ff747d61646 47555->47563 47564 7ff747d613bf 47555->47564 47556->47548 47572 7ff747d62270 25 API calls 47556->47572 47557->47535 47557->47543 47557->47546 47566 7ff747d62270 25 API calls 47558->47566 47575 7ff747d61430 47558->47575 47803 7ff747d61eb0 7 API calls 47559->47803 47801 7ff747d61eb0 7 API calls 47560->47801 47561->47553 47569 7ff747d613a3 47562->47569 47811 7ff747d56280 19 API calls 47563->47811 47806 7ff747d5d2b0 17 API calls 47564->47806 47566->47575 47568 7ff747d62270 25 API calls 47568->47575 47569->47564 47578 7ff747d613a9 47569->47578 47572->47548 47573 7ff747d612f7 47573->47559 47573->47626 47575->47552 47575->47568 47575->47626 47600 7ff747d61535 47576->47600 47807 7ff747d648a0 28 API calls 47576->47807 47612 7ff747d6177c 47577->47612 47812 7ff747d648a0 28 API calls 47577->47812 47805 7ff747d56280 19 API calls 47578->47805 47583 7ff747d61227 47583->47517 47583->47626 47585 7ff747d61315 47593 7ff747d62020 62 API calls 47585->47593 47585->47626 47586 7ff747d61807 47597 7ff747d61821 47586->47597 47606 7ff747d618f8 47586->47606 47587 7ff747d61991 47820 7ff747d61eb0 7 API calls 47587->47820 47589 7ff747d614cf strchr 47588->47589 47588->47600 47594 7ff747d614e4 strchr 47589->47594 47611 7ff747d61504 47589->47611 47590 7ff747d61747 strchr 47595 7ff747d6175c strchr 47590->47595 47590->47612 47592 7ff747d613d8 47592->47626 47822 7ff747d65af0 22 API calls 47592->47822 47596 7ff747d61343 47593->47596 47599 7ff747d614f7 strchr 47594->47599 47594->47611 47601 7ff747d6176f strchr 47595->47601 47595->47612 47602 7ff747d61349 47596->47602 47603 7ff747d6135f 47596->47603 47604 7ff747d6182e 47597->47604 47597->47606 47598->47590 47598->47612 47599->47611 47808 7ff747d61eb0 7 API calls 47600->47808 47601->47612 47804 7ff747d56280 19 API calls 47602->47804 47821 7ff747d5d2b0 17 API calls 47603->47821 47813 7ff747d61eb0 7 API calls 47604->47813 47619 7ff747d61868 47606->47619 47606->47626 47818 7ff747d61eb0 7 API calls 47606->47818 47607 7ff747d61590 47616 7ff747d62020 62 API calls 47607->47616 47607->47626 47610 7ff747d61953 47731 7ff747d62020 47610->47731 47611->47600 47611->47626 47612->47586 47612->47587 47612->47626 47614 7ff747d61a65 47614->47626 47823 7ff747d56400 47614->47823 47618 7ff747d615e3 47616->47618 47617 7ff747d61844 47623 7ff747d6186d 47617->47623 47624 7ff747d61855 47617->47624 47617->47626 47618->47603 47622 7ff747d615ed 47618->47622 47619->47610 47619->47626 47809 7ff747d56280 19 API calls 47622->47809 47625 7ff747d618b4 47623->47625 47630 7ff747d62270 25 API calls 47623->47630 47814 7ff747d61eb0 7 API calls 47624->47814 47625->47619 47817 7ff747d61eb0 7 API calls 47625->47817 47755 7ff747d8ff10 47626->47755 47633 7ff747d61885 47630->47633 47632 7ff747d6197b 47819 7ff747d56280 19 API calls 47632->47819 47633->47619 47815 7ff747d61eb0 7 API calls 47633->47815 47636 7ff747d6189c 47636->47625 47816 7ff747d61eb0 7 API calls 47636->47816 47639 7ff747d57b4a 47638->47639 47641 7ff747d57b6a 47639->47641 47915 7ff747d5e0c0 47639->47915 47642 7ff747d8ff10 8 API calls 47641->47642 47643 7ff747d57bfe 47642->47643 47643->47369 47644->47369 47646 7ff747d4764c 47645->47646 47671 7ff747d47722 47645->47671 47918 7ff747d4b860 47646->47918 47648 7ff747d47657 free free 47650 7ff747d47687 47648->47650 47649 7ff747d8ff10 8 API calls 47651 7ff747d47757 47649->47651 47652 7ff747d476c5 47650->47652 47946 7ff747d655d0 22 API calls 47650->47946 47651->47369 47936 7ff747d48db0 47652->47936 47655 7ff747d476df 47656 7ff747d4778c 47655->47656 47655->47671 47947 7ff747d5f7f0 free free free free 47655->47947 47940 7ff747d5ee30 47656->47940 47660 7ff747d477bb 47661 7ff747d477c0 free 47660->47661 47661->47661 47662 7ff747d477de 47661->47662 47663 7ff747d4790b 47662->47663 47664 7ff747d47847 47662->47664 47666 7ff747d51d40 90 API calls 47663->47666 47665 7ff747d59790 13 API calls 47664->47665 47667 7ff747d478a6 47665->47667 47668 7ff747d4793d 47666->47668 47948 7ff747d4f050 92 API calls 47667->47948 47951 7ff747d51ec0 292 API calls 47668->47951 47671->47649 47672 7ff747d478c7 47673 7ff747d478cb 47672->47673 47674 7ff747d478f5 47672->47674 47675 7ff747d56400 15 API calls 47673->47675 47950 7ff747d51ec0 292 API calls 47674->47950 47677 7ff747d478e6 47675->47677 47949 7ff747d51ec0 292 API calls 47677->47949 47680 7ff747d5e0c0 2 API calls 47679->47680 47681 7ff747d659ba 47680->47681 47681->47362 47682->47368 47683->47386 47685 7ff747d51e7c 47684->47685 47687 7ff747d51d62 47684->47687 47685->47369 47686 7ff747d51d8f 47689 7ff747d5ee30 9 API calls 47686->47689 47687->47685 47687->47686 47960 7ff747d5f7f0 free free free free 47687->47960 47690 7ff747d51da2 47689->47690 47957 7ff747d81620 47690->47957 47708->47369 47709->47369 47710->47372 47833 7ff747d59800 15 API calls 47711->47833 47713 7ff747d62299 47714 7ff747d622da 47713->47714 47715 7ff747d622a1 47713->47715 47716 7ff747d622f9 47714->47716 47717 7ff747d622e7 free free 47714->47717 47834 7ff747d61eb0 7 API calls 47715->47834 47716->47475 47717->47716 47720 7ff747d622c5 free 47720->47475 47722 7ff747d6233b 47721->47722 47723 7ff747d623c0 strchr 47722->47723 47725 7ff747d62428 _strdup 47722->47725 47728 7ff747d625f4 free 47722->47728 47729 7ff747d6261a 47722->47729 47730 7ff747d62270 25 API calls 47722->47730 47723->47722 47724 7ff747d623d9 strchr 47723->47724 47724->47722 47725->47722 47726 7ff747d62639 47725->47726 47727 7ff747d62643 free free 47726->47727 47726->47729 47727->47729 47728->47722 47729->47532 47730->47722 47732 7ff747d62082 47731->47732 47733 7ff747d620ea 47732->47733 47734 7ff747d62094 47732->47734 47835 7ff747d56ad0 47733->47835 47838 7ff747d5c990 malloc 47734->47838 47736 7ff747d620a9 47738 7ff747d620b0 47736->47738 47739 7ff747d620cf memcpy 47736->47739 47741 7ff747d620c7 47738->47741 47742 7ff747d620b5 free free 47738->47742 47739->47733 47750 7ff747d61971 47741->47750 47742->47741 47743 7ff747d62239 free free 47743->47750 47744 7ff747d6214c 47839 7ff747d561c0 fwrite fwrite 47744->47839 47745 7ff747d6217e 47745->47743 47745->47750 47747 7ff747d6215d 47748 7ff747d62176 47747->47748 47840 7ff747d561c0 fwrite fwrite 47747->47840 47748->47745 47750->47603 47750->47632 47751->47400 47752->47406 47753->47410 47754->47414 47757 7ff747d8ff19 47755->47757 47756 7ff747d4825b 47756->47357 47756->47363 47757->47756 47758 7ff747d903b8 IsProcessorFeaturePresent 47757->47758 47759 7ff747d903d0 47758->47759 47910 7ff747d905ac RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47759->47910 47761 7ff747d903e3 47911 7ff747d90384 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47761->47911 47764->47418 47765->47422 47766->47424 47767->47429 47768->47435 47769->47456 47770->47443 47771->47449 47772->47460 47773->47454 47774->47454 47775->47471 47778 7ff747d7efd3 47776->47778 47777 7ff747d8ff10 8 API calls 47779 7ff747d60872 47777->47779 47778->47777 47779->47464 47779->47488 47781 7ff747d7ee25 47780->47781 47782 7ff747d7ee40 47780->47782 47912 7ff747d7fe00 12 API calls 47781->47912 47782->47505 47913 7ff747d5a150 13 API calls 47785->47913 47787 7ff747d597c3 47787->47507 47788->47474 47789->47443 47790->47443 47791->47443 47792->47474 47793->47474 47794->47504 47795->47502 47796->47557 47797->47535 47798->47531 47799->47521 47800->47443 47801->47583 47802->47573 47803->47585 47804->47626 47805->47443 47806->47592 47807->47611 47808->47607 47809->47443 47810->47539 47811->47443 47812->47612 47813->47617 47814->47619 47815->47636 47816->47625 47817->47619 47818->47619 47819->47443 47820->47606 47821->47592 47822->47614 47824 7ff747d56409 47823->47824 47825 7ff747d5655e 47823->47825 47832 7ff747d564d9 47824->47832 47914 7ff747d59890 13 API calls 47824->47914 47825->47626 47827 7ff747d8ff10 8 API calls 47827->47825 47828 7ff747d564c1 47829 7ff747d5650e fwrite fwrite 47828->47829 47828->47832 47829->47832 47830 7ff747d5645c 47830->47828 47831 7ff747d59790 13 API calls 47830->47831 47831->47828 47832->47827 47833->47713 47834->47720 47841 7ff747d6c5a0 47835->47841 47838->47736 47839->47747 47840->47748 47842 7ff747d6c619 malloc 47841->47842 47843 7ff747d6c5f2 47841->47843 47844 7ff747d6c659 47842->47844 47845 7ff747d6c60c 47842->47845 47843->47842 47843->47845 47846 7ff747d6c679 memcpy 47844->47846 47847 7ff747d8ff10 8 API calls 47845->47847 47856 7ff747d6c6fc 47846->47856 47848 7ff747d56b00 47847->47848 47848->47744 47848->47745 47849 7ff747d6c809 free 47849->47845 47850 7ff747d57b00 10 API calls 47850->47856 47851 7ff747d6c7d1 47889 7ff747d56280 19 API calls 47851->47889 47854 7ff747d6c7e3 47854->47849 47855 7ff747d6c7ab WSAGetLastError 47888 7ff747d56280 19 API calls 47855->47888 47856->47849 47856->47850 47856->47851 47856->47855 47860 7ff747d6c79d 47856->47860 47861 7ff747d668f0 47856->47861 47885 7ff747d56b40 47856->47885 47858 7ff747d6c7c3 47858->47860 47860->47849 47862 7ff747d66937 47861->47862 47866 7ff747d6696b 47861->47866 47863 7ff747d66941 47862->47863 47862->47866 47864 7ff747d6695b Sleep 47863->47864 47865 7ff747d66948 WSASetLastError 47863->47865 47873 7ff747d66964 47863->47873 47864->47873 47865->47873 47869 7ff747d66ab5 47866->47869 47870 7ff747d66ae3 select 47866->47870 47868 7ff747d8ff10 8 API calls 47872 7ff747d66c1e 47868->47872 47871 7ff747d66aba 47869->47871 47874 7ff747d66ac3 WSASetLastError 47869->47874 47875 7ff747d66ad6 Sleep 47869->47875 47870->47871 47871->47873 47876 7ff747d66bac 47871->47876 47877 7ff747d66b82 __WSAFDIsSet __WSAFDIsSet 47871->47877 47872->47856 47873->47868 47874->47871 47875->47871 47878 7ff747d66bdb 47876->47878 47879 7ff747d66bb4 __WSAFDIsSet 47876->47879 47877->47876 47878->47873 47882 7ff747d66be3 __WSAFDIsSet 47878->47882 47880 7ff747d66bc7 47879->47880 47881 7ff747d66bca __WSAFDIsSet 47879->47881 47880->47881 47881->47878 47883 7ff747d66bf9 __WSAFDIsSet 47882->47883 47884 7ff747d66bf6 47882->47884 47883->47873 47884->47883 47890 7ff747d567e0 47885->47890 47888->47858 47889->47854 47891 7ff747d568e7 send 47890->47891 47892 7ff747d5684f 47890->47892 47893 7ff747d56914 47891->47893 47894 7ff747d56905 WSAGetLastError 47891->47894 47892->47891 47897 7ff747d668f0 19 API calls 47892->47897 47898 7ff747d8ff10 8 API calls 47893->47898 47894->47893 47895 7ff747d56920 47894->47895 47908 7ff747d42e10 27 API calls 47895->47908 47900 7ff747d56883 47897->47900 47901 7ff747d56967 47898->47901 47899 7ff747d56932 47909 7ff747d56280 19 API calls 47899->47909 47900->47891 47904 7ff747d5688c 47900->47904 47901->47856 47903 7ff747d56944 47903->47893 47905 7ff747d56894 malloc 47904->47905 47906 7ff747d568c0 recv 47904->47906 47905->47906 47907 7ff747d568dd 47905->47907 47906->47891 47906->47907 47907->47891 47908->47899 47909->47903 47910->47761 47913->47787 47914->47830 47916 7ff747d5e10d GetTickCount 47915->47916 47917 7ff747d5e0d2 QueryPerformanceCounter 47915->47917 47916->47641 47917->47641 47919 7ff747d4b887 47918->47919 47920 7ff747d4b875 47918->47920 47922 7ff747d4b998 EnterCriticalSection LeaveCriticalSection 47919->47922 47923 7ff747d4ba24 free 47919->47923 47920->47919 47921 7ff747d4b87b 47920->47921 47952 7ff747d696b0 WaitForSingleObjectEx CloseHandle 47921->47952 47925 7ff747d4b9db 47922->47925 47926 7ff747d4b9d1 CloseHandle 47922->47926 47923->47648 47928 7ff747d4b9e9 47925->47928 47929 7ff747d4b9e1 47925->47929 47930 7ff747d4b9fc 47926->47930 47927 7ff747d4b880 47927->47919 47954 7ff747d4ba40 7 API calls 47928->47954 47953 7ff747d696b0 WaitForSingleObjectEx CloseHandle 47929->47953 47933 7ff747d4ba11 closesocket 47930->47933 47955 7ff747d46410 free 47930->47955 47933->47923 47934 7ff747d4b9f2 free 47934->47930 47937 7ff747d48e00 47936->47937 47938 7ff747d48dc7 47936->47938 47937->47655 47956 7ff747d46100 17 API calls 47938->47956 47944 7ff747d5ee51 47940->47944 47945 7ff747d5eeaa 47940->47945 47941 7ff747d8ff10 8 API calls 47942 7ff747d4779b free 47941->47942 47942->47660 47942->47662 47943 7ff747d5ee73 _time64 47943->47945 47944->47943 47944->47945 47945->47941 47946->47652 47947->47656 47948->47672 47952->47927 47953->47928 47954->47934 47955->47933 47956->47937 47961 7ff747d84ba0 8 API calls 47957->47961 47959 7ff747d81635 47960->47686 47961->47959 47962 7ff747d489c5 47963 7ff747d489d4 47962->47963 47967 7ff747d489f3 47962->47967 47964 7ff747d489e5 47963->47964 47965 7ff747d48db0 17 API calls 47963->47965 47966 7ff747d47610 292 API calls 47964->47966 47965->47964 47966->47967 47981 7ff747d47b8b 47967->47981 47983 7ff747d46330 15 API calls 47967->47983 47969 7ff747d48db0 17 API calls 47969->47981 47971 7ff747d48c32 47972 7ff747d48c23 47986 7ff747d56280 19 API calls 47972->47986 47974 7ff747d51d40 90 API calls 47974->47981 47976 7ff747d57b00 10 API calls 47976->47981 47977 7ff747d56280 19 API calls 47978 7ff747d47c2e 47977->47978 47978->47977 47978->47981 47980 7ff747d47610 292 API calls 47980->47981 47981->47969 47981->47971 47981->47972 47981->47974 47981->47976 47981->47978 47981->47980 47982 7ff747d56280 19 API calls 47981->47982 47984 7ff747d46330 15 API calls 47981->47984 47985 7ff747d65af0 22 API calls 47981->47985 47982->47981 47983->47981 47984->47981 47985->47981 47986->47971 47987 7ff747d47e80 47988 7ff747d47e91 47987->47988 48015 7ff747d5ed30 47988->48015 47990 7ff747d47ec5 47991 7ff747d47ef7 47990->47991 47992 7ff747d56400 15 API calls 47990->47992 48043 7ff747d5f780 314 API calls 47991->48043 47994 7ff747d47ef1 47992->47994 47994->47991 47996 7ff747d47f07 47994->47996 47995 7ff747d47f04 47995->47996 48019 7ff747d48e30 47996->48019 48001 7ff747d48db0 17 API calls 48012 7ff747d47b8b 48001->48012 48004 7ff747d48c32 48005 7ff747d48c23 48046 7ff747d56280 19 API calls 48005->48046 48007 7ff747d51d40 90 API calls 48007->48012 48009 7ff747d57b00 10 API calls 48009->48012 48010 7ff747d47c2e 48011 7ff747d56280 19 API calls 48010->48011 48010->48012 48011->48010 48012->48001 48012->48004 48012->48005 48012->48007 48012->48009 48012->48010 48014 7ff747d47610 292 API calls 48012->48014 48041 7ff747d56280 19 API calls 48012->48041 48044 7ff747d46330 15 API calls 48012->48044 48045 7ff747d65af0 22 API calls 48012->48045 48014->48012 48016 7ff747d5ed5a 48015->48016 48047 7ff747d5f860 48016->48047 48018 7ff747d5ed79 48018->47990 48029 7ff747d48e96 48019->48029 48020 7ff747d49218 memcpy memcpy 48021 7ff747d49100 48020->48021 48022 7ff747d8ff10 8 API calls 48021->48022 48023 7ff747d47f12 48022->48023 48023->48012 48035 7ff747d5f450 48023->48035 48024 7ff747d48fde calloc 48024->48021 48028 7ff747d48ff8 48024->48028 48025 7ff747d49214 48025->48020 48027 7ff747d490f7 free 48027->48021 48028->48021 48028->48027 48028->48029 48030 7ff747d5e410 malloc memcpy 48028->48030 48032 7ff747d490ef 48028->48032 48062 7ff747d5e750 48028->48062 48029->48024 48029->48028 48031 7ff747d4910a 48029->48031 48030->48028 48031->48020 48031->48025 48068 7ff747d5e6e0 free 48031->48068 48067 7ff747d5e6e0 free 48032->48067 48036 7ff747d5f469 48035->48036 48069 7ff747d527a0 48036->48069 48038 7ff747d5f480 48039 7ff747d47e1c 48038->48039 48040 7ff747d51d40 90 API calls 48038->48040 48039->48012 48042 7ff747d5be90 free 48039->48042 48040->48039 48041->48012 48042->48012 48043->47995 48044->48012 48045->48012 48046->48004 48048 7ff747d5f8a0 48047->48048 48049 7ff747d5f8db 48048->48049 48050 7ff747d5f8c6 tolower 48048->48050 48051 7ff747d59790 13 API calls 48049->48051 48050->48049 48050->48050 48052 7ff747d5f8f2 48051->48052 48053 7ff747d5f95c 48052->48053 48054 7ff747d5f938 tolower 48052->48054 48061 7ff747d5f9d1 48052->48061 48055 7ff747d5f996 _time64 48053->48055 48053->48061 48057 7ff747d59790 13 API calls 48054->48057 48058 7ff747d5f9b5 48055->48058 48055->48061 48056 7ff747d8ff10 8 API calls 48059 7ff747d5f9fc 48056->48059 48057->48053 48060 7ff747d56400 15 API calls 48058->48060 48058->48061 48059->48018 48060->48061 48061->48056 48063 7ff747d5e767 48062->48063 48064 7ff747d5e806 48062->48064 48063->48064 48065 7ff747d5e787 malloc 48063->48065 48064->48028 48066 7ff747d5e7b6 48065->48066 48066->48028 48067->48027 48068->48031 48070 7ff747d659a0 2 API calls 48069->48070 48071 7ff747d527c5 48070->48071 48072 7ff747d527d5 48071->48072 48073 7ff747d527fe free 48071->48073 48074 7ff747d52829 48071->48074 48072->48038 48104 7ff747d596c0 15 API calls 48073->48104 48075 7ff747d5e0c0 2 API calls 48074->48075 48080 7ff747d52835 48074->48080 48077 7ff747d5285f 48075->48077 48078 7ff747d52873 48077->48078 48079 7ff747d528a1 48077->48079 48093 7ff747d57090 48078->48093 48082 7ff747d659a0 2 API calls 48079->48082 48080->48038 48084 7ff747d528ae 48082->48084 48083 7ff747d52889 48085 7ff747d52891 48083->48085 48086 7ff747d5e0c0 2 API calls 48083->48086 48087 7ff747d528d1 48084->48087 48088 7ff747d659a0 2 API calls 48084->48088 48085->48038 48089 7ff747d52964 48086->48089 48105 7ff747d57c10 48087->48105 48088->48087 48089->48038 48092 7ff747d56400 15 API calls 48092->48083 48094 7ff747d5e0c0 2 API calls 48093->48094 48095 7ff747d570b3 48094->48095 48096 7ff747d5712b 48095->48096 48099 7ff747d57144 48095->48099 48200 7ff747d56280 19 API calls 48096->48200 48098 7ff747d5713a 48102 7ff747d57251 48098->48102 48101 7ff747d5724d 48099->48101 48135 7ff747d585d0 48099->48135 48101->48102 48201 7ff747d46100 17 API calls 48101->48201 48102->48083 48104->48074 48106 7ff747d57c47 48105->48106 48107 7ff747d57e43 48105->48107 48106->48107 48109 7ff747d57c61 getpeername 48106->48109 48108 7ff747d8ff10 8 API calls 48107->48108 48110 7ff747d528ea 48108->48110 48111 7ff747d57cbd getsockname 48109->48111 48112 7ff747d57c86 WSAGetLastError 48109->48112 48110->48083 48110->48092 48113 7ff747d57d47 48111->48113 48114 7ff747d57d10 WSAGetLastError 48111->48114 48248 7ff747d42e10 27 API calls 48112->48248 48252 7ff747d56e40 19 API calls 48113->48252 48250 7ff747d42e10 27 API calls 48114->48250 48118 7ff747d57ca3 48249 7ff747d56280 19 API calls 48118->48249 48119 7ff747d57d2d 48251 7ff747d56280 19 API calls 48119->48251 48120 7ff747d57d69 48123 7ff747d57dad 48120->48123 48124 7ff747d57d6d _errno _errno 48120->48124 48255 7ff747d56e40 19 API calls 48123->48255 48253 7ff747d42e10 27 API calls 48124->48253 48127 7ff747d57dff 48127->48107 48129 7ff747d57e03 _errno _errno 48127->48129 48128 7ff747d57d93 48254 7ff747d56280 19 API calls 48128->48254 48256 7ff747d42e10 27 API calls 48129->48256 48132 7ff747d57cb8 48132->48107 48133 7ff747d57e29 48257 7ff747d56280 19 API calls 48133->48257 48136 7ff747d5863f memcpy 48135->48136 48138 7ff747d586a8 socket 48136->48138 48140 7ff747d5867b 48136->48140 48138->48140 48139 7ff747d8ff10 8 API calls 48142 7ff747d58b7b 48139->48142 48144 7ff747d586e7 48140->48144 48194 7ff747d58a04 48140->48194 48222 7ff747d655a0 ioctlsocket 48140->48222 48142->48099 48143 7ff747d58b0a _errno _errno _errno 48243 7ff747d42e10 27 API calls 48143->48243 48144->48143 48202 7ff747d81ad0 48144->48202 48147 7ff747d58734 48147->48143 48150 7ff747d5873d htons 48147->48150 48148 7ff747d58b3b 48244 7ff747d56280 19 API calls 48148->48244 48152 7ff747d56400 15 API calls 48150->48152 48151 7ff747d58b50 48153 7ff747d56ee0 2 API calls 48151->48153 48154 7ff747d5875e 48152->48154 48155 7ff747d589e5 48153->48155 48156 7ff747d587d9 48154->48156 48157 7ff747d5877f setsockopt 48154->48157 48155->48194 48164 7ff747d58811 48156->48164 48224 7ff747d59110 48156->48224 48157->48156 48158 7ff747d587ad WSAGetLastError 48157->48158 48223 7ff747d42e10 27 API calls 48158->48223 48161 7ff747d58815 48167 7ff747d5889a setsockopt 48161->48167 48174 7ff747d588d9 48161->48174 48162 7ff747d58832 getsockopt 48165 7ff747d58859 48162->48165 48166 7ff747d58863 setsockopt 48162->48166 48163 7ff747d587c7 48168 7ff747d56400 15 API calls 48163->48168 48164->48161 48164->48162 48165->48161 48165->48166 48166->48161 48170 7ff747d588c7 48167->48170 48177 7ff747d588de 48167->48177 48168->48156 48169 7ff747d589a7 48171 7ff747d589b8 48169->48171 48173 7ff747d58a0e 48169->48173 48172 7ff747d56400 15 API calls 48170->48172 48232 7ff747d57f40 596 API calls 48171->48232 48172->48174 48221 7ff747d655a0 ioctlsocket 48173->48221 48174->48169 48188 7ff747d589f9 48174->48188 48176 7ff747d58a1b 48179 7ff747d5e0c0 2 API calls 48176->48179 48180 7ff747d5890c WSAIoctl 48177->48180 48182 7ff747d58a25 48179->48182 48180->48174 48183 7ff747d58954 WSAGetLastError 48180->48183 48181 7ff747d589d4 48181->48173 48184 7ff747d589da 48181->48184 48185 7ff747d58a4f 48182->48185 48241 7ff747d46100 17 API calls 48182->48241 48186 7ff747d56400 15 API calls 48183->48186 48233 7ff747d56ee0 48184->48233 48191 7ff747d58a98 WSAGetLastError 48185->48191 48192 7ff747d58a6f connect 48185->48192 48185->48194 48186->48174 48190 7ff747d56ee0 2 API calls 48188->48190 48190->48194 48193 7ff747d58aa5 48191->48193 48191->48194 48192->48191 48192->48194 48193->48194 48242 7ff747d42e10 27 API calls 48193->48242 48194->48139 48196 7ff747d58ac1 48197 7ff747d56400 15 API calls 48196->48197 48198 7ff747d58ad7 48197->48198 48199 7ff747d56ee0 2 API calls 48198->48199 48199->48194 48200->48098 48201->48102 48203 7ff747d81b09 48202->48203 48204 7ff747d81adf 48202->48204 48206 7ff747d59790 13 API calls 48203->48206 48205 7ff747d81ae4 _errno 48204->48205 48212 7ff747d81af7 48204->48212 48205->48147 48207 7ff747d81b78 48206->48207 48208 7ff747d81bc4 _errno 48207->48208 48209 7ff747d81b97 48207->48209 48208->48209 48210 7ff747d8ff10 8 API calls 48209->48210 48211 7ff747d81bdf 48210->48211 48211->48147 48213 7ff747d59790 13 API calls 48212->48213 48214 7ff747d81e6a 48212->48214 48218 7ff747d81df0 48212->48218 48213->48212 48245 7ff747d81b20 14 API calls 48214->48245 48216 7ff747d81e19 48219 7ff747d8ff10 8 API calls 48216->48219 48217 7ff747d81e83 _errno 48217->48216 48218->48216 48218->48217 48220 7ff747d81e57 48219->48220 48220->48147 48221->48176 48222->48144 48223->48163 48225 7ff747d5913d 48224->48225 48226 7ff747d591ef VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 48225->48226 48229 7ff747d59155 48225->48229 48227 7ff747d59244 VerifyVersionInfoA 48226->48227 48228 7ff747d59232 VerSetConditionMask 48226->48228 48227->48229 48228->48227 48230 7ff747d8ff10 8 API calls 48229->48230 48231 7ff747d5927b 48230->48231 48231->48164 48232->48181 48234 7ff747d56f20 closesocket 48233->48234 48236 7ff747d56ef5 48233->48236 48234->48155 48235 7ff747d56f11 48246 7ff747d46410 free 48235->48246 48236->48235 48238 7ff747d56f36 48236->48238 48247 7ff747d46410 free 48238->48247 48240 7ff747d56f3e 48240->48155 48241->48185 48242->48196 48243->48148 48244->48151 48245->48218 48246->48234 48247->48240 48248->48118 48249->48132 48250->48119 48251->48132 48252->48120 48253->48128 48254->48132 48255->48127 48256->48133 48257->48132 48258 7ff747d61da0 48261 7ff747d50480 48258->48261 48260 7ff747d61db7 48262 7ff747d504a7 48261->48262 48264 7ff747d504ae 48261->48264 48310 7ff747d50e60 memset 48262->48310 48265 7ff747d504d4 48264->48265 48266 7ff747d504dd 48264->48266 48268 7ff747d50517 48264->48268 48311 7ff747d56280 19 API calls 48265->48311 48274 7ff747d69700 48266->48274 48292 7ff747d6a390 48266->48292 48268->48260 48269 7ff747d50502 48269->48268 48271 7ff747d659a0 2 API calls 48269->48271 48270 7ff747d50527 48270->48268 48271->48268 48275 7ff747d6a390 48274->48275 48277 7ff747d57b00 10 API calls 48275->48277 48287 7ff747d6a40b 48275->48287 48291 7ff747d6a3d9 48275->48291 48276 7ff747d6a502 48276->48291 48434 7ff747d6baf0 69 API calls 48276->48434 48279 7ff747d6a3f7 48277->48279 48278 7ff747d57b00 10 API calls 48278->48287 48281 7ff747d6a4ec 48279->48281 48312 7ff747d6a580 48279->48312 48433 7ff747d56280 19 API calls 48281->48433 48284 7ff747d6a4e5 48284->48291 48285 7ff747d668f0 19 API calls 48285->48287 48287->48276 48287->48278 48287->48281 48287->48285 48288 7ff747d6a4cd WSAGetLastError 48287->48288 48290 7ff747d6a4bc 48287->48290 48287->48291 48366 7ff747d6b360 48287->48366 48432 7ff747d56280 19 API calls 48288->48432 48290->48281 48290->48291 48291->48269 48293 7ff747d6a3e4 48292->48293 48297 7ff747d6a3d9 48292->48297 48295 7ff747d57b00 10 API calls 48293->48295 48306 7ff747d6a40b 48293->48306 48294 7ff747d6a502 48294->48297 48480 7ff747d6baf0 69 API calls 48294->48480 48298 7ff747d6a3f7 48295->48298 48296 7ff747d57b00 10 API calls 48296->48306 48297->48269 48300 7ff747d6a4ec 48298->48300 48301 7ff747d6a580 74 API calls 48298->48301 48479 7ff747d56280 19 API calls 48300->48479 48301->48306 48303 7ff747d6a4e5 48303->48297 48304 7ff747d668f0 19 API calls 48304->48306 48305 7ff747d6b360 254 API calls 48305->48306 48306->48294 48306->48296 48306->48297 48306->48300 48306->48304 48306->48305 48307 7ff747d6a4cd WSAGetLastError 48306->48307 48309 7ff747d6a4bc 48306->48309 48478 7ff747d56280 19 API calls 48307->48478 48309->48297 48309->48300 48310->48264 48311->48270 48313 7ff747d6a5f2 48312->48313 48314 7ff747d59110 14 API calls 48313->48314 48315 7ff747d6a62e 48314->48315 48316 7ff747d6a641 48315->48316 48317 7ff747d56400 15 API calls 48315->48317 48318 7ff747d6a64a GetModuleHandleA GetProcAddress 48316->48318 48322 7ff747d6a688 48316->48322 48317->48316 48319 7ff747d6a66c 48318->48319 48318->48322 48320 7ff747d59110 14 API calls 48319->48320 48321 7ff747d6a680 48320->48321 48321->48322 48323 7ff747d59110 14 API calls 48322->48323 48329 7ff747d6a6e5 48322->48329 48324 7ff747d6a6e1 48323->48324 48325 7ff747d6a6f2 48324->48325 48324->48329 48449 7ff747d56280 19 API calls 48325->48449 48327 7ff747d6b017 48435 7ff747d68210 48327->48435 48329->48327 48334 7ff747d6a833 48329->48334 48330 7ff747d6b02c 48332 7ff747d6b03f 48330->48332 48335 7ff747d68210 13 API calls 48330->48335 48331 7ff747d8ff10 8 API calls 48333 7ff747d6b31c 48331->48333 48336 7ff747d56400 15 API calls 48332->48336 48338 7ff747d6b052 48332->48338 48333->48287 48450 7ff747d56280 19 API calls 48334->48450 48335->48332 48336->48338 48339 7ff747d6b09b 48338->48339 48341 7ff747d56400 15 API calls 48338->48341 48342 7ff747d6b0fd calloc 48339->48342 48340 7ff747d6b00e 48340->48327 48343 7ff747d6b166 48340->48343 48341->48339 48344 7ff747d6b157 48342->48344 48345 7ff747d6b170 48342->48345 48343->48331 48451 7ff747d56280 19 API calls 48344->48451 48345->48343 48347 7ff747d6b27c 48345->48347 48348 7ff747d6b1d9 free 48345->48348 48351 7ff747d56b40 48 API calls 48347->48351 48349 7ff747d6b20a 48348->48349 48350 7ff747d6b256 48348->48350 48353 7ff747d6b212 48349->48353 48354 7ff747d6b230 48349->48354 48456 7ff747d42620 22 API calls 48350->48456 48355 7ff747d6b29d 48351->48355 48452 7ff747d42620 22 API calls 48353->48452 48454 7ff747d42620 22 API calls 48354->48454 48355->48343 48458 7ff747d56280 19 API calls 48355->48458 48356 7ff747d6b260 48457 7ff747d56280 19 API calls 48356->48457 48360 7ff747d6b219 48453 7ff747d56280 19 API calls 48360->48453 48361 7ff747d6b23a 48455 7ff747d56280 19 API calls 48361->48455 48362 7ff747d6a701 48362->48343 48368 7ff747d6b3d0 48366->48368 48367 7ff747d6bacf 48368->48367 48369 7ff747d6b472 48368->48369 48370 7ff747d6b432 malloc 48368->48370 48371 7ff747d6b478 malloc 48369->48371 48372 7ff747d6b4c3 48369->48372 48370->48367 48370->48369 48371->48367 48371->48372 48373 7ff747d6b530 48372->48373 48374 7ff747d6b4d6 realloc 48372->48374 48379 7ff747d6b575 48373->48379 48460 7ff747d56600 recv 48373->48460 48374->48373 48375 7ff747d6b4f2 48374->48375 48463 7ff747d56280 19 API calls 48375->48463 48378 7ff747d6b5ba malloc 48378->48367 48380 7ff747d6b657 memcpy 48378->48380 48379->48378 48381 7ff747d6b7ca 48379->48381 48388 7ff747d6b501 48379->48388 48382 7ff747d6b677 free 48380->48382 48380->48388 48464 7ff747d56280 19 API calls 48381->48464 48387 7ff747d6b6e9 48382->48387 48382->48388 48383 7ff747d8ff10 8 API calls 48384 7ff747d6b51d 48383->48384 48384->48287 48389 7ff747d6ba5c 48387->48389 48392 7ff747d6b80d 48387->48392 48403 7ff747d6b708 48387->48403 48388->48383 48389->48388 48390 7ff747d6ba6a 48389->48390 48476 7ff747d42620 22 API calls 48390->48476 48394 7ff747d6b816 48392->48394 48395 7ff747d6b854 48392->48395 48393 7ff747d6ba7f 48477 7ff747d56280 19 API calls 48393->48477 48394->48390 48397 7ff747d6b823 48394->48397 48467 7ff747d42620 22 API calls 48395->48467 48465 7ff747d42620 22 API calls 48397->48465 48399 7ff747d56b40 48 API calls 48399->48403 48401 7ff747d6b774 48409 7ff747d6b7a0 memcpy 48401->48409 48411 7ff747d6b8a8 48401->48411 48402 7ff747d6b86b 48468 7ff747d56280 19 API calls 48402->48468 48403->48399 48403->48401 48406 7ff747d6b882 48403->48406 48404 7ff747d6b838 48466 7ff747d56280 19 API calls 48404->48466 48469 7ff747d56280 19 API calls 48406->48469 48408 7ff747d6b7e5 48408->48388 48409->48381 48409->48411 48411->48388 48412 7ff747d6ba30 48411->48412 48415 7ff747d6ba03 48411->48415 48417 7ff747d6b959 48411->48417 48412->48388 48413 7ff747d6ba4b 48412->48413 48475 7ff747d863e0 91 API calls 48413->48475 48473 7ff747d42620 22 API calls 48415->48473 48419 7ff747d6b9cb 48417->48419 48420 7ff747d6b967 memset 48417->48420 48418 7ff747d6ba17 48474 7ff747d56280 19 API calls 48418->48474 48422 7ff747d6b9da CertFreeCertificateContext 48419->48422 48423 7ff747d6b9e0 48419->48423 48425 7ff747d6b98c 48420->48425 48422->48423 48423->48412 48424 7ff747d6b9e4 48423->48424 48472 7ff747d56280 19 API calls 48424->48472 48425->48419 48428 7ff747d6b99c 48425->48428 48431 7ff747d6b9b6 48425->48431 48426 7ff747d6ba29 48426->48419 48428->48431 48470 7ff747d4f9f0 255 API calls 48428->48470 48431->48419 48471 7ff747d56280 19 API calls 48431->48471 48432->48284 48433->48284 48434->48291 48436 7ff747d6821c 48435->48436 48441 7ff747d68246 48435->48441 48437 7ff747d68221 _errno 48436->48437 48446 7ff747d68237 48436->48446 48437->48330 48438 7ff747d68307 48438->48330 48439 7ff747d682a0 strchr 48439->48441 48440 7ff747d683b0 strchr 48442 7ff747d683d0 strchr 48440->48442 48440->48446 48441->48438 48441->48439 48442->48446 48443 7ff747d8ff10 8 API calls 48444 7ff747d68516 48443->48444 48444->48330 48445 7ff747d684c5 48448 7ff747d6845d 48445->48448 48459 7ff747d68260 strchr 48445->48459 48446->48440 48446->48445 48446->48448 48448->48443 48449->48362 48450->48340 48451->48343 48452->48360 48453->48362 48454->48361 48455->48362 48456->48356 48457->48362 48458->48343 48459->48448 48461 7ff747d5661b WSAGetLastError 48460->48461 48462 7ff747d56642 48460->48462 48461->48379 48462->48379 48463->48388 48464->48408 48465->48404 48466->48408 48467->48402 48468->48408 48469->48408 48470->48431 48471->48419 48472->48408 48473->48418 48474->48426 48475->48408 48476->48393 48477->48408 48478->48303 48479->48303 48480->48297 48481 7ff747d4b520 48482 7ff747d4b564 48481->48482 48486 7ff747d4b574 48481->48486 48526 7ff747d5ea00 48482->48526 48483 7ff747d5e0c0 2 API calls 48485 7ff747d4b5b6 48483->48485 48492 7ff747d4bbc0 calloc 48485->48492 48486->48483 48489 7ff747d4b5de 48533 7ff747d56280 19 API calls 48489->48533 48490 7ff747d4b5d5 48493 7ff747d4bd4e _errno 48492->48493 48494 7ff747d4bc11 malloc 48492->48494 48497 7ff747d4b5d1 48493->48497 48495 7ff747d4bc9c InitializeCriticalSectionEx 48494->48495 48496 7ff747d4bcc7 48494->48496 48534 7ff747d65370 socket 48495->48534 48499 7ff747d4bcf0 free 48496->48499 48500 7ff747d4bce0 DeleteCriticalSection free 48496->48500 48497->48489 48497->48490 48502 7ff747d4bd08 48499->48502 48503 7ff747d4bd03 48499->48503 48500->48499 48506 7ff747d4bd18 free 48502->48506 48507 7ff747d4bd12 closesocket 48502->48507 48554 7ff747d68f90 free free free 48503->48554 48504 7ff747d4bd76 _strdup 48504->48496 48508 7ff747d4bd90 free _strdup 48504->48508 48506->48493 48507->48506 48509 7ff747d4bdde 48508->48509 48510 7ff747d4bdb2 48508->48510 48512 7ff747d4bdea EnterCriticalSection LeaveCriticalSection 48509->48512 48513 7ff747d4be61 free 48509->48513 48553 7ff747d69660 _beginthreadex 48510->48553 48515 7ff747d4be14 CloseHandle 48512->48515 48516 7ff747d4be25 48512->48516 48513->48493 48514 7ff747d4bdc6 48514->48497 48517 7ff747d4bdce _errno 48514->48517 48518 7ff747d4be48 48515->48518 48519 7ff747d4be2a 48516->48519 48520 7ff747d4be32 48516->48520 48517->48509 48523 7ff747d4be58 closesocket 48518->48523 48557 7ff747d46410 free 48518->48557 48555 7ff747d696b0 WaitForSingleObjectEx CloseHandle 48519->48555 48556 7ff747d4ba40 7 API calls 48520->48556 48523->48513 48525 7ff747d4be3b free 48525->48518 48527 7ff747d5ea09 48526->48527 48528 7ff747d5ea1f socket 48526->48528 48527->48486 48529 7ff747d5ea3c 48528->48529 48530 7ff747d5ea35 48528->48530 48531 7ff747d56ee0 2 API calls 48529->48531 48530->48486 48532 7ff747d5ea46 48531->48532 48532->48486 48533->48490 48535 7ff747d653c5 htonl setsockopt 48534->48535 48536 7ff747d653c0 48534->48536 48537 7ff747d6554b closesocket closesocket closesocket 48535->48537 48538 7ff747d65424 bind 48535->48538 48539 7ff747d8ff10 8 API calls 48536->48539 48537->48536 48538->48537 48540 7ff747d6543f getsockname 48538->48540 48541 7ff747d4bcbf 48539->48541 48540->48537 48542 7ff747d6545b listen 48540->48542 48541->48496 48541->48504 48542->48537 48543 7ff747d65470 socket 48542->48543 48543->48537 48544 7ff747d6548b connect 48543->48544 48544->48537 48545 7ff747d654a6 accept 48544->48545 48545->48537 48546 7ff747d654c2 48545->48546 48547 7ff747d59790 13 API calls 48546->48547 48548 7ff747d654d9 send 48547->48548 48548->48537 48550 7ff747d6550a recv 48548->48550 48550->48537 48551 7ff747d65528 memcmp 48550->48551 48551->48537 48552 7ff747d6553e closesocket 48551->48552 48552->48536 48553->48514 48554->48502 48555->48520 48556->48525 48557->48523 48558 7ff747d729c0 48559 7ff747d729e9 48558->48559 48560 7ff747d72a50 48558->48560 48562 7ff747d729fa 48559->48562 48563 7ff747d72a10 48559->48563 48633 7ff747d5bfe0 48560->48633 48631 7ff747d5bee0 405 API calls 48562->48631 48593 7ff747d57290 48563->48593 48566 7ff747d72a5d 48573 7ff747d72ac1 48566->48573 48579 7ff747d72b3a 48566->48579 48653 7ff747d8b390 35 API calls 48566->48653 48567 7ff747d72a05 48569 7ff747d72a21 48569->48579 48632 7ff747d73640 65 API calls 48569->48632 48571 7ff747d72bee 48661 7ff747d5d2b0 17 API calls 48571->48661 48572 7ff747d72af2 48574 7ff747d72b4e 48572->48574 48575 7ff747d72afe 48572->48575 48573->48571 48573->48572 48573->48579 48588 7ff747d72b57 48574->48588 48657 7ff747d8d420 _errno strtoll _errno 48574->48657 48654 7ff747d73350 271 API calls 48575->48654 48580 7ff747d72a45 48582 7ff747d72b08 48582->48579 48655 7ff747d72ea0 26 API calls 48582->48655 48584 7ff747d72bae 48584->48579 48660 7ff747d8b390 35 API calls 48584->48660 48587 7ff747d72b23 48587->48579 48656 7ff747d73290 32 API calls 48587->48656 48588->48584 48659 7ff747d736e0 72 API calls 48588->48659 48589 7ff747d72b73 48589->48584 48589->48588 48590 7ff747d72b99 48589->48590 48658 7ff747d736e0 72 API calls 48590->48658 48594 7ff747d572e8 48593->48594 48604 7ff747d572df 48593->48604 48595 7ff747d5e0c0 2 API calls 48594->48595 48598 7ff747d57302 48595->48598 48596 7ff747d8ff10 8 API calls 48597 7ff747d57815 48596->48597 48597->48560 48597->48569 48599 7ff747d57379 48598->48599 48600 7ff747d57392 48598->48600 48683 7ff747d56280 19 API calls 48599->48683 48601 7ff747d5739c 48600->48601 48629 7ff747d573c9 48600->48629 48603 7ff747d58460 611 API calls 48601->48603 48605 7ff747d573aa 48603->48605 48604->48596 48605->48604 48608 7ff747d58570 51 API calls 48605->48608 48606 7ff747d668f0 19 API calls 48606->48629 48607 7ff747d576a5 48607->48604 48685 7ff747d58b90 616 API calls 48607->48685 48608->48604 48610 7ff747d57614 SleepEx getsockopt 48611 7ff747d5765c WSAGetLastError 48610->48611 48610->48629 48611->48629 48612 7ff747d575b6 SleepEx getsockopt 48614 7ff747d575fe WSAGetLastError 48612->48614 48612->48629 48613 7ff747d56400 15 API calls 48613->48629 48614->48629 48615 7ff747d576d7 48686 7ff747d42e10 27 API calls 48615->48686 48616 7ff747d576e3 48619 7ff747d5773b 48616->48619 48621 7ff747d56ee0 2 API calls 48616->48621 48617 7ff747d574c7 WSASetLastError 48617->48629 48618 7ff747d576be 48618->48604 48618->48615 48662 7ff747d58460 48619->48662 48621->48619 48623 7ff747d577b7 48687 7ff747d56280 19 API calls 48623->48687 48624 7ff747d57759 48624->48604 48675 7ff747d58570 48624->48675 48627 7ff747d57388 48627->48604 48629->48606 48629->48607 48629->48610 48629->48612 48629->48613 48629->48616 48629->48617 48630 7ff747d58b90 616 API calls 48629->48630 48684 7ff747d42e10 27 API calls 48629->48684 48630->48629 48631->48567 48632->48580 48634 7ff747d5c02f 48633->48634 48635 7ff747d5c014 48633->48635 48637 7ff747d5c071 memset 48634->48637 48640 7ff747d5c035 48634->48640 48635->48634 48636 7ff747d50480 255 API calls 48635->48636 48636->48634 48641 7ff747d5c0a3 48637->48641 48638 7ff747d8ff10 8 API calls 48639 7ff747d5c1d5 48638->48639 48639->48566 48640->48638 48642 7ff747d5c0fe calloc 48641->48642 48643 7ff747d5c176 48641->48643 48645 7ff747d5c12c 48642->48645 48646 7ff747d5c116 48642->48646 48692 7ff747d5b390 404 API calls 48643->48692 48648 7ff747d56400 15 API calls 48645->48648 48646->48640 48647 7ff747d5c186 48650 7ff747d56400 15 API calls 48647->48650 48651 7ff747d5c1a1 48647->48651 48649 7ff747d5c13b 48648->48649 48649->48643 48650->48651 48651->48640 48652 7ff747d5c1ab free 48651->48652 48652->48640 48653->48573 48654->48582 48655->48587 48656->48579 48657->48589 48658->48584 48659->48584 48660->48579 48661->48579 48663 7ff747d58477 48662->48663 48664 7ff747d58565 48662->48664 48665 7ff747d58547 48663->48665 48666 7ff747d5851a 48663->48666 48668 7ff747d584fc 48663->48668 48664->48624 48690 7ff747d66d50 583 API calls 48665->48690 48689 7ff747d673a0 610 API calls 48666->48689 48668->48666 48671 7ff747d58501 48668->48671 48670 7ff747d58560 48670->48624 48688 7ff747d56280 19 API calls 48671->48688 48672 7ff747d58542 48672->48624 48674 7ff747d58510 48674->48624 48676 7ff747d5859d 48675->48676 48677 7ff747d58590 48675->48677 48679 7ff747d57c10 47 API calls 48676->48679 48678 7ff747d659a0 2 API calls 48677->48678 48678->48676 48680 7ff747d585ad 48679->48680 48691 7ff747d529b0 15 API calls 48680->48691 48682 7ff747d585b5 48682->48604 48683->48627 48684->48629 48685->48618 48686->48623 48687->48627 48688->48674 48689->48672 48690->48670 48691->48682 48692->48647 48693 7ff747d48708 48694 7ff747d48721 48693->48694 48695 7ff747d487af 48694->48695 48698 7ff747d48984 48694->48698 48734 7ff747d5ce20 48695->48734 48778 7ff747d46100 17 API calls 48698->48778 48701 7ff747d487d4 48702 7ff747d48870 48701->48702 48704 7ff747d487de 48701->48704 48710 7ff747d48805 48701->48710 48703 7ff747d48921 48702->48703 48709 7ff747d48878 48702->48709 48731 7ff747d47b8b 48703->48731 48777 7ff747d46100 17 API calls 48703->48777 48707 7ff747d47610 292 API calls 48704->48707 48706 7ff747d48db0 17 API calls 48706->48731 48707->48731 48709->48710 48712 7ff747d488fb free 48709->48712 48713 7ff747d4888e 48709->48713 48714 7ff747d47610 292 API calls 48710->48714 48711 7ff747d48c32 48712->48710 48716 7ff747d4889b free 48713->48716 48713->48731 48717 7ff747d48823 48714->48717 48715 7ff747d48c23 48781 7ff747d56280 19 API calls 48715->48781 48776 7ff747d5c6e0 28 API calls 48716->48776 48775 7ff747d5c6e0 28 API calls 48717->48775 48721 7ff747d488c3 free 48723 7ff747d488d9 48721->48723 48721->48731 48722 7ff747d48854 free 48722->48731 48726 7ff747d47610 292 API calls 48723->48726 48724 7ff747d51d40 90 API calls 48724->48731 48726->48731 48727 7ff747d57b00 10 API calls 48727->48731 48728 7ff747d48832 48728->48722 48729 7ff747d56280 19 API calls 48730 7ff747d47c2e 48729->48730 48730->48729 48730->48731 48731->48706 48731->48711 48731->48715 48731->48724 48731->48727 48731->48730 48733 7ff747d47610 292 API calls 48731->48733 48773 7ff747d56280 19 API calls 48731->48773 48779 7ff747d46330 15 API calls 48731->48779 48780 7ff747d65af0 22 API calls 48731->48780 48733->48731 48735 7ff747d5ce71 48734->48735 48736 7ff747d5cebf 48735->48736 48737 7ff747d668f0 19 API calls 48735->48737 48738 7ff747d5cedd 48736->48738 48739 7ff747d5cec6 48736->48739 48737->48736 48741 7ff747d5cf09 48738->48741 48782 7ff747d5d530 48738->48782 48815 7ff747d56280 19 API calls 48739->48815 48742 7ff747d5cf3e 48741->48742 48743 7ff747d5cf26 48741->48743 48762 7ff747d487c3 48741->48762 48745 7ff747d5e0c0 2 API calls 48742->48745 48816 7ff747d5dc80 90 API calls 48743->48816 48753 7ff747d5cf48 48745->48753 48747 7ff747d5cf36 48747->48742 48747->48762 48748 7ff747d5cfb8 48817 7ff747d65af0 22 API calls 48748->48817 48750 7ff747d5cfc0 48750->48762 48818 7ff747d66c60 23 API calls 48750->48818 48752 7ff747d5cfde 48754 7ff747d5cff2 48752->48754 48756 7ff747d5d072 48752->48756 48752->48762 48753->48748 48755 7ff747d56400 15 API calls 48753->48755 48758 7ff747d57b00 10 API calls 48754->48758 48755->48748 48757 7ff747d5d0d9 48756->48757 48759 7ff747d5d0b0 48756->48759 48764 7ff747d5d097 48756->48764 48823 7ff747d65af0 22 API calls 48757->48823 48760 7ff747d5d001 48758->48760 48759->48757 48765 7ff747d5d0c3 48759->48765 48760->48762 48763 7ff747d5d00a 48760->48763 48762->48701 48774 7ff747d5d120 24 API calls 48762->48774 48769 7ff747d5d05c 48763->48769 48770 7ff747d5d041 48763->48770 48821 7ff747d56280 19 API calls 48764->48821 48822 7ff747d56280 19 API calls 48765->48822 48768 7ff747d5ced5 48768->48762 48820 7ff747d56280 19 API calls 48769->48820 48819 7ff747d56280 19 API calls 48770->48819 48773->48731 48774->48701 48775->48728 48776->48721 48777->48731 48778->48731 48779->48731 48780->48731 48781->48711 48810 7ff747d5d580 48782->48810 48784 7ff747d659a0 2 API calls 48784->48810 48785 7ff747d5daba 48787 7ff747d56400 15 API calls 48785->48787 48808 7ff747d5dad3 48785->48808 48786 7ff747d5e0c0 2 API calls 48786->48810 48787->48808 48789 7ff747d5da97 48789->48785 48791 7ff747d56400 15 API calls 48789->48791 48790 7ff747d5d810 48790->48810 48828 7ff747d561c0 fwrite fwrite 48790->48828 48829 7ff747d561c0 fwrite fwrite 48790->48829 48791->48785 48795 7ff747d5db51 48796 7ff747d5db6d 48795->48796 48797 7ff747d5db56 48795->48797 48834 7ff747d56280 19 API calls 48796->48834 48833 7ff747d56280 19 API calls 48797->48833 48798 7ff747d5dabf 48801 7ff747d5dac7 48798->48801 48802 7ff747d5daf3 48798->48802 48800 7ff747d56400 15 API calls 48800->48810 48805 7ff747d56400 15 API calls 48801->48805 48832 7ff747d56280 19 API calls 48802->48832 48803 7ff747d5daff 48803->48808 48805->48808 48807 7ff747d5d7ec 48809 7ff747d56400 15 API calls 48807->48809 48808->48741 48811 7ff747d5db18 48809->48811 48810->48784 48810->48785 48810->48786 48810->48789 48810->48790 48810->48795 48810->48798 48810->48800 48810->48807 48810->48808 48812 7ff747d561a0 23 API calls 48810->48812 48824 7ff747d56570 48810->48824 48827 7ff747d631a0 192 API calls 48810->48827 48830 7ff747d82ea0 23 API calls 48810->48830 48831 7ff747d6f9c0 23 API calls 48810->48831 48814 7ff747d56400 15 API calls 48811->48814 48812->48810 48814->48808 48815->48768 48816->48747 48817->48750 48818->48752 48819->48768 48820->48768 48821->48768 48822->48768 48823->48762 48835 7ff747d6bed0 48824->48835 48827->48810 48828->48790 48829->48810 48830->48810 48831->48810 48832->48803 48833->48803 48834->48803 48836 7ff747d6bf6e 48835->48836 48837 7ff747d6bf4f 48835->48837 48839 7ff747d6bf75 48836->48839 48840 7ff747d6bf92 48836->48840 48837->48836 48838 7ff747d6bf55 48837->48838 48841 7ff747d56400 15 API calls 48838->48841 48842 7ff747d56400 15 API calls 48839->48842 48843 7ff747d6bf98 48840->48843 48845 7ff747d6bfb1 48840->48845 48853 7ff747d6bf64 48841->48853 48842->48853 48844 7ff747d56400 15 API calls 48843->48844 48844->48853 48846 7ff747d6bfe0 realloc 48845->48846 48848 7ff747d6c02e 48845->48848 48869 7ff747d6c0a9 48845->48869 48846->48848 48849 7ff747d6c00d 48846->48849 48847 7ff747d6c406 48850 7ff747d6c505 memcpy memcpy 48847->48850 48854 7ff747d6c54b 48847->48854 48852 7ff747d56600 2 API calls 48848->48852 48881 7ff747d56280 19 API calls 48849->48881 48850->48854 48856 7ff747d6c077 48852->48856 48853->48847 48857 7ff747d59110 14 API calls 48853->48857 48858 7ff747d8ff10 8 API calls 48854->48858 48855 7ff747d6c024 48855->48853 48862 7ff747d6c09d 48856->48862 48863 7ff747d6c26e 48856->48863 48856->48869 48859 7ff747d6c3f6 48857->48859 48860 7ff747d565cb 48858->48860 48859->48847 48861 7ff747d56400 15 API calls 48859->48861 48860->48810 48861->48847 48865 7ff747d56400 15 API calls 48862->48865 48864 7ff747d56400 15 API calls 48863->48864 48864->48869 48865->48869 48866 7ff747d56400 15 API calls 48866->48853 48867 7ff747d56400 15 API calls 48867->48869 48868 7ff747d6a390 255 API calls 48868->48869 48869->48853 48869->48867 48869->48868 48870 7ff747d6c417 48869->48870 48871 7ff747d6c1b0 realloc 48869->48871 48874 7ff747d6c38e 48869->48874 48875 7ff747d6c1fb memcpy 48869->48875 48877 7ff747d6c24b memcpy 48869->48877 48873 7ff747d6c446 48870->48873 48870->48874 48871->48869 48872 7ff747d6c476 48871->48872 48883 7ff747d56280 19 API calls 48872->48883 48882 7ff747d42620 22 API calls 48873->48882 48874->48853 48874->48866 48875->48869 48877->48869 48879 7ff747d6c45f 48880 7ff747d56400 15 API calls 48879->48880 48880->48853 48881->48855 48882->48879 48883->48855 48884 7ff747d47d4c 48885 7ff747d659a0 2 API calls 48884->48885 48886 7ff747d47d59 48885->48886 48887 7ff747d47d75 48886->48887 48942 7ff747d46100 17 API calls 48886->48942 48888 7ff747d47d91 48887->48888 48943 7ff747d46100 17 API calls 48887->48943 48911 7ff747d51aa0 free free 48888->48911 48892 7ff747d47da1 48893 7ff747d56400 15 API calls 48892->48893 48896 7ff747d47df7 48892->48896 48908 7ff747d47b8b 48892->48908 48894 7ff747d47deb 48893->48894 48895 7ff747d48db0 17 API calls 48894->48895 48895->48896 48896->48908 48944 7ff747d5be90 free 48896->48944 48899 7ff747d48c32 48900 7ff747d48c23 48947 7ff747d56280 19 API calls 48900->48947 48902 7ff747d48db0 17 API calls 48902->48908 48903 7ff747d51d40 90 API calls 48903->48908 48905 7ff747d57b00 10 API calls 48905->48908 48906 7ff747d56280 19 API calls 48907 7ff747d47c2e 48906->48907 48907->48906 48907->48908 48908->48899 48908->48900 48908->48902 48908->48903 48908->48905 48908->48907 48910 7ff747d47610 292 API calls 48908->48910 48941 7ff747d56280 19 API calls 48908->48941 48945 7ff747d46330 15 API calls 48908->48945 48946 7ff747d65af0 22 API calls 48908->48946 48910->48908 48948 7ff747d51880 48911->48948 48914 7ff747d51880 292 API calls 48915 7ff747d51b06 memset 48914->48915 48981 7ff747d53230 48915->48981 48917 7ff747d51bce 48920 7ff747d51d40 90 API calls 48917->48920 48921 7ff747d51b4d 48917->48921 48919 7ff747d659a0 2 API calls 48922 7ff747d51b6f 48919->48922 48920->48921 48921->48892 48922->48921 48923 7ff747d51b9b free 48922->48923 48924 7ff747d51bc2 48922->48924 49071 7ff747d596c0 15 API calls 48923->49071 48924->48917 48925 7ff747d5e0c0 2 API calls 48924->48925 48927 7ff747d51c10 48925->48927 48928 7ff747d51c4d 48927->48928 48929 7ff747d51c24 48927->48929 48931 7ff747d659a0 2 API calls 48928->48931 48930 7ff747d57090 616 API calls 48929->48930 48932 7ff747d51c3a 48930->48932 48933 7ff747d51c5a 48931->48933 48932->48917 48934 7ff747d51d07 48932->48934 48936 7ff747d51c7d 48933->48936 48937 7ff747d659a0 2 API calls 48933->48937 48935 7ff747d5e0c0 2 API calls 48934->48935 48935->48921 48938 7ff747d57c10 47 API calls 48936->48938 48937->48936 48939 7ff747d51c97 48938->48939 48939->48934 48940 7ff747d56400 15 API calls 48939->48940 48940->48934 48941->48908 48942->48887 48943->48888 48944->48908 48945->48908 48946->48908 48947->48899 48949 7ff747d51a8b 48948->48949 48950 7ff747d5188f 48948->48950 48949->48914 48950->48949 49072 7ff747d46330 15 API calls 48950->49072 48952 7ff747d518ad 48953 7ff747d518c1 48952->48953 49073 7ff747d47240 292 API calls 48952->49073 48955 7ff747d518d2 48953->48955 49074 7ff747d46f30 292 API calls 48953->49074 48957 7ff747d51903 48955->48957 48958 7ff747d518f6 free 48955->48958 49075 7ff747d51ec0 292 API calls 48957->49075 48958->48957 48982 7ff747d53275 48981->48982 49070 7ff747d53299 48982->49070 49076 7ff747d52a30 calloc 48982->49076 48984 7ff747d532ab 48984->49070 49091 7ff747d54ea0 48984->49091 48985 7ff747d8ff10 8 API calls 48986 7ff747d51b35 48985->48986 48986->48917 48986->48919 48986->48921 48989 7ff747d532f4 48991 7ff747d53312 48989->48991 48992 7ff747d53300 _strdup 48989->48992 48990 7ff747d532e2 _strdup 48990->48989 48990->49070 49141 7ff747d53c40 48991->49141 48992->48991 48992->49070 48996 7ff747d59790 13 API calls 48997 7ff747d53385 48996->48997 48997->49070 49200 7ff747d54490 48997->49200 48998 7ff747d533d7 48999 7ff747d5341c _strdup 48998->48999 49000 7ff747d53432 48998->49000 48998->49070 48999->49000 48999->49070 49001 7ff747d5343c _strdup 49000->49001 49002 7ff747d53455 49000->49002 49001->49002 49001->49070 49216 7ff747d54900 49002->49216 49007 7ff747d534a2 49009 7ff747d534c4 49007->49009 49010 7ff747d51fd0 38 API calls 49007->49010 49007->49070 49008 7ff747d51fd0 38 API calls 49008->49007 49011 7ff747d51fd0 38 API calls 49009->49011 49012 7ff747d534e6 49009->49012 49009->49070 49010->49009 49011->49012 49013 7ff747d5367f 49012->49013 49016 7ff747d535e4 49012->49016 49012->49070 49238 7ff747d4f7b0 49013->49238 49015 7ff747d5381a 49017 7ff747d4f7b0 8 API calls 49015->49017 49015->49070 49018 7ff747d53604 49016->49018 49019 7ff747d5366f 49016->49019 49020 7ff747d53831 49017->49020 49318 7ff747d4e6f0 17 API calls 49018->49318 49021 7ff747d520a0 2 API calls 49019->49021 49020->49070 49262 7ff747d55360 49020->49262 49021->49070 49024 7ff747d5361a 49026 7ff747d55dd0 17 API calls 49024->49026 49024->49070 49032 7ff747d5362c 49026->49032 49027 7ff747d53924 49031 7ff747d539d1 49027->49031 49322 7ff747d4ec90 13 API calls 49027->49322 49029 7ff747d53632 49029->49070 49030 7ff747d53889 49030->49027 49033 7ff747d53891 49030->49033 49034 7ff747d56400 15 API calls 49031->49034 49032->49029 49319 7ff747d5d2b0 17 API calls 49032->49319 49321 7ff747d55a80 34 API calls 49033->49321 49038 7ff747d539e0 49034->49038 49324 7ff747d52ec0 44 API calls 49038->49324 49039 7ff747d538a1 free free 49041 7ff747d538c8 49039->49041 49045 7ff747d56400 15 API calls 49041->49045 49042 7ff747d53976 49049 7ff747d539bb 49042->49049 49323 7ff747d4ea40 QueryPerformanceCounter GetTickCount 49042->49323 49043 7ff747d53a5c 49326 7ff747d4e6f0 17 API calls 49043->49326 49046 7ff747d5391f 49045->49046 49281 7ff747d520a0 49046->49281 49048 7ff747d5399d 49051 7ff747d539bd 49048->49051 49052 7ff747d539b0 49048->49052 49049->49043 49325 7ff747d4eb10 QueryPerformanceCounter GetTickCount 49049->49325 49058 7ff747d56400 15 API calls 49051->49058 49057 7ff747d51d40 90 API calls 49052->49057 49054 7ff747d53adb 49285 7ff747d55dd0 49054->49285 49055 7ff747d53a91 49055->49046 49065 7ff747d56400 15 API calls 49055->49065 49056 7ff747d53a6b 49056->49055 49061 7ff747d56400 15 API calls 49056->49061 49056->49070 49057->49049 49058->49031 49059 7ff747d53a45 49062 7ff747d53c2b 49059->49062 49063 7ff747d53a51 49059->49063 49061->49055 49067 7ff747d56400 15 API calls 49062->49067 49066 7ff747d51d40 90 API calls 49063->49066 49068 7ff747d53abf 49065->49068 49066->49043 49067->49031 49068->49046 49070->48985 49071->48924 49072->48952 49073->48953 49074->48955 49077 7ff747d52a55 49076->49077 49078 7ff747d52a60 calloc 49076->49078 49077->48984 49079 7ff747d52a8a 49078->49079 49080 7ff747d52cd1 free 49078->49080 49081 7ff747d5e0c0 2 API calls 49079->49081 49080->48984 49082 7ff747d52b21 49081->49082 49083 7ff747d5e0c0 2 API calls 49082->49083 49084 7ff747d52b35 49083->49084 49085 7ff747d52d0d 49084->49085 49086 7ff747d52c97 _strdup 49084->49086 49087 7ff747d5e0c0 2 API calls 49085->49087 49086->49085 49088 7ff747d52ca9 49086->49088 49089 7ff747d52d4d 49087->49089 49090 7ff747d52cb7 free free 49088->49090 49089->48984 49090->49080 49327 7ff747d55e80 8 API calls 49091->49327 49094 7ff747d54ec7 49331 7ff747d7ee10 calloc 49094->49331 49095 7ff747d54ec0 49330 7ff747d7ee50 23 API calls 49095->49330 49098 7ff747d54ec5 49099 7ff747d54ecc 49098->49099 49104 7ff747d54f42 49099->49104 49138 7ff747d532cc 49099->49138 49332 7ff747d7ea80 tolower 49099->49332 49100 7ff747d55005 49102 7ff747d7ef90 8 API calls 49100->49102 49114 7ff747d5502e 49102->49114 49103 7ff747d54f0f 49103->49104 49105 7ff747d54f1b free 49103->49105 49106 7ff747d54f28 49103->49106 49104->49100 49107 7ff747d7ef90 8 API calls 49104->49107 49104->49138 49105->49106 49333 7ff747d596c0 15 API calls 49106->49333 49110 7ff747d54fec 49107->49110 49109 7ff747d5506c 49334 7ff747d56280 19 API calls 49109->49334 49110->49100 49113 7ff747d54ff8 free 49110->49113 49110->49138 49112 7ff747d5507e 49112->49138 49113->49100 49114->49109 49115 7ff747d550a4 49114->49115 49114->49138 49116 7ff747d7ef90 8 API calls 49115->49116 49117 7ff747d550cb 49116->49117 49118 7ff747d550f2 49117->49118 49119 7ff747d550d5 _strdup 49117->49119 49120 7ff747d7ef90 8 API calls 49118->49120 49118->49138 49119->49118 49119->49138 49121 7ff747d55115 49120->49121 49122 7ff747d5511f _strdup 49121->49122 49123 7ff747d55138 49121->49123 49122->49123 49122->49138 49124 7ff747d7ef90 8 API calls 49123->49124 49123->49138 49125 7ff747d55158 49124->49125 49126 7ff747d551ed 49125->49126 49127 7ff747d55162 _strdup 49125->49127 49128 7ff747d7ef90 8 API calls 49126->49128 49126->49138 49127->49126 49127->49138 49129 7ff747d55208 49128->49129 49130 7ff747d7ef90 8 API calls 49129->49130 49129->49138 49131 7ff747d5523d 49130->49131 49132 7ff747d7ef90 8 API calls 49131->49132 49131->49138 49133 7ff747d55281 49132->49133 49134 7ff747d55285 49133->49134 49135 7ff747d552a1 strtoul 49133->49135 49136 7ff747d7ef90 8 API calls 49134->49136 49134->49138 49135->49134 49139 7ff747d552e0 49136->49139 49137 7ff747d5531d _strdup 49137->49138 49138->48989 49138->48990 49138->49070 49139->49137 49139->49139 49335 7ff747d55f50 20 API calls 49139->49335 49142 7ff747d53d5d 49141->49142 49143 7ff747d53c8d memset memset 49141->49143 49146 7ff747d53d69 _strdup 49142->49146 49147 7ff747d53d90 49142->49147 49144 7ff747d53cd8 49143->49144 49145 7ff747d53cc0 strncpy 49143->49145 49150 7ff747d53ce4 strncpy 49144->49150 49151 7ff747d53cff 49144->49151 49145->49144 49146->49147 49152 7ff747d53d77 49146->49152 49148 7ff747d53d9c _strdup 49147->49148 49149 7ff747d53daf 49147->49149 49148->49149 49148->49152 49170 7ff747d53e0e 49149->49170 49339 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49149->49339 49150->49151 49336 7ff747d6c990 malloc strtoul free 49151->49336 49338 7ff747d56280 19 API calls 49152->49338 49156 7ff747d53d1f 49159 7ff747d53d4c 49156->49159 49337 7ff747d6c990 malloc strtoul free 49156->49337 49157 7ff747d53d86 49158 7ff747d542b7 free free 49157->49158 49164 7ff747d8ff10 8 API calls 49158->49164 49159->49142 49159->49158 49160 7ff747d53dd0 49161 7ff747d53dec 49160->49161 49340 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49160->49340 49168 7ff747d56400 15 API calls 49161->49168 49161->49170 49163 7ff747d54071 free 49165 7ff747d540ae 49163->49165 49166 7ff747d54081 49163->49166 49169 7ff747d53327 49164->49169 49173 7ff747d540d8 49165->49173 49176 7ff747d540c8 free 49165->49176 49166->49165 49172 7ff747d540a2 free 49166->49172 49168->49170 49169->48996 49169->48997 49169->49070 49171 7ff747d540f4 free free free 49170->49171 49174 7ff747d53f66 49170->49174 49183 7ff747d53e7e strchr 49170->49183 49199 7ff747d53e97 49170->49199 49185 7ff747d540e7 49171->49185 49172->49165 49177 7ff747d540dd 49173->49177 49345 7ff747d54b50 47 API calls 49173->49345 49174->49163 49175 7ff747d53fb9 49174->49175 49178 7ff747d53fa0 tolower 49174->49178 49341 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49175->49341 49176->49173 49177->49185 49194 7ff747d54191 49177->49194 49346 7ff747d54b50 47 API calls 49177->49346 49178->49175 49178->49178 49181 7ff747d5401c 49187 7ff747d5404f 49181->49187 49343 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49181->49343 49182 7ff747d5413f free 49182->49177 49182->49185 49183->49174 49183->49199 49185->49158 49186 7ff747d54173 free 49186->49185 49186->49194 49188 7ff747d56400 15 API calls 49187->49188 49190 7ff747d5406c 49187->49190 49188->49190 49190->49163 49191 7ff747d53fe0 49191->49181 49342 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49191->49342 49192 7ff747d54038 49192->49187 49344 7ff747d6c850 realloc GetEnvironmentVariableA realloc free 49192->49344 49193 7ff747d53ec0 strchr 49193->49199 49194->49185 49198 7ff747d54207 free 49194->49198 49197 7ff747d53ef0 strchr 49197->49199 49198->49185 49199->49171 49199->49174 49199->49193 49199->49197 49201 7ff747d544f4 49200->49201 49202 7ff747d544c1 49200->49202 49203 7ff747d54509 free _strdup 49201->49203 49204 7ff747d5452b 49201->49204 49202->49201 49207 7ff747d544d4 free 49202->49207 49208 7ff747d544e0 49202->49208 49203->49204 49214 7ff747d54628 49203->49214 49205 7ff747d54561 49204->49205 49206 7ff747d5453f free _strdup 49204->49206 49210 7ff747d54575 free _strdup 49205->49210 49212 7ff747d5459f 49205->49212 49206->49205 49206->49214 49207->49208 49208->49201 49209 7ff747d544e8 free 49208->49209 49209->49201 49210->49212 49210->49214 49212->49214 49347 7ff747d80d40 36 API calls 49212->49347 49213 7ff747d5460e 49213->49214 49215 7ff747d56400 15 API calls 49213->49215 49214->48998 49215->49214 49222 7ff747d54930 49216->49222 49218 7ff747d54a08 strchr 49219 7ff747d54a1d strtol 49218->49219 49218->49222 49219->49222 49221 7ff747d53467 49221->49070 49226 7ff747d51fd0 49221->49226 49222->49218 49222->49221 49222->49222 49223 7ff747d54aaa free 49222->49223 49224 7ff747d549d7 free 49222->49224 49225 7ff747d56400 15 API calls 49222->49225 49348 7ff747d596c0 15 API calls 49222->49348 49349 7ff747d54700 22 API calls 49222->49349 49223->49222 49224->49222 49224->49223 49225->49222 49228 7ff747d52005 49226->49228 49233 7ff747d5201f 49226->49233 49227 7ff747d8ff10 8 API calls 49229 7ff747d52031 49227->49229 49228->49233 49350 7ff747d80c90 18 API calls 49228->49350 49229->49007 49229->49008 49229->49070 49231 7ff747d52058 49232 7ff747d5206b GetLastError 49231->49232 49231->49233 49351 7ff747d42f50 21 API calls 49232->49351 49233->49227 49235 7ff747d52083 49352 7ff747d56280 19 API calls 49235->49352 49237 7ff747d52099 49237->49233 49239 7ff747d4f815 49238->49239 49240 7ff747d4f7f6 _strdup 49238->49240 49242 7ff747d4f841 49239->49242 49243 7ff747d4f822 _strdup 49239->49243 49240->49239 49241 7ff747d4f805 49240->49241 49241->49015 49245 7ff747d4f86d 49242->49245 49246 7ff747d4f84e _strdup 49242->49246 49243->49242 49244 7ff747d4f831 49243->49244 49244->49015 49248 7ff747d4f899 49245->49248 49249 7ff747d4f87a _strdup 49245->49249 49246->49245 49247 7ff747d4f85d 49246->49247 49247->49015 49251 7ff747d4f8c5 49248->49251 49252 7ff747d4f8a6 _strdup 49248->49252 49249->49248 49250 7ff747d4f889 49249->49250 49250->49015 49254 7ff747d4f8f1 49251->49254 49255 7ff747d4f8d2 _strdup 49251->49255 49252->49251 49253 7ff747d4f8b5 49252->49253 49253->49015 49257 7ff747d4f91d 49254->49257 49258 7ff747d4f8fe _strdup 49254->49258 49255->49254 49256 7ff747d4f8e1 49255->49256 49256->49015 49260 7ff747d4f92a _strdup 49257->49260 49261 7ff747d4f939 49257->49261 49258->49257 49259 7ff747d4f90d 49258->49259 49259->49015 49260->49261 49261->49015 49263 7ff747d5e0c0 2 API calls 49262->49263 49272 7ff747d55373 49263->49272 49264 7ff747d53847 49264->49027 49320 7ff747d50f10 15 API calls 49264->49320 49266 7ff747d5ee30 9 API calls 49266->49272 49267 7ff747d81620 8 API calls 49267->49272 49269 7ff747d56400 15 API calls 49269->49272 49271 7ff747d56ee0 closesocket free 49271->49272 49272->49264 49272->49266 49272->49267 49272->49269 49272->49271 49273 7ff747d554e6 30 API calls 49272->49273 49353 7ff747d5f7f0 free free free free 49272->49353 49354 7ff747d81230 49272->49354 49357 7ff747d4b510 49272->49357 49371 7ff747d531b0 free free 49273->49371 49275 7ff747d55746 49276 7ff747d55754 free 49275->49276 49372 7ff747d4f960 8 API calls 49276->49372 49278 7ff747d55774 49373 7ff747d4f960 8 API calls 49278->49373 49280 7ff747d55780 free free free 49280->49272 49282 7ff747d520ae 49281->49282 49283 7ff747d5e0c0 2 API calls 49282->49283 49284 7ff747d52118 49283->49284 49284->49054 49318->49024 49319->49019 49320->49030 49321->49039 49322->49042 49323->49048 49324->49070 49325->49059 49326->49056 49328 7ff747d7ee20 13 API calls 49327->49328 49329 7ff747d54eb4 49328->49329 49329->49094 49329->49095 49330->49098 49332->49103 49333->49104 49334->49112 49335->49137 49336->49156 49337->49159 49338->49157 49339->49160 49340->49161 49341->49191 49342->49181 49343->49192 49344->49187 49345->49182 49346->49186 49347->49213 49348->49222 49349->49222 49350->49231 49351->49235 49352->49237 49353->49272 49374 7ff747d85150 7 API calls 49354->49374 49356 7ff747d8124e 49358 7ff747d4b980 49357->49358 49359 7ff747d4b998 EnterCriticalSection LeaveCriticalSection 49358->49359 49360 7ff747d4ba24 free 49358->49360 49361 7ff747d4b9db 49359->49361 49362 7ff747d4b9d1 CloseHandle 49359->49362 49360->49272 49363 7ff747d4b9e9 49361->49363 49364 7ff747d4b9e1 49361->49364 49367 7ff747d4b9fc 49362->49367 49376 7ff747d4ba40 7 API calls 49363->49376 49375 7ff747d696b0 WaitForSingleObjectEx CloseHandle 49364->49375 49368 7ff747d4ba11 closesocket 49367->49368 49377 7ff747d46410 free 49367->49377 49368->49360 49369 7ff747d4b9f2 free 49369->49367 49371->49275 49372->49278 49373->49280 49374->49356 49375->49363 49376->49369 49377->49368 49383 7ff747d4808b 49384 7ff747d4809e 49383->49384 49385 7ff747d48157 49384->49385 49386 7ff747d5bfe0 407 API calls 49384->49386 49388 7ff747d480a6 49384->49388 49387 7ff747d480e3 49385->49387 49385->49388 49391 7ff747d480dd 49386->49391 49390 7ff747d47610 292 API calls 49387->49390 49392 7ff747d47b8b 49388->49392 49425 7ff747d5be90 free 49388->49425 49390->49392 49391->49385 49391->49387 49391->49388 49406 7ff747d61be0 49391->49406 49393 7ff747d48db0 17 API calls 49392->49393 49395 7ff747d48c32 49392->49395 49396 7ff747d48c23 49392->49396 49398 7ff747d51d40 90 API calls 49392->49398 49400 7ff747d57b00 10 API calls 49392->49400 49402 7ff747d47c2e 49392->49402 49404 7ff747d47610 292 API calls 49392->49404 49424 7ff747d56280 19 API calls 49392->49424 49426 7ff747d46330 15 API calls 49392->49426 49427 7ff747d65af0 22 API calls 49392->49427 49393->49392 49428 7ff747d56280 19 API calls 49396->49428 49398->49392 49400->49392 49401 7ff747d56280 19 API calls 49401->49402 49402->49392 49402->49401 49404->49392 49407 7ff747d61c0c 49406->49407 49408 7ff747d5bfe0 407 API calls 49407->49408 49411 7ff747d61c16 49408->49411 49409 7ff747d8ff10 8 API calls 49410 7ff747d61d72 49409->49410 49410->49385 49412 7ff747d61d2c 49411->49412 49413 7ff747d61c67 49411->49413 49417 7ff747d61d46 49411->49417 49414 7ff747d50480 255 API calls 49412->49414 49412->49417 49415 7ff747d59790 13 API calls 49413->49415 49414->49417 49416 7ff747d61cd8 calloc 49415->49416 49418 7ff747d61cf7 49416->49418 49419 7ff747d61cf0 49416->49419 49417->49409 49420 7ff747d62270 25 API calls 49418->49420 49419->49417 49421 7ff747d61d06 49420->49421 49421->49417 49422 7ff747d62020 62 API calls 49421->49422 49423 7ff747d61d28 49422->49423 49423->49412 49423->49417 49424->49392 49425->49392 49426->49392 49427->49392 49428->49395 49429 7ff747d6a915 49431 7ff747d6a919 49429->49431 49430 7ff747d6a9e7 49432 7ff747d6aea5 calloc 49430->49432 49433 7ff747d6aa06 strchr 49430->49433 49431->49430 49455 7ff747d6a9a0 strtol 49431->49455 49460 7ff747d6a9c2 strchr 49431->49460 49484 7ff747d6aa47 49431->49484 49535 7ff747d69d40 62 API calls 49431->49535 49434 7ff747d6aecc 49432->49434 49435 7ff747d6af48 49432->49435 49436 7ff747d6ab6b 49433->49436 49437 7ff747d6aa1f strncmp 49433->49437 49541 7ff747d56280 19 API calls 49434->49541 49449 7ff747d6afaa 49435->49449 49450 7ff747d6afa4 CertFreeCertificateContext 49435->49450 49442 7ff747d6ac7e fopen 49436->49442 49443 7ff747d6af2b 49436->49443 49439 7ff747d6aa60 strncmp 49437->49439 49466 7ff747d6aa3c 49437->49466 49444 7ff747d6aa82 strncmp 49439->49444 49439->49466 49440 7ff747d6aedb 49445 7ff747d6aee9 CertFreeCertificateContext 49440->49445 49497 7ff747d6b166 49440->49497 49441 7ff747d6ab39 strchr 49441->49436 49446 7ff747d6ab53 _strdup 49441->49446 49442->49443 49448 7ff747d6ac97 fseek 49442->49448 49543 7ff747d56280 19 API calls 49443->49543 49451 7ff747d6aaa4 strncmp 49444->49451 49444->49466 49445->49497 49446->49436 49469 7ff747d6ab73 49446->49469 49456 7ff747d6accd 49448->49456 49457 7ff747d6acc1 ftell 49448->49457 49452 7ff747d6afae 49449->49452 49453 7ff747d6b013 49449->49453 49450->49449 49454 7ff747d6aac3 strncmp 49451->49454 49451->49466 49544 7ff747d42620 22 API calls 49452->49544 49468 7ff747d68210 13 API calls 49453->49468 49454->49441 49459 7ff747d6aada strncmp 49454->49459 49455->49431 49455->49460 49462 7ff747d6acde fseek 49456->49462 49463 7ff747d6aef9 fclose 49456->49463 49457->49456 49465 7ff747d6aaf9 strncmp 49459->49465 49459->49466 49460->49430 49460->49431 49461 7ff747d8ff10 8 API calls 49471 7ff747d6b31c 49461->49471 49462->49463 49472 7ff747d6acfb malloc 49462->49472 49542 7ff747d56280 19 API calls 49463->49542 49464 7ff747d6afc2 49545 7ff747d56280 19 API calls 49464->49545 49465->49466 49475 7ff747d6ab18 strncmp 49465->49475 49466->49441 49477 7ff747d6b02c 49468->49477 49469->49436 49478 7ff747d6ab94 CertOpenStore 49469->49478 49472->49463 49473 7ff747d6ad14 fread 49472->49473 49473->49463 49479 7ff747d6ad32 fclose 49473->49479 49475->49436 49475->49466 49476 7ff747d6af18 free 49476->49497 49481 7ff747d6b03f 49477->49481 49490 7ff747d68210 13 API calls 49477->49490 49482 7ff747d6abe7 free CryptStringToBinaryA 49478->49482 49483 7ff747d6abb7 GetLastError 49478->49483 49487 7ff747d6ad5f malloc 49479->49487 49488 7ff747d6ad4f 49479->49488 49480 7ff747d6afd4 free 49480->49497 49498 7ff747d6aa56 49480->49498 49491 7ff747d56400 15 API calls 49481->49491 49499 7ff747d6b052 49481->49499 49485 7ff747d6ae71 CertCloseStore 49482->49485 49486 7ff747d6ac32 CertFindCertificateInStore 49482->49486 49537 7ff747d56280 19 API calls 49483->49537 49536 7ff747d56280 19 API calls 49484->49536 49485->49497 49493 7ff747d6ae8a CertCloseStore 49486->49493 49494 7ff747d6ac64 49486->49494 49495 7ff747d6ada3 PFXImportCertStore free free 49487->49495 49496 7ff747d6ad79 MultiByteToWideChar 49487->49496 49488->49487 49490->49481 49491->49499 49493->49432 49494->49485 49507 7ff747d6ae2a CertFindCertificateInStore 49495->49507 49508 7ff747d6add4 GetLastError 49495->49508 49496->49495 49497->49461 49498->49497 49501 7ff747d56400 15 API calls 49499->49501 49504 7ff747d6b09b 49499->49504 49500 7ff747d6abd6 free 49500->49497 49501->49504 49503 7ff747d6b0fd calloc 49505 7ff747d6b157 49503->49505 49506 7ff747d6b170 49503->49506 49504->49503 49546 7ff747d56280 19 API calls 49505->49546 49506->49497 49517 7ff747d6b27c 49506->49517 49518 7ff747d6b1d9 free 49506->49518 49512 7ff747d6ae86 49507->49512 49513 7ff747d6ae52 GetLastError 49507->49513 49510 7ff747d6ade9 49508->49510 49511 7ff747d6ae11 49508->49511 49538 7ff747d56280 19 API calls 49510->49538 49539 7ff747d56280 19 API calls 49511->49539 49512->49493 49540 7ff747d56280 19 API calls 49513->49540 49521 7ff747d56b40 48 API calls 49517->49521 49519 7ff747d6b20a 49518->49519 49520 7ff747d6b256 49518->49520 49523 7ff747d6b212 49519->49523 49524 7ff747d6b230 49519->49524 49551 7ff747d42620 22 API calls 49520->49551 49525 7ff747d6b29d 49521->49525 49547 7ff747d42620 22 API calls 49523->49547 49549 7ff747d42620 22 API calls 49524->49549 49525->49497 49553 7ff747d56280 19 API calls 49525->49553 49526 7ff747d6b260 49552 7ff747d56280 19 API calls 49526->49552 49530 7ff747d6b219 49548 7ff747d56280 19 API calls 49530->49548 49531 7ff747d6b23a 49550 7ff747d56280 19 API calls 49531->49550 49535->49431 49536->49498 49537->49500 49538->49498 49539->49498 49540->49485 49541->49440 49542->49476 49543->49498 49544->49464 49545->49480 49546->49497 49547->49530 49548->49498 49549->49531 49550->49498 49551->49526 49552->49498 49553->49497 49554 7ff747d5f4f0 49555 7ff747d5f53e 49554->49555 49556 7ff747d5f860 18 API calls 49555->49556 49557 7ff747d5f55b 49556->49557 49558 7ff747d56400 15 API calls 49557->49558 49562 7ff747d5f577 49557->49562 49558->49562 49559 7ff747d5f6c5 49561 7ff747d8ff10 8 API calls 49559->49561 49560 7ff747d68210 13 API calls 49563 7ff747d5f5f6 49560->49563 49564 7ff747d5f6f2 49561->49564 49562->49559 49562->49560 49565 7ff747d5f61b 49563->49565 49566 7ff747d5f5fa 49563->49566 49568 7ff747d68210 13 API calls 49565->49568 49588 7ff747d691c0 15 API calls 49566->49588 49570 7ff747d5f62d 49568->49570 49569 7ff747d5f60f 49569->49565 49571 7ff747d5f70a 49569->49571 49572 7ff747d5f631 49570->49572 49577 7ff747d5f652 49570->49577 49573 7ff747d5f714 49571->49573 49589 7ff747d691c0 15 API calls 49572->49589 49593 7ff747d5ea70 27 API calls 49573->49593 49576 7ff747d5f646 49576->49571 49576->49577 49577->49559 49582 7ff747d5f683 49577->49582 49590 7ff747d832c0 534 API calls 49577->49590 49578 7ff747d5f736 49579 7ff747d5f6be 49578->49579 49594 7ff747d68f90 free free free 49578->49594 49579->49559 49582->49571 49583 7ff747d5f6a0 49582->49583 49583->49559 49584 7ff747d5f6b9 49583->49584 49585 7ff747d5f6c0 49583->49585 49591 7ff747d834c0 314 API calls 49584->49591 49592 7ff747d4b710 51 API calls 49585->49592 49588->49569 49589->49576 49590->49582 49591->49579 49592->49559 49593->49578 49594->49579 49595 7ff747d901ec 49596 7ff747d90205 49595->49596 49597 7ff747d90343 49596->49597 49598 7ff747d9020d __scrt_acquire_startup_lock 49596->49598 49677 7ff747d9067c 9 API calls 49597->49677 49600 7ff747d9034d 49598->49600 49601 7ff747d9022b __scrt_release_startup_lock 49598->49601 49678 7ff747d9067c 9 API calls 49600->49678 49604 7ff747d90250 49601->49604 49606 7ff747d902d6 _get_initial_narrow_environment __p___argv __p___argc 49601->49606 49609 7ff747d902ce _register_thread_local_exe_atexit_callback 49601->49609 49603 7ff747d90358 49605 7ff747d90360 _exit 49603->49605 49615 7ff747d41e40 49606->49615 49609->49606 49679 7ff747d8fb18 49615->49679 49619 7ff747d42369 ?_Throw_Cpp_error@std@@YAXH 49620 7ff747d41eb8 49621 7ff747d4235e ?_Throw_Cpp_error@std@@YAXH 49620->49621 49622 7ff747d41ec3 _Thrd_detach 49620->49622 49621->49619 49622->49621 49623 7ff747d41ee0 16 API calls 49622->49623 49688 7ff747d32ab0 49623->49688 49677->49600 49678->49603 49680 7ff747d8fb32 malloc 49679->49680 49681 7ff747d41e6f _beginthreadex 49680->49681 49682 7ff747d8fb23 49680->49682 49681->49619 49681->49620 49682->49680 49683 7ff747d8fb42 49682->49683 49684 7ff747d8fb4d 49683->49684 49777 7ff747d90640 _CxxThrowException std::bad_alloc::bad_alloc 49683->49777 49778 7ff747d31a00 49684->49778 49687 7ff747d8fb53 49781 7ff747d32850 49688->49781 49690 7ff747d32afa 49691 7ff747d330b8 49690->49691 49794 7ff747d33170 49690->49794 49910 7ff747d33130 7 API calls 49691->49910 49693 7ff747d33114 Sleep exit 49695 7ff747d33128 49693->49695 49697 7ff747d31a00 Concurrency::cancel_current_task __std_exception_copy 49695->49697 49696 7ff747d32b7f 49806 7ff747d33c40 49696->49806 49700 7ff747d3312d 49697->49700 49699 7ff747d32b8c 49813 7ff747d332e0 49699->49813 49702 7ff747d32bbc 49703 7ff747d33c40 10 API calls 49702->49703 49704 7ff747d32bc8 49703->49704 49821 7ff747d333e0 49704->49821 49706 7ff747d32bfb 49707 7ff747d33c40 10 API calls 49706->49707 49708 7ff747d32c08 49707->49708 49709 7ff747d32c5f 49708->49709 49712 7ff747d32c58 _invalid_parameter_noinfo_noreturn 49708->49712 49710 7ff747d32caf 49709->49710 49713 7ff747d32ca8 _invalid_parameter_noinfo_noreturn 49709->49713 49711 7ff747d32cee 49710->49711 49715 7ff747d32ce7 _invalid_parameter_noinfo_noreturn 49710->49715 49714 7ff747d32d3c 49711->49714 49717 7ff747d32d35 _invalid_parameter_noinfo_noreturn 49711->49717 49712->49709 49713->49710 49718 7ff747d32d74 _invalid_parameter_noinfo_noreturn 49714->49718 49722 7ff747d32d7b 49714->49722 49715->49711 49716 7ff747d32dc9 49829 7ff747d33560 49716->49829 49717->49714 49718->49722 49719 7ff747d32e2f 49720 7ff747d32e1a memcpy 49719->49720 49723 7ff747d8fb18 3 API calls 49719->49723 49720->49716 49722->49695 49722->49716 49722->49719 49726 7ff747d8fb18 3 API calls 49722->49726 49723->49720 49728 7ff747d32e12 49726->49728 49728->49720 49730 7ff747d32e28 _invalid_parameter_noinfo_noreturn 49728->49730 49730->49719 49779 7ff747d31a0e Concurrency::cancel_current_task 49778->49779 49780 7ff747d31a1f __std_exception_copy 49779->49780 49780->49687 49782 7ff747d328a0 49781->49782 49782->49782 49783 7ff747d328b0 system 49782->49783 49784 7ff747d32910 49783->49784 49784->49784 49785 7ff747d32920 system 49784->49785 49786 7ff747d32970 49785->49786 49786->49786 49787 7ff747d32980 system 49786->49787 49788 7ff747d329c0 49787->49788 49788->49788 49789 7ff747d329d0 system 49788->49789 49790 7ff747d32a10 49789->49790 49790->49790 49791 7ff747d32a20 system 49790->49791 49792 7ff747d32a80 49791->49792 49792->49792 49793 7ff747d32a90 system 49792->49793 49793->49690 49795 7ff747d3318e 49794->49795 49796 7ff747d34320 7 API calls 49795->49796 49797 7ff747d331d8 49795->49797 49796->49797 49798 7ff747d33237 49797->49798 49799 7ff747d34320 7 API calls 49797->49799 49911 7ff747d35de0 49798->49911 49799->49798 49802 7ff747d33286 49803 7ff747d332c7 49802->49803 49805 7ff747d332c0 _invalid_parameter_noinfo_noreturn 49802->49805 49803->49696 49804 7ff747d3327f _invalid_parameter_noinfo_noreturn 49804->49802 49805->49803 49807 7ff747d33c5d 49806->49807 49808 7ff747d33cb8 49807->49808 49809 7ff747d33c73 memcpy 49807->49809 49937 7ff747d34ec0 9 API calls Concurrency::cancel_current_task 49808->49937 49809->49699 49812 7ff747d33ccb 49812->49699 49815 7ff747d332fe 49813->49815 49814 7ff747d33348 49938 7ff747d36de0 49814->49938 49815->49814 49816 7ff747d34320 7 API calls 49815->49816 49816->49814 49818 7ff747d33364 49819 7ff747d333c7 49818->49819 49820 7ff747d333c0 _invalid_parameter_noinfo_noreturn 49818->49820 49819->49702 49820->49819 49823 7ff747d333fe 49821->49823 49822 7ff747d33448 49825 7ff747d36de0 12 API calls 49822->49825 49823->49822 49824 7ff747d34320 7 API calls 49823->49824 49824->49822 49826 7ff747d33464 49825->49826 49827 7ff747d334c7 49826->49827 49828 7ff747d334c0 _invalid_parameter_noinfo_noreturn 49826->49828 49827->49706 49828->49827 49830 7ff747d32850 6 API calls 49829->49830 49831 7ff747d3359c 49830->49831 49945 7ff747d423e0 49831->49945 49833 7ff747d335a1 49834 7ff747d335ad 49833->49834 49840 7ff747d33642 49833->49840 49835 7ff747d34320 7 API calls 49834->49835 49843 7ff747d335d1 49835->49843 49837 7ff747d3379a _invalid_parameter_noinfo_noreturn 49838 7ff747d33604 49953 7ff747d424a0 49840->49953 49842 7ff747d3371e 49842->49843 49843->49837 49843->49838 49910->49693 49912 7ff747d35e2a 49911->49912 49913 7ff747d35e7f 49911->49913 49912->49913 49914 7ff747d35e2f memcpy 49912->49914 49915 7ff747d35e87 memcpy 49913->49915 49924 7ff747d35edb 49913->49924 49921 7ff747d3324a 49914->49921 49916 7ff747d35ec1 49915->49916 49917 7ff747d35ec4 memcpy 49915->49917 49916->49917 49917->49921 49918 7ff747d35fc1 49936 7ff747d31aa0 ?_Xlength_error@std@@YAXPEBD 49918->49936 49921->49802 49921->49804 49923 7ff747d35f59 49927 7ff747d35f44 memcpy 49923->49927 49930 7ff747d8fb18 3 API calls 49923->49930 49924->49918 49924->49923 49925 7ff747d35f37 49924->49925 49926 7ff747d35fbc 49924->49926 49929 7ff747d8fb18 3 API calls 49925->49929 49928 7ff747d31a00 Concurrency::cancel_current_task __std_exception_copy 49926->49928 49933 7ff747d35f90 49927->49933 49934 7ff747d35f93 memcpy 49927->49934 49928->49918 49932 7ff747d35f3f 49929->49932 49930->49927 49932->49927 49935 7ff747d35f52 _invalid_parameter_noinfo_noreturn 49932->49935 49933->49934 49934->49921 49935->49923 49937->49812 49939 7ff747d36ea5 49938->49939 49943 7ff747d36e10 memcpy memcpy memcpy 49938->49943 49944 7ff747d3c610 9 API calls Concurrency::cancel_current_task 49939->49944 49941 7ff747d36eba 49941->49818 49943->49818 49944->49941 49946 7ff747d423ed calloc 49945->49946 49952 7ff747d42450 49945->49952 49947 7ff747d42442 49946->49947 49950 7ff747d4247c 49947->49950 49974 7ff747d59290 49947->49974 49949 7ff747d42471 49949->49833 49950->49833 49952->49950 50005 7ff747d521c0 calloc 49952->50005 49954 7ff747d424b9 49953->49954 49955 7ff747d424af 49953->49955 49956 7ff747d424ea 49954->49956 49957 7ff747d424d2 49954->49957 49955->49842 49975 7ff747d592ae WSAStartup 49974->49975 49976 7ff747d592f6 49974->49976 49977 7ff747d592d9 49975->49977 49978 7ff747d592c2 49975->49978 50024 7ff747d82d90 49976->50024 49981 7ff747d8ff10 8 API calls 49977->49981 49978->49976 49980 7ff747d592d3 WSACleanup 49978->49980 49980->49977 50006 7ff747d521f5 50005->50006 50007 7ff747d521e6 50005->50007 50050 7ff747d4b6e0 calloc 50006->50050 50007->49949 50009 7ff747d52218 50010 7ff747d5222c malloc 50009->50010 50011 7ff747d5221e free 50009->50011 50025 7ff747d82d9e 50024->50025 50031 7ff747d592fb 50024->50031 50050->50009 50318 7ff747d4bab0 50319 7ff747d59790 13 API calls 50318->50319 50320 7ff747d4baef 50319->50320 50337 7ff747d68fe0 getaddrinfo 50320->50337 50323 7ff747d4bb0b WSAGetLastError 50325 7ff747d4bb2a 50323->50325 50326 7ff747d4bb15 WSAGetLastError 50323->50326 50324 7ff747d4bb2d EnterCriticalSection 50327 7ff747d4bb3c LeaveCriticalSection 50324->50327 50328 7ff747d4bb58 50324->50328 50325->50324 50326->50324 50355 7ff747d4ba40 7 API calls 50327->50355 50330 7ff747d4bb86 LeaveCriticalSection 50328->50330 50331 7ff747d4bb62 send 50328->50331 50332 7ff747d4bb96 50330->50332 50331->50330 50334 7ff747d4bb7d WSAGetLastError 50331->50334 50335 7ff747d8ff10 8 API calls 50332->50335 50333 7ff747d4bb4d free 50333->50332 50334->50330 50336 7ff747d4bba5 50335->50336 50338 7ff747d4bb05 50337->50338 50340 7ff747d69013 50337->50340 50338->50323 50338->50324 50339 7ff747d69184 WSASetLastError 50339->50338 50340->50339 50341 7ff747d690fe 50340->50341 50342 7ff747d69069 malloc 50340->50342 50343 7ff747d69147 50341->50343 50344 7ff747d69141 freeaddrinfo 50341->50344 50345 7ff747d6912c 50342->50345 50346 7ff747d69080 malloc 50342->50346 50347 7ff747d6914c 50343->50347 50348 7ff747d6917f 50343->50348 50344->50343 50345->50341 50350 7ff747d6911b free 50346->50350 50351 7ff747d690b7 memcpy 50346->50351 50347->50338 50349 7ff747d69151 free free free 50347->50349 50348->50338 50348->50339 50349->50338 50349->50349 50350->50341 50352 7ff747d690de 50351->50352 50353 7ff747d690cf _strdup 50351->50353 50352->50340 50353->50352 50354 7ff747d69100 free free 50353->50354 50354->50341 50355->50333 50356 7ff747d69af0 50357 7ff747d82d90 26 API calls 50356->50357 50358 7ff747d69af9 50357->50358 50359 7ff747d69770 50360 7ff747d69785 50359->50360 50361 7ff747d50ce0 50359->50361 50364 7ff747d697c0 50361->50364 50365 7ff747d6980c 50364->50365 50366 7ff747d56400 15 API calls 50365->50366 50368 7ff747d69850 50366->50368 50367 7ff747d699c5 50371 7ff747d699df free 50367->50371 50372 7ff747d69a02 50367->50372 50368->50367 50373 7ff747d698b4 50368->50373 50383 7ff747d698d7 50368->50383 50369 7ff747d69a57 free 50370 7ff747d69a90 50369->50370 50374 7ff747d69a99 free 50370->50374 50375 7ff747d698dc 50370->50375 50371->50372 50376 7ff747d69a35 50372->50376 50381 7ff747d69a2c free 50372->50381 50387 7ff747d42620 22 API calls 50373->50387 50374->50375 50379 7ff747d8ff10 8 API calls 50375->50379 50376->50369 50376->50370 50378 7ff747d698c5 50388 7ff747d56280 19 API calls 50378->50388 50380 7ff747d50cfc 50379->50380 50381->50376 50383->50367 50383->50375 50384 7ff747d56b40 48 API calls 50383->50384 50385 7ff747d69984 50384->50385 50385->50367 50386 7ff747d56400 15 API calls 50385->50386 50386->50367 50387->50378 50388->50383
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup$callocmemcpystrstr
                                        • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                        • API String ID: 2045874074-4264080130
                                        • Opcode ID: 7e8127e7a02895129b677bbc6e0c7dd064ef2c4a8580cb0e4b3f39011db1f550
                                        • Instruction ID: 13d20f263b805ab5098cfeab3a6c3d4ee820bea89adc7bad905033b5e4ac0276
                                        • Opcode Fuzzy Hash: 7e8127e7a02895129b677bbc6e0c7dd064ef2c4a8580cb0e4b3f39011db1f550
                                        • Instruction Fuzzy Hash: A003CF61A2CA82C2FB54BB2594407B9A7A1BF45B88FC48631CE0D57795EF3DE447CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 689 7ff747d41e40-7ff747d41e72 call 7ff747d8fb18 692 7ff747d41e80 689->692 693 7ff747d41e74-7ff747d41e7e 689->693 694 7ff747d41e83-7ff747d41eb2 _beginthreadex 692->694 693->694 695 7ff747d42369-7ff747d42377 ?_Throw_Cpp_error@std@@YAXH@Z 694->695 696 7ff747d41eb8-7ff747d41ebd 694->696 697 7ff747d4235e-7ff747d42368 ?_Throw_Cpp_error@std@@YAXH@Z 696->697 698 7ff747d41ec3-7ff747d41eda _Thrd_detach 696->698 697->695 698->697 699 7ff747d41ee0-7ff747d42230 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff747d32ab0 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 GetStdHandle SetConsoleTextAttribute call 7ff747d42380 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff747d422ad-7ff747d422b0 699->734 735 7ff747d42232-7ff747d422ac call 7ff747d33d40 * 2 call 7ff747d33b20 * 2 URLDownloadToFileA system * 2 Sleep exit 699->735 737 7ff747d4232d-7ff747d42332 734->737 738 7ff747d422b2-7ff747d4232c call 7ff747d33d40 * 2 call 7ff747d33b20 * 2 URLDownloadToFileA system * 2 Sleep exit 734->738 735->734 741 7ff747d4233b-7ff747d4235d call 7ff747d8ff10 737->741 742 7ff747d42334-7ff747d4233a terminate 737->742 738->737 742->741
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                        • String ID: Iniciar Valorant ESP (HVCI DESLIGADO): $ Iniciar Valorant ESP (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SeieHuSttinstialog.exe$C:\Windows\System32\config\SeuetingsHostialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe$http://167.114.85.75/esphvcionattprivatestore655.exe$start C:\Windows\System32\config\SeieHuSttinstialog.exe$start C:\Windows\System32\config\SeuetingsHostialog.exe
                                        • API String ID: 3379756739-2736027526
                                        • Opcode ID: 4201f20fcbc613c3a25c9e45001c0515494a8c96dff99f52676f0358d3005906
                                        • Instruction ID: ea11c305a32d962ea398c1ada0266a7d1b9837fdb0517533da99c62686b9cb47
                                        • Opcode Fuzzy Hash: 4201f20fcbc613c3a25c9e45001c0515494a8c96dff99f52676f0358d3005906
                                        • Instruction Fuzzy Hash: A4D15D61A2DA03C2EB04BF60EA151B9B361FF86754F800335E95E076A5DF3CF54A8B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupstrncmpstrtol
                                        • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                        • API String ID: 707411602-3372543188
                                        • Opcode ID: 09f11b705b111533f350ffdec44febe4a985be7e643573be8f285361bd15042f
                                        • Instruction ID: a8f49aa807aa8ba38301b00843c8532918c11940d2a0e3df5ac615e0d58f2ba2
                                        • Opcode Fuzzy Hash: 09f11b705b111533f350ffdec44febe4a985be7e643573be8f285361bd15042f
                                        • Instruction Fuzzy Hash: 6C42A261A2CB42C2EB64BF15D8506B9A7A0FF85B94FD08235CA9D07794DF3CE546CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 939 7ff747d59290-7ff747d592ac 940 7ff747d592ae-7ff747d592c0 WSAStartup 939->940 941 7ff747d592f6-7ff747d592fd call 7ff747d82d90 939->941 942 7ff747d592d9-7ff747d592f5 call 7ff747d8ff10 940->942 943 7ff747d592c2-7ff747d592c9 940->943 950 7ff747d59303-7ff747d59330 GetModuleHandleA 941->950 951 7ff747d595bf-7ff747d595d6 call 7ff747d8ff10 941->951 945 7ff747d592cb-7ff747d592d1 943->945 946 7ff747d592d3 WSACleanup 943->946 945->941 945->946 946->942 953 7ff747d5933e-7ff747d59373 GetProcAddress strpbrk 950->953 954 7ff747d59332-7ff747d59339 950->954 957 7ff747d5939b-7ff747d5939e 953->957 958 7ff747d59375-7ff747d5937b 953->958 956 7ff747d594c3-7ff747d595b7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 954->956 956->951 961 7ff747d593ca-7ff747d593e1 GetSystemDirectoryA 957->961 962 7ff747d593a0-7ff747d593b3 GetProcAddress 957->962 959 7ff747d5938d-7ff747d59396 LoadLibraryA 958->959 960 7ff747d5937d-7ff747d59388 958->960 963 7ff747d5948a-7ff747d5949c 959->963 960->963 965 7ff747d593e7-7ff747d593fa malloc 961->965 966 7ff747d59482 961->966 962->961 964 7ff747d593b5-7ff747d593c5 LoadLibraryExA 962->964 963->956 968 7ff747d5949e-7ff747d594bc GetProcAddress 963->968 964->963 969 7ff747d593fc-7ff747d5940a GetSystemDirectoryA 965->969 970 7ff747d59479-7ff747d5947c free 965->970 966->963 968->956 969->970 971 7ff747d5940c-7ff747d59416 969->971 970->966 972 7ff747d59420-7ff747d59429 971->972 972->972 973 7ff747d5942b-7ff747d59430 972->973 974 7ff747d59434-7ff747d5943b 973->974 974->974 975 7ff747d5943d-7ff747d59446 974->975 976 7ff747d59450-7ff747d5945c 975->976 976->976 977 7ff747d5945e-7ff747d59464 976->977 978 7ff747d59466-7ff747d5946e 977->978 979 7ff747d59470 LoadLibraryA 977->979 980 7ff747d59476 978->980 979->980 980->970
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                        • API String ID: 2612373469-2794540096
                                        • Opcode ID: d5f8afb19f8e867eb35e557aec29fe9135a7589b51aca80395dda82625a2e322
                                        • Instruction ID: c09f73c1768c9afd46a8a6c09cc5a51765b9615dab8a2ad12ef1e206d7b71ee5
                                        • Opcode Fuzzy Hash: d5f8afb19f8e867eb35e557aec29fe9135a7589b51aca80395dda82625a2e322
                                        • Instruction Fuzzy Hash: 9A914361A2D782C2E760BF51A9443B9B391FF89B84FC94335D94E06758EF3CE4468B20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1236 7ff747d585d0-7ff747d5863d 1237 7ff747d5863f 1236->1237 1238 7ff747d58642-7ff747d58652 1236->1238 1237->1238 1239 7ff747d58654-7ff747d5865c 1238->1239 1240 7ff747d58661-7ff747d58679 memcpy 1238->1240 1239->1240 1241 7ff747d5867b-7ff747d586a6 call 7ff747d46ba0 * 2 1240->1241 1242 7ff747d586a8-7ff747d586bb socket 1240->1242 1244 7ff747d586be-7ff747d586ca 1241->1244 1242->1244 1246 7ff747d586d0-7ff747d586d8 1244->1246 1247 7ff747d58b5f 1244->1247 1249 7ff747d586e7-7ff747d586f0 1246->1249 1250 7ff747d586da-7ff747d586e2 call 7ff747d655a0 1246->1250 1248 7ff747d58b64-7ff747d58b8d call 7ff747d8ff10 1247->1248 1251 7ff747d58700-7ff747d58709 1249->1251 1252 7ff747d586f2-7ff747d586fd 1249->1252 1250->1249 1256 7ff747d5871c-7ff747d58720 1251->1256 1257 7ff747d5870b-7ff747d5870e 1251->1257 1252->1251 1262 7ff747d58725-7ff747d58737 call 7ff747d81ad0 1256->1262 1260 7ff747d58b0a-7ff747d58b5d _errno * 3 call 7ff747d42e10 call 7ff747d56280 call 7ff747d56ee0 1257->1260 1261 7ff747d58714-7ff747d5871a 1257->1261 1260->1248 1261->1262 1262->1260 1269 7ff747d5873d-7ff747d58765 htons call 7ff747d56400 1262->1269 1275 7ff747d5876c-7ff747d58771 1269->1275 1276 7ff747d58767-7ff747d5876a 1269->1276 1277 7ff747d587de 1275->1277 1278 7ff747d58773-7ff747d5877d 1275->1278 1276->1275 1276->1277 1279 7ff747d587e1-7ff747d587fd 1277->1279 1278->1279 1280 7ff747d5877f-7ff747d587ab setsockopt 1278->1280 1281 7ff747d5882d-7ff747d58830 1279->1281 1282 7ff747d587ff-7ff747d58813 call 7ff747d59110 1279->1282 1283 7ff747d587ad-7ff747d587d4 WSAGetLastError call 7ff747d42e10 call 7ff747d56400 1280->1283 1284 7ff747d587d9-7ff747d587dc 1280->1284 1287 7ff747d58884-7ff747d58887 1281->1287 1288 7ff747d58832-7ff747d58857 getsockopt 1281->1288 1297 7ff747d58815-7ff747d5881f 1282->1297 1298 7ff747d58821-7ff747d5882b 1282->1298 1283->1284 1284->1279 1289 7ff747d5888d-7ff747d58894 1287->1289 1290 7ff747d5896f-7ff747d58976 1287->1290 1293 7ff747d58859-7ff747d58861 1288->1293 1294 7ff747d58863-7ff747d5887e setsockopt 1288->1294 1289->1290 1295 7ff747d5889a-7ff747d588c5 setsockopt 1289->1295 1299 7ff747d58978-7ff747d589a5 call 7ff747d46ba0 * 2 1290->1299 1300 7ff747d589aa-7ff747d589b1 1290->1300 1293->1287 1293->1294 1294->1287 1301 7ff747d588de-7ff747d58952 call 7ff747d58c80 * 2 WSAIoctl 1295->1301 1302 7ff747d588c7-7ff747d588d9 call 7ff747d56400 1295->1302 1297->1287 1298->1288 1327 7ff747d589a7 1299->1327 1328 7ff747d589f5-7ff747d589f7 1299->1328 1303 7ff747d589b8-7ff747d589d8 call 7ff747d81a40 call 7ff747d57f40 1300->1303 1304 7ff747d589b3-7ff747d589b6 1300->1304 1301->1290 1325 7ff747d58954-7ff747d5896a WSAGetLastError call 7ff747d56400 1301->1325 1302->1290 1308 7ff747d58a0e-7ff747d58a38 call 7ff747d655a0 call 7ff747d5e0c0 1303->1308 1326 7ff747d589da-7ff747d589e8 call 7ff747d56ee0 1303->1326 1304->1303 1304->1308 1329 7ff747d58a3a-7ff747d58a4a call 7ff747d46100 1308->1329 1330 7ff747d58a4f-7ff747d58a52 1308->1330 1325->1290 1326->1247 1340 7ff747d589ee-7ff747d589f0 1326->1340 1327->1300 1328->1300 1333 7ff747d589f9-7ff747d58a09 call 7ff747d56ee0 1328->1333 1329->1330 1335 7ff747d58a58-7ff747d58a60 1330->1335 1336 7ff747d58aff-7ff747d58b08 1330->1336 1333->1248 1335->1336 1339 7ff747d58a66-7ff747d58a6d 1335->1339 1336->1248 1342 7ff747d58a98-7ff747d58aa3 WSAGetLastError 1339->1342 1343 7ff747d58a6f-7ff747d58a84 connect 1339->1343 1340->1248 1344 7ff747d58aa5-7ff747d58aae 1342->1344 1345 7ff747d58af2-7ff747d58af4 1342->1345 1343->1342 1346 7ff747d58a86-7ff747d58a88 1343->1346 1344->1345 1349 7ff747d58ab0-7ff747d58af0 call 7ff747d42e10 call 7ff747d56400 call 7ff747d56ee0 1344->1349 1347 7ff747d58afb-7ff747d58afd 1345->1347 1346->1347 1348 7ff747d58a8a-7ff747d58a93 1346->1348 1347->1248 1348->1248 1349->1248
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                        • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                        • API String ID: 3453287622-3868455274
                                        • Opcode ID: fe3d70b4b222225ae1404a84adae3a782ffdc59e17204ca3db21be48051b65a4
                                        • Instruction ID: 09e4cc74a0d0d6f01ad0fe121381872f2fdfa73f00ba9e452dba3d4e1be421f5
                                        • Opcode Fuzzy Hash: fe3d70b4b222225ae1404a84adae3a782ffdc59e17204ca3db21be48051b65a4
                                        • Instruction Fuzzy Hash: C6F1BE71A2C282C7E750BB25D4442B9A7A1FB85B88FC14635EA4E47B94DF3CE546CF20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1893 7ff747d65370-7ff747d653be socket 1894 7ff747d653c5-7ff747d6541e htonl setsockopt 1893->1894 1895 7ff747d653c0 1893->1895 1897 7ff747d6554b-7ff747d65567 closesocket * 3 1894->1897 1898 7ff747d65424-7ff747d65439 bind 1894->1898 1896 7ff747d65574-7ff747d65592 call 7ff747d8ff10 1895->1896 1899 7ff747d6556c 1897->1899 1898->1897 1901 7ff747d6543f-7ff747d65455 getsockname 1898->1901 1899->1896 1901->1897 1903 7ff747d6545b-7ff747d6546a listen 1901->1903 1903->1897 1904 7ff747d65470-7ff747d65485 socket 1903->1904 1904->1897 1905 7ff747d6548b-7ff747d654a0 connect 1904->1905 1905->1897 1906 7ff747d654a6-7ff747d654bc accept 1905->1906 1906->1897 1907 7ff747d654c2-7ff747d654de call 7ff747d59790 1906->1907 1910 7ff747d654e5-7ff747d654ec 1907->1910 1910->1910 1911 7ff747d654ee-7ff747d65508 send 1910->1911 1911->1897 1912 7ff747d6550a-7ff747d65526 recv 1911->1912 1912->1897 1913 7ff747d65528-7ff747d6553c memcmp 1912->1913 1913->1897 1914 7ff747d6553e-7ff747d65549 closesocket 1913->1914 1914->1899
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                        • String ID:
                                        • API String ID: 3699910901-0
                                        • Opcode ID: bd23299a83aadd02f23714b29ccd78fc92ed2d7b1aeddd9ecbc35c72079cd919
                                        • Instruction ID: 290455746294764a78b5ecaff95a8d2fdfd6f2978e172571fdcb410bdea3953d
                                        • Opcode Fuzzy Hash: bd23299a83aadd02f23714b29ccd78fc92ed2d7b1aeddd9ecbc35c72079cd919
                                        • Instruction Fuzzy Hash: 4851807162CA42C2DB50BF25E554169B361EB55BB4F904330EA7E436E8DF3CE48ACB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1915 7ff747d57290-7ff747d572dd 1916 7ff747d572e8-7ff747d57323 call 7ff747d5e0c0 1915->1916 1917 7ff747d572df-7ff747d572e3 1915->1917 1922 7ff747d57328-7ff747d5732b 1916->1922 1923 7ff747d57325 1916->1923 1918 7ff747d57806-7ff747d57824 call 7ff747d8ff10 1917->1918 1925 7ff747d5732d-7ff747d57330 1922->1925 1926 7ff747d57348 1922->1926 1923->1922 1927 7ff747d57343-7ff747d57346 1925->1927 1928 7ff747d57332-7ff747d57335 1925->1928 1929 7ff747d5734b-7ff747d57377 call 7ff747d5e150 1926->1929 1927->1929 1928->1929 1930 7ff747d57337-7ff747d57341 1928->1930 1933 7ff747d57379-7ff747d5738d call 7ff747d56280 1929->1933 1934 7ff747d57392-7ff747d5739a 1929->1934 1930->1929 1941 7ff747d577f6-7ff747d577fe 1933->1941 1935 7ff747d5739c-7ff747d573ae call 7ff747d58460 1934->1935 1936 7ff747d573c9-7ff747d573e7 1934->1936 1945 7ff747d573b0-7ff747d573b2 1935->1945 1946 7ff747d573c2-7ff747d573c4 1935->1946 1939 7ff747d573f0-7ff747d57405 1936->1939 1943 7ff747d5740b-7ff747d5741f call 7ff747d668f0 1939->1943 1944 7ff747d5768a 1939->1944 1941->1918 1953 7ff747d57425-7ff747d57450 call 7ff747d5e150 1943->1953 1954 7ff747d575a0-7ff747d575a3 1943->1954 1948 7ff747d5768e-7ff747d5769f 1944->1948 1945->1946 1949 7ff747d573b4-7ff747d573bd call 7ff747d58570 1945->1949 1946->1941 1948->1939 1951 7ff747d576a5-7ff747d576a7 1948->1951 1949->1946 1955 7ff747d577ec 1951->1955 1956 7ff747d576ad-7ff747d576c4 call 7ff747d58b90 1951->1956 1967 7ff747d57469-7ff747d5746c 1953->1967 1968 7ff747d57452-7ff747d57464 call 7ff747d56400 1953->1968 1960 7ff747d57614-7ff747d5765a SleepEx getsockopt 1954->1960 1961 7ff747d575a5-7ff747d575ac 1954->1961 1958 7ff747d577ee 1955->1958 1971 7ff747d57777-7ff747d57779 1956->1971 1972 7ff747d576ca-7ff747d576d1 1956->1972 1958->1941 1963 7ff747d5765c-7ff747d57664 WSAGetLastError 1960->1963 1964 7ff747d57666 1960->1964 1961->1960 1966 7ff747d575ae-7ff747d575b0 1961->1966 1973 7ff747d5766a-7ff747d5766c 1963->1973 1964->1973 1969 7ff747d575b6-7ff747d575fc SleepEx getsockopt 1966->1969 1970 7ff747d574bf-7ff747d574c1 1966->1970 1979 7ff747d574bb 1967->1979 1980 7ff747d5746e-7ff747d57475 1967->1980 1968->1967 1975 7ff747d5760b-7ff747d5760f 1969->1975 1976 7ff747d575fe-7ff747d57606 WSAGetLastError 1969->1976 1970->1944 1983 7ff747d574c7-7ff747d574dc WSASetLastError 1970->1983 1971->1958 1977 7ff747d5777b-7ff747d57782 1972->1977 1978 7ff747d576d7-7ff747d576de 1972->1978 1981 7ff747d5766e-7ff747d57674 1973->1981 1982 7ff747d576e3-7ff747d57731 1973->1982 1975->1970 1976->1970 1984 7ff747d5778d-7ff747d57794 1977->1984 1985 7ff747d57784-7ff747d5778b 1977->1985 1987 7ff747d577a6-7ff747d577e9 call 7ff747d42e10 call 7ff747d56280 1978->1987 1979->1970 1980->1979 1988 7ff747d57477-7ff747d574a3 call 7ff747d5e150 1980->1988 1981->1982 1991 7ff747d57676-7ff747d57685 call 7ff747d56400 1981->1991 1989 7ff747d57733-7ff747d5773b call 7ff747d56ee0 1982->1989 1990 7ff747d57746-7ff747d5775b call 7ff747d58460 1982->1990 1983->1944 1992 7ff747d574e2-7ff747d5754c call 7ff747d5f4b0 call 7ff747d42e10 call 7ff747d56400 1983->1992 1993 7ff747d57796-7ff747d5779d 1984->1993 1994 7ff747d5779f 1984->1994 1985->1987 1987->1955 1988->1979 2009 7ff747d574a5-7ff747d574b6 call 7ff747d58b90 1988->2009 1989->1990 1990->1958 2010 7ff747d57761-7ff747d57763 1990->2010 1991->1944 2018 7ff747d5756e-7ff747d57584 call 7ff747d58b90 1992->2018 2019 7ff747d5754e-7ff747d57555 1992->2019 1993->1987 1994->1987 2009->1979 2010->1958 2014 7ff747d57769-7ff747d57772 call 7ff747d58570 2010->2014 2014->1971 2025 7ff747d57597-7ff747d5759b 2018->2025 2026 7ff747d57586-7ff747d57591 2018->2026 2019->2018 2020 7ff747d57557-7ff747d5755e 2019->2020 2022 7ff747d57560-7ff747d57563 2020->2022 2022->2018 2024 7ff747d57565-7ff747d5756c 2022->2024 2024->2018 2024->2022 2025->1948 2026->1944 2026->2025
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                        • API String ID: 0-3307081561
                                        • Opcode ID: b30f1199c9f24c2381f2513be2d15fd311bda2ea00e714d4c7e6b8ad89958746
                                        • Instruction ID: 74b1ce606fba5826785c05586f8d4e19862c96323d32ccd50bbf443594425365
                                        • Opcode Fuzzy Hash: b30f1199c9f24c2381f2513be2d15fd311bda2ea00e714d4c7e6b8ad89958746
                                        • Instruction Fuzzy Hash: CEE1DC62A2C682C2EB54BB2495446B9A7A5FB89BA4FD10335DA5D077C1DF3CE442CB10
                                        APIs
                                          • Part of subcall function 00007FF747D408F0: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF747D311FA), ref: 00007FF747D40928
                                        • SleepEx.KERNELBASE ref: 00007FF747D41C5F
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D41CD3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D41D14
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D41D4C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                        • API String ID: 18138616-2486835083
                                        • Opcode ID: 8aa7920c36d96e8ea77809a8d8df4f49feeafd954a798cd6ce7502069d1b875f
                                        • Instruction ID: 5f954feb2fce77026d535c0c824c206bc9d1520c02e3d5b760f6220f55c38714
                                        • Opcode Fuzzy Hash: 8aa7920c36d96e8ea77809a8d8df4f49feeafd954a798cd6ce7502069d1b875f
                                        • Instruction Fuzzy Hash: E181D572A7C691C6EB10FB25E4512ADA761FB89394F904331EA5D03AD5DF7CE042CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastmallocrecvsend
                                        • String ID: Send failure: %s
                                        • API String ID: 25851408-857917747
                                        • Opcode ID: 7a6ec3a76c6231206993088be104ec3af0cc4ab87dc5f65d5c7dd7fa27ef8211
                                        • Instruction ID: 4405bf050bb72d8e132b942922aee633f88560097b776235c6df0ac8eb404bca
                                        • Opcode Fuzzy Hash: 7a6ec3a76c6231206993088be104ec3af0cc4ab87dc5f65d5c7dd7fa27ef8211
                                        • Instruction Fuzzy Hash: F941AD72A19B81C6EB64BF25E810779A690BB08FE8F854235CE6D473C4DE3CE446CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 982 7ff747d32ab0-7ff747d32aff call 7ff747d32850 985 7ff747d330b8-7ff747d33127 call 7ff747d33130 Sleep exit 982->985 986 7ff747d32b05-7ff747d32b0a 982->986 991 7ff747d33128-7ff747d3312f call 7ff747d31a00 985->991 986->985 988 7ff747d32b10-7ff747d32c2e call 7ff747d33170 call 7ff747d33c40 call 7ff747d332e0 call 7ff747d33c40 call 7ff747d333e0 call 7ff747d33c40 986->988 1005 7ff747d32c30-7ff747d32c41 988->1005 1006 7ff747d32c64-7ff747d32c7d 988->1006 1007 7ff747d32c5f call 7ff747d8fb54 1005->1007 1008 7ff747d32c43-7ff747d32c56 1005->1008 1009 7ff747d32c7f-7ff747d32c91 1006->1009 1010 7ff747d32cb5-7ff747d32cbd 1006->1010 1007->1006 1008->1007 1015 7ff747d32c58-7ff747d32c5e _invalid_parameter_noinfo_noreturn 1008->1015 1011 7ff747d32caf-7ff747d32cb4 call 7ff747d8fb54 1009->1011 1012 7ff747d32c93-7ff747d32ca6 1009->1012 1013 7ff747d32cbf-7ff747d32cd0 1010->1013 1014 7ff747d32cf3-7ff747d32d0b 1010->1014 1011->1010 1012->1011 1017 7ff747d32ca8-7ff747d32cae _invalid_parameter_noinfo_noreturn 1012->1017 1019 7ff747d32cee call 7ff747d8fb54 1013->1019 1020 7ff747d32cd2-7ff747d32ce5 1013->1020 1021 7ff747d32d0d-7ff747d32d1e 1014->1021 1022 7ff747d32d42-7ff747d32d4a 1014->1022 1015->1007 1017->1011 1019->1014 1020->1019 1026 7ff747d32ce7-7ff747d32ced _invalid_parameter_noinfo_noreturn 1020->1026 1028 7ff747d32d3c-7ff747d32d41 call 7ff747d8fb54 1021->1028 1029 7ff747d32d20-7ff747d32d33 1021->1029 1023 7ff747d32d4c-7ff747d32d5d 1022->1023 1024 7ff747d32d80-7ff747d32dc7 1022->1024 1031 7ff747d32d7b call 7ff747d8fb54 1023->1031 1032 7ff747d32d5f-7ff747d32d72 1023->1032 1033 7ff747d32dc9-7ff747d32dd6 1024->1033 1034 7ff747d32dd8-7ff747d32dfb 1024->1034 1026->1019 1028->1022 1029->1028 1035 7ff747d32d35-7ff747d32d3b _invalid_parameter_noinfo_noreturn 1029->1035 1031->1024 1032->1031 1037 7ff747d32d74-7ff747d32d7a _invalid_parameter_noinfo_noreturn 1032->1037 1039 7ff747d32e52-7ff747d32ea8 call 7ff747d33560 call 7ff747d32850 call 7ff747d34be0 call 7ff747d348d0 1033->1039 1040 7ff747d32dfd-7ff747d32e04 1034->1040 1041 7ff747d32e2f-7ff747d32e32 1034->1041 1035->1028 1037->1031 1060 7ff747d32eae-7ff747d32ebd call 7ff747d348d0 1039->1060 1061 7ff747d32fb3-7ff747d33023 call 7ff747d348d0 call 7ff747d8fb18 call 7ff747d34320 call 7ff747d35a10 call 7ff747d33e60 1039->1061 1040->991 1045 7ff747d32e0a-7ff747d32e18 call 7ff747d8fb18 1040->1045 1042 7ff747d32e3b 1041->1042 1043 7ff747d32e34-7ff747d32e39 call 7ff747d8fb18 1041->1043 1047 7ff747d32e3e-7ff747d32e4d memcpy 1042->1047 1043->1047 1054 7ff747d32e1a-7ff747d32e26 1045->1054 1055 7ff747d32e28-7ff747d32e2e _invalid_parameter_noinfo_noreturn 1045->1055 1047->1039 1054->1047 1055->1041 1066 7ff747d32ebf-7ff747d32ec3 1060->1066 1067 7ff747d32ec5 1060->1067 1087 7ff747d33071-7ff747d330b7 call 7ff747d348d0 call 7ff747d34d10 call 7ff747d33b20 MessageBoxA call 7ff747d33ce0 exit 1061->1087 1088 7ff747d33025-7ff747d33070 call 7ff747d348d0 call 7ff747d349b0 call 7ff747d33b20 ShellExecuteA exit 1061->1088 1069 7ff747d32ec8-7ff747d32ed1 1066->1069 1067->1069 1071 7ff747d32ed6-7ff747d32ef9 call 7ff747d34320 call 7ff747d33e60 1069->1071 1072 7ff747d32ed3 1069->1072 1083 7ff747d32efb-7ff747d32f0c 1071->1083 1084 7ff747d32f2f-7ff747d32f43 1071->1084 1072->1071 1089 7ff747d32f2a call 7ff747d8fb54 1083->1089 1090 7ff747d32f0e-7ff747d32f21 1083->1090 1085 7ff747d32f79-7ff747d32fb2 call 7ff747d8ff10 1084->1085 1086 7ff747d32f45-7ff747d32f53 1084->1086 1092 7ff747d32f71-7ff747d32f74 call 7ff747d8fb54 1086->1092 1093 7ff747d32f55-7ff747d32f68 1086->1093 1087->985 1088->1087 1089->1084 1090->1089 1097 7ff747d32f23-7ff747d32f29 _invalid_parameter_noinfo_noreturn 1090->1097 1092->1085 1093->1092 1098 7ff747d32f6a-7ff747d32f70 _invalid_parameter_noinfo_noreturn 1093->1098 1097->1089 1098->1092
                                        APIs
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D328B7
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32927
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32987
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D329D7
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32A27
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32C58
                                          • Part of subcall function 00007FF747D348D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D34990
                                          • Part of subcall function 00007FF747D8FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF747D343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D8FB32
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32CA8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32CE7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32D35
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32D74
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32E28
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D32E4D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32F23
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32F6A
                                        • ShellExecuteA.SHELL32 ref: 00007FF747D33062
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3306A
                                        • MessageBoxA.USER32 ref: 00007FF747D330A0
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D330B1
                                        • Sleep.KERNEL32 ref: 00007FF747D33119
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D33121
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D33128
                                          • Part of subcall function 00007FF747D33170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3327F
                                          • Part of subcall function 00007FF747D33170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D332C0
                                          • Part of subcall function 00007FF747D33C40: memcpy.VCRUNTIME140 ref: 00007FF747D33C93
                                          • Part of subcall function 00007FF747D332E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D333C0
                                          • Part of subcall function 00007FF747D333E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D334C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                        • String ID: Failure$download$invalidver$message$open$sessionid$success
                                        • API String ID: 3283070336-3881042241
                                        • Opcode ID: cf49ff714c9541b1b840ab2a9c07e03cc1ac99f81636268b598ee9539d4e1603
                                        • Instruction ID: b8207771ccd585b27a3014ded0915d7cb3a750d1a019d4bd5cc00aa12eb73cf2
                                        • Opcode Fuzzy Hash: cf49ff714c9541b1b840ab2a9c07e03cc1ac99f81636268b598ee9539d4e1603
                                        • Instruction Fuzzy Hash: BD02C062E2CB82C2EB04BF64E5443ADA761FB457A4F805335DA6D03A99DF7CE086C750

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1113 7ff747d6bed0-7ff747d6bf4d 1114 7ff747d6bf6e-7ff747d6bf73 1113->1114 1115 7ff747d6bf4f-7ff747d6bf53 1113->1115 1117 7ff747d6bf75-7ff747d6bf8d call 7ff747d56400 1114->1117 1118 7ff747d6bf92-7ff747d6bf96 1114->1118 1115->1114 1116 7ff747d6bf55-7ff747d6bf69 call 7ff747d56400 1115->1116 1129 7ff747d6c3bc-7ff747d6c3c9 1116->1129 1130 7ff747d6c3b3-7ff747d6c3b6 1117->1130 1121 7ff747d6bf98-7ff747d6bfac call 7ff747d56400 1118->1121 1122 7ff747d6bfb1-7ff747d6bfb4 1118->1122 1121->1130 1123 7ff747d6c2ca 1122->1123 1124 7ff747d6bfba-7ff747d6bfbe 1122->1124 1132 7ff747d6c2d2-7ff747d6c2da 1123->1132 1124->1123 1128 7ff747d6bfc4-7ff747d6bfd9 1124->1128 1133 7ff747d6bfdb-7ff747d6bfde 1128->1133 1134 7ff747d6bfe0-7ff747d6c00b realloc 1128->1134 1135 7ff747d6c4d5-7ff747d6c4db 1129->1135 1136 7ff747d6c3cf-7ff747d6c3d3 1129->1136 1130->1129 1130->1135 1137 7ff747d6c2de 1132->1137 1133->1134 1140 7ff747d6c05d-7ff747d6c072 call 7ff747d56600 1133->1140 1141 7ff747d6c00d-7ff747d6c029 call 7ff747d56280 1134->1141 1142 7ff747d6c02e-7ff747d6c05b 1134->1142 1138 7ff747d6c4ed-7ff747d6c503 1135->1138 1139 7ff747d6c4dd-7ff747d6c4e0 1135->1139 1136->1135 1143 7ff747d6c3d9-7ff747d6c3dd 1136->1143 1144 7ff747d6c2e6-7ff747d6c2ec 1137->1144 1146 7ff747d6c54b-7ff747d6c551 1138->1146 1147 7ff747d6c505-7ff747d6c549 memcpy * 2 1138->1147 1139->1138 1145 7ff747d6c4e2-7ff747d6c4ea 1139->1145 1157 7ff747d6c077-7ff747d6c07d 1140->1157 1141->1129 1142->1140 1143->1135 1150 7ff747d6c3e3-7ff747d6c3f8 call 7ff747d59110 1143->1150 1151 7ff747d6c382-7ff747d6c388 1144->1151 1152 7ff747d6c2f2-7ff747d6c307 call 7ff747d56400 1144->1152 1145->1138 1155 7ff747d6c565-7ff747d6c568 1146->1155 1156 7ff747d6c553-7ff747d6c556 1146->1156 1153 7ff747d6c575-7ff747d6c597 call 7ff747d8ff10 1147->1153 1177 7ff747d6c4be-7ff747d6c4d0 call 7ff747d56400 1150->1177 1178 7ff747d6c3fe-7ff747d6c400 1150->1178 1159 7ff747d6c38e-7ff747d6c39e 1151->1159 1160 7ff747d6c0b0-7ff747d6c0bf 1151->1160 1183 7ff747d6c309-7ff747d6c30c 1152->1183 1184 7ff747d6c312-7ff747d6c322 1152->1184 1163 7ff747d6c56a-7ff747d6c56e 1155->1163 1164 7ff747d6c570-7ff747d6c572 1155->1164 1156->1155 1162 7ff747d6c558-7ff747d6c560 1156->1162 1165 7ff747d6c083-7ff747d6c08f 1157->1165 1166 7ff747d6c282-7ff747d6c28a 1157->1166 1159->1130 1170 7ff747d6c3a0-7ff747d6c3a4 1159->1170 1160->1130 1169 7ff747d6c0c5-7ff747d6c0c7 1160->1169 1162->1155 1163->1164 1164->1153 1172 7ff747d6c0a9-7ff747d6c0ae 1165->1172 1173 7ff747d6c091-7ff747d6c097 1165->1173 1174 7ff747d6c28c-7ff747d6c29d 1166->1174 1175 7ff747d6c2a2 1166->1175 1169->1130 1181 7ff747d6c0cd-7ff747d6c0d0 1169->1181 1182 7ff747d6c3ab 1170->1182 1172->1160 1185 7ff747d6c09d-7ff747d6c0a4 call 7ff747d56400 1173->1185 1186 7ff747d6c26e-7ff747d6c27d call 7ff747d56400 1173->1186 1174->1160 1175->1172 1187 7ff747d6c2a8-7ff747d6c2c5 1175->1187 1177->1135 1178->1177 1179 7ff747d6c406-7ff747d6c412 1178->1179 1179->1135 1188 7ff747d6c0e2-7ff747d6c160 call 7ff747d58cd0 1181->1188 1189 7ff747d6c0d2-7ff747d6c0d6 1181->1189 1190 7ff747d6c3ae call 7ff747d56400 1182->1190 1183->1184 1191 7ff747d6c492-7ff747d6c499 1183->1191 1192 7ff747d6c4aa-7ff747d6c4b9 1184->1192 1193 7ff747d6c328-7ff747d6c369 call 7ff747d56400 call 7ff747d6a390 1184->1193 1185->1172 1186->1172 1187->1160 1206 7ff747d6c174-7ff747d6c179 1188->1206 1207 7ff747d6c162-7ff747d6c167 1188->1207 1189->1188 1196 7ff747d6c0d8-7ff747d6c0dc 1189->1196 1190->1130 1191->1182 1192->1190 1208 7ff747d6c49e-7ff747d6c4a5 1193->1208 1209 7ff747d6c36f-7ff747d6c37d call 7ff747d56400 1193->1209 1196->1130 1196->1188 1212 7ff747d6c21e-7ff747d6c222 1206->1212 1213 7ff747d6c17f-7ff747d6c1a9 1206->1213 1207->1206 1211 7ff747d6c169-7ff747d6c16e 1207->1211 1208->1190 1209->1160 1211->1206 1216 7ff747d6c417-7ff747d6c41d 1211->1216 1212->1132 1215 7ff747d6c228-7ff747d6c22d 1212->1215 1217 7ff747d6c1ab-7ff747d6c1ae 1213->1217 1218 7ff747d6c1b0-7ff747d6c1cb realloc 1213->1218 1215->1132 1224 7ff747d6c233-7ff747d6c245 1215->1224 1222 7ff747d6c446-7ff747d6c471 call 7ff747d42620 call 7ff747d56400 1216->1222 1223 7ff747d6c41f-7ff747d6c430 1216->1223 1217->1218 1219 7ff747d6c1f5-7ff747d6c1f9 1217->1219 1220 7ff747d6c476-7ff747d6c48d call 7ff747d56280 1218->1220 1221 7ff747d6c1d1-7ff747d6c1f1 1218->1221 1225 7ff747d6c1fb-7ff747d6c218 memcpy 1219->1225 1226 7ff747d6c21c 1219->1226 1220->1130 1221->1219 1222->1130 1227 7ff747d6c43a-7ff747d6c441 1223->1227 1228 7ff747d6c432 1223->1228 1224->1144 1230 7ff747d6c24b-7ff747d6c26c memcpy 1224->1230 1225->1226 1226->1212 1227->1182 1228->1227 1230->1137
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                        • API String ID: 3510742995-857957974
                                        • Opcode ID: 63ee2a0dd97a7da1f600a00f48456c731edbc326522d4365b0e7d78aef863190
                                        • Instruction ID: a8aa74df9af4c4f672b9fd25facca8f18899db75c10113144d304883f245fc04
                                        • Opcode Fuzzy Hash: 63ee2a0dd97a7da1f600a00f48456c731edbc326522d4365b0e7d78aef863190
                                        • Instruction Fuzzy Hash: 1702BF72A2CE45C6EB60FB15D8443B9A7A4FB44B94F908236DE4D477A4DF38E44ACB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1356 7ff747d6b360-7ff747d6b3ce 1357 7ff747d6b3f0 1356->1357 1358 7ff747d6b3d0-7ff747d6b3e5 1356->1358 1360 7ff747d6b3f7-7ff747d6b411 1357->1360 1358->1357 1359 7ff747d6b3e7-7ff747d6b3ee 1358->1359 1359->1360 1361 7ff747d6badb 1360->1361 1362 7ff747d6b417-7ff747d6b41c 1360->1362 1362->1361 1363 7ff747d6b422-7ff747d6b430 1362->1363 1364 7ff747d6b472-7ff747d6b476 1363->1364 1365 7ff747d6b432-7ff747d6b46c malloc 1363->1365 1367 7ff747d6b478-7ff747d6b4bd malloc 1364->1367 1368 7ff747d6b4c3-7ff747d6b4d4 1364->1368 1365->1364 1366 7ff747d6bacf 1365->1366 1366->1361 1367->1366 1367->1368 1369 7ff747d6b548-7ff747d6b54a 1368->1369 1370 7ff747d6b4d6-7ff747d6b4f0 realloc 1368->1370 1373 7ff747d6b54c-7ff747d6b570 call 7ff747d56600 1369->1373 1374 7ff747d6b5aa-7ff747d6b651 call 7ff747d58cd0 malloc 1369->1374 1371 7ff747d6b4f2-7ff747d6b4fc call 7ff747d56280 1370->1371 1372 7ff747d6b530-7ff747d6b546 1370->1372 1379 7ff747d6b501 1371->1379 1372->1369 1380 7ff747d6b575-7ff747d6b578 1373->1380 1374->1366 1381 7ff747d6b657-7ff747d6b671 memcpy 1374->1381 1382 7ff747d6b506-7ff747d6b52f call 7ff747d8ff10 1379->1382 1383 7ff747d6b57e-7ff747d6b580 1380->1383 1384 7ff747d6b7ef-7ff747d6b7f6 1380->1384 1381->1379 1389 7ff747d6b677-7ff747d6b6e3 free 1381->1389 1385 7ff747d6b7d6-7ff747d6b7ea call 7ff747d56280 1383->1385 1386 7ff747d6b586-7ff747d6b58e 1383->1386 1387 7ff747d6b7fc-7ff747d6b808 1384->1387 1388 7ff747d6bac8-7ff747d6baca 1384->1388 1385->1382 1386->1385 1391 7ff747d6b594-7ff747d6b5a6 1386->1391 1387->1382 1388->1382 1396 7ff747d6b6e9-7ff747d6b6f0 1389->1396 1397 7ff747d6bab3-7ff747d6baba 1389->1397 1391->1374 1399 7ff747d6ba5c-7ff747d6ba68 1396->1399 1400 7ff747d6b6f6-7ff747d6b6fd 1396->1400 1398 7ff747d6babe 1397->1398 1398->1388 1403 7ff747d6ba9b-7ff747d6baae 1399->1403 1404 7ff747d6ba6a-7ff747d6ba96 call 7ff747d42620 call 7ff747d56280 1399->1404 1401 7ff747d6b708-7ff747d6b70f 1400->1401 1402 7ff747d6b6ff-7ff747d6b702 1400->1402 1407 7ff747d6b710-7ff747d6b714 1401->1407 1402->1401 1406 7ff747d6b80d-7ff747d6b814 1402->1406 1403->1382 1404->1382 1409 7ff747d6b816-7ff747d6b81d 1406->1409 1410 7ff747d6b854-7ff747d6b87d call 7ff747d42620 call 7ff747d56280 1406->1410 1411 7ff747d6b716-7ff747d6b71a 1407->1411 1412 7ff747d6b753-7ff747d6b75a 1407->1412 1409->1404 1414 7ff747d6b823-7ff747d6b84f call 7ff747d42620 call 7ff747d56280 1409->1414 1410->1379 1411->1412 1418 7ff747d6b71c-7ff747d6b737 call 7ff747d56b40 1411->1418 1415 7ff747d6b75c 1412->1415 1416 7ff747d6b769-7ff747d6b772 1412->1416 1414->1382 1415->1416 1416->1407 1422 7ff747d6b774-7ff747d6b778 1416->1422 1424 7ff747d6b73c-7ff747d6b742 1418->1424 1426 7ff747d6b77e-7ff747d6b783 1422->1426 1427 7ff747d6b8a8-7ff747d6b8af 1422->1427 1429 7ff747d6b748-7ff747d6b74d 1424->1429 1430 7ff747d6b882-7ff747d6b8a3 call 7ff747d56280 1424->1430 1426->1427 1433 7ff747d6b789-7ff747d6b79a 1426->1433 1431 7ff747d6b8b7-7ff747d6b8be 1427->1431 1429->1412 1429->1430 1430->1382 1431->1398 1435 7ff747d6b8c4-7ff747d6b8c7 1431->1435 1433->1431 1437 7ff747d6b7a0-7ff747d6b7c4 memcpy 1433->1437 1440 7ff747d6b8c9 1435->1440 1441 7ff747d6b8d3-7ff747d6b8db 1435->1441 1437->1435 1442 7ff747d6b7ca-7ff747d6b7cf 1437->1442 1440->1441 1443 7ff747d6b8dd-7ff747d6b8f7 1441->1443 1444 7ff747d6b903 1441->1444 1442->1385 1443->1444 1445 7ff747d6b8f9-7ff747d6b901 1443->1445 1446 7ff747d6b90b-7ff747d6b90e 1444->1446 1445->1446 1447 7ff747d6b914-7ff747d6b945 1446->1447 1448 7ff747d6ba30-7ff747d6ba38 1446->1448 1453 7ff747d6b94b-7ff747d6b953 1447->1453 1454 7ff747d6ba03-7ff747d6ba2e call 7ff747d42620 call 7ff747d56280 1447->1454 1448->1388 1449 7ff747d6ba3e-7ff747d6ba49 1448->1449 1449->1388 1450 7ff747d6ba4b-7ff747d6ba57 call 7ff747d863e0 1449->1450 1450->1382 1453->1454 1457 7ff747d6b959-7ff747d6b95c 1453->1457 1460 7ff747d6b9d5-7ff747d6b9d8 1454->1460 1459 7ff747d6b95e-7ff747d6b965 1457->1459 1457->1460 1461 7ff747d6b967-7ff747d6b98e memset call 7ff747d88dc0 1459->1461 1462 7ff747d6b9d0 1459->1462 1464 7ff747d6b9da CertFreeCertificateContext 1460->1464 1465 7ff747d6b9e0-7ff747d6b9e2 1460->1465 1472 7ff747d6b9cb 1461->1472 1473 7ff747d6b990-7ff747d6b99a 1461->1473 1462->1460 1464->1465 1465->1448 1466 7ff747d6b9e4-7ff747d6b9f5 call 7ff747d56280 1465->1466 1466->1382 1472->1462 1474 7ff747d6b99c-7ff747d6b9a6 1473->1474 1475 7ff747d6b9fa-7ff747d6ba01 1473->1475 1474->1475 1477 7ff747d6b9a8-7ff747d6b9ba call 7ff747d4f9f0 1474->1477 1476 7ff747d6b9c3-7ff747d6b9c6 call 7ff747d56280 1475->1476 1476->1472 1477->1472 1481 7ff747d6b9bc 1477->1481 1481->1476
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                        • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                        • API String ID: 860210379-3059304359
                                        • Opcode ID: 30e917ab12ce18b22b574eb1e06250052fc58bdd5debbb0a950c1574f86e0c98
                                        • Instruction ID: e298234b3b64bdf7b4b3420cfad137775919733fcb638f205291f597b44d9ab7
                                        • Opcode Fuzzy Hash: 30e917ab12ce18b22b574eb1e06250052fc58bdd5debbb0a950c1574f86e0c98
                                        • Instruction Fuzzy Hash: 43127172A1CF81C6EB60AB29D8403AEB7A4FF44B84F904236CA5D47794DF78E546CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1482 7ff747d6a580-7ff747d6a5f0 1483 7ff747d6a5f2-7ff747d6a604 1482->1483 1484 7ff747d6a60f 1482->1484 1483->1484 1485 7ff747d6a606-7ff747d6a60d 1483->1485 1486 7ff747d6a616-7ff747d6a630 call 7ff747d59110 1484->1486 1485->1486 1489 7ff747d6a641-7ff747d6a648 1486->1489 1490 7ff747d6a632-7ff747d6a63c call 7ff747d56400 1486->1490 1492 7ff747d6a64a-7ff747d6a66a GetModuleHandleA GetProcAddress 1489->1492 1493 7ff747d6a688 1489->1493 1490->1489 1492->1493 1495 7ff747d6a66c-7ff747d6a682 call 7ff747d59110 1492->1495 1494 7ff747d6a68a-7ff747d6a69b 1493->1494 1497 7ff747d6a69d-7ff747d6a6b5 1494->1497 1498 7ff747d6a6c0 1494->1498 1495->1493 1502 7ff747d6a684-7ff747d6a686 1495->1502 1497->1498 1500 7ff747d6a6b7-7ff747d6a6be 1497->1500 1501 7ff747d6a6c7-7ff747d6a6ca 1498->1501 1500->1501 1503 7ff747d6a70b-7ff747d6a712 1501->1503 1504 7ff747d6a6cc-7ff747d6a6e3 call 7ff747d59110 1501->1504 1502->1494 1505 7ff747d6a716-7ff747d6a727 1503->1505 1512 7ff747d6a6e5-7ff747d6a6f0 1504->1512 1513 7ff747d6a6f2-7ff747d6a706 call 7ff747d56280 1504->1513 1507 7ff747d6a74c 1505->1507 1508 7ff747d6a729-7ff747d6a741 1505->1508 1511 7ff747d6a753-7ff747d6a755 1507->1511 1508->1507 1510 7ff747d6a743-7ff747d6a74a 1508->1510 1510->1511 1514 7ff747d6a757-7ff747d6a773 call 7ff747d50c70 call 7ff747d50690 1511->1514 1515 7ff747d6a798-7ff747d6a7a2 1511->1515 1512->1505 1523 7ff747d6b30d-7ff747d6b336 call 7ff747d8ff10 1513->1523 1542 7ff747d6a775-7ff747d6a78d 1514->1542 1543 7ff747d6a790-7ff747d6a793 call 7ff747d50ca0 1514->1543 1518 7ff747d6b017-7ff747d6b02e call 7ff747d68210 1515->1518 1519 7ff747d6a7a8-7ff747d6a7d3 1515->1519 1537 7ff747d6b043-7ff747d6b04d call 7ff747d56400 1518->1537 1538 7ff747d6b030-7ff747d6b041 call 7ff747d68210 1518->1538 1521 7ff747d6a80b 1519->1521 1522 7ff747d6a7d5-7ff747d6a7ec 1519->1522 1528 7ff747d6a810-7ff747d6a81a 1521->1528 1526 7ff747d6a7ee-7ff747d6a7f3 1522->1526 1527 7ff747d6a7f5-7ff747d6a7fc 1522->1527 1526->1528 1532 7ff747d6a7fe-7ff747d6a803 1527->1532 1533 7ff747d6a805-7ff747d6a809 1527->1533 1534 7ff747d6a81c-7ff747d6a81f 1528->1534 1535 7ff747d6a822-7ff747d6a82d 1528->1535 1532->1528 1533->1528 1534->1535 1540 7ff747d6a833-7ff747d6a848 1535->1540 1541 7ff747d6afff-7ff747d6b00e call 7ff747d56280 1535->1541 1549 7ff747d6b052-7ff747d6b05d 1537->1549 1538->1537 1538->1549 1540->1541 1541->1518 1555 7ff747d6b308 1541->1555 1542->1543 1543->1515 1550 7ff747d6b0e6-7ff747d6b0f8 1549->1550 1551 7ff747d6b063-7ff747d6b0e4 call 7ff747d56400 call 7ff747d58c90 1549->1551 1554 7ff747d6b0fd-7ff747d6b155 calloc 1550->1554 1551->1554 1557 7ff747d6b157-7ff747d6b161 call 7ff747d56280 1554->1557 1558 7ff747d6b170-7ff747d6b173 1554->1558 1555->1523 1560 7ff747d6b166-7ff747d6b16b 1557->1560 1559 7ff747d6b175-7ff747d6b1d3 1558->1559 1558->1560 1565 7ff747d6b27c-7ff747d6b298 call 7ff747d56b40 1559->1565 1566 7ff747d6b1d9-7ff747d6b208 free 1559->1566 1560->1523 1573 7ff747d6b29d-7ff747d6b2ba 1565->1573 1567 7ff747d6b20a-7ff747d6b210 1566->1567 1568 7ff747d6b256-7ff747d6b277 call 7ff747d42620 call 7ff747d56280 1566->1568 1571 7ff747d6b212-7ff747d6b22b call 7ff747d42620 call 7ff747d56280 1567->1571 1572 7ff747d6b230-7ff747d6b251 call 7ff747d42620 call 7ff747d56280 1567->1572 1568->1523 1571->1555 1572->1523 1583 7ff747d6b2bc-7ff747d6b2bf 1573->1583 1584 7ff747d6b2f9-7ff747d6b300 1573->1584 1583->1584 1588 7ff747d6b2c1-7ff747d6b2f7 1583->1588 1584->1555 1589 7ff747d6b303 call 7ff747d56280 1584->1589 1588->1523 1589->1555
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                        • API String ID: 1646373207-2477831187
                                        • Opcode ID: bc0677f036825092e34c26a2a37eb5fef7990c2c4dba89d5f1d09380014227fe
                                        • Instruction ID: 35ef6780090863ca45420b1b6b5015c05818bd065d44d7df67c4e31fcafc7355
                                        • Opcode Fuzzy Hash: bc0677f036825092e34c26a2a37eb5fef7990c2c4dba89d5f1d09380014227fe
                                        • Instruction Fuzzy Hash: 0A02BF72A1CB81CAE720BF25D8402EEB7A4FB85784F908235DA9D07795DF38E556CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1590 7ff747d4bbc0-7ff747d4bc0b calloc 1591 7ff747d4bd4e-7ff747d4bd57 _errno 1590->1591 1592 7ff747d4bc11-7ff747d4bc9a malloc 1590->1592 1595 7ff747d4bd59-7ff747d4bd75 1591->1595 1593 7ff747d4bc9c-7ff747d4bcc1 InitializeCriticalSectionEx call 7ff747d65370 1592->1593 1594 7ff747d4bcd7-7ff747d4bcde 1592->1594 1602 7ff747d4bcc7-7ff747d4bccf 1593->1602 1603 7ff747d4bd76-7ff747d4bd8a _strdup 1593->1603 1597 7ff747d4bcf0-7ff747d4bd01 free 1594->1597 1598 7ff747d4bce0-7ff747d4bcea DeleteCriticalSection free 1594->1598 1600 7ff747d4bd08-7ff747d4bd10 1597->1600 1601 7ff747d4bd03 call 7ff747d68f90 1597->1601 1598->1597 1605 7ff747d4bd18-7ff747d4bd48 free 1600->1605 1606 7ff747d4bd12 closesocket 1600->1606 1601->1600 1602->1594 1603->1594 1607 7ff747d4bd90-7ff747d4bdb0 free _strdup 1603->1607 1605->1591 1606->1605 1608 7ff747d4bdde-7ff747d4bde8 1607->1608 1609 7ff747d4bdb2-7ff747d4bdc1 call 7ff747d69660 1607->1609 1611 7ff747d4bdea-7ff747d4be12 EnterCriticalSection LeaveCriticalSection 1608->1611 1612 7ff747d4be61-7ff747d4be7c free 1608->1612 1613 7ff747d4bdc6-7ff747d4bdcc 1609->1613 1614 7ff747d4be14-7ff747d4be1c CloseHandle 1611->1614 1615 7ff747d4be25-7ff747d4be28 1611->1615 1612->1591 1616 7ff747d4be1e-7ff747d4be20 1613->1616 1617 7ff747d4bdce-7ff747d4bddb _errno 1613->1617 1618 7ff747d4be48-7ff747d4be4b 1614->1618 1619 7ff747d4be2a-7ff747d4be2d call 7ff747d696b0 1615->1619 1620 7ff747d4be32-7ff747d4be42 call 7ff747d4ba40 free 1615->1620 1616->1595 1617->1608 1623 7ff747d4be4d-7ff747d4be53 call 7ff747d46410 1618->1623 1624 7ff747d4be58-7ff747d4be5b closesocket 1618->1624 1619->1620 1620->1618 1623->1624 1624->1612
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                        • String ID:
                                        • API String ID: 259767416-0
                                        • Opcode ID: 41a72df7b2bc5e60e2d0debc56844bab2a497cda2f686a918ca564a9ee16b53c
                                        • Instruction ID: 942c0f88928eb997e5091c89bdcf02073b3cc0b4a564cd0f1229821a594e354f
                                        • Opcode Fuzzy Hash: 41a72df7b2bc5e60e2d0debc56844bab2a497cda2f686a918ca564a9ee16b53c
                                        • Instruction Fuzzy Hash: 95815B22A19B81C2E624FF21E950269B360FBA9B54F445335DB9E037A2DF78F4D6C710
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                        • API String ID: 0-760484938
                                        • Opcode ID: 333162b9d2a570b1709d695479fe2e93abb5950393d2aa8a7880023664a13f02
                                        • Instruction ID: 4ced5b507656ec07425e81e7827f695f59867aae19ec0c1796d9bd6317f3f09e
                                        • Opcode Fuzzy Hash: 333162b9d2a570b1709d695479fe2e93abb5950393d2aa8a7880023664a13f02
                                        • Instruction Fuzzy Hash: 8542B062A1DBC2D2EB59BB25D5403B8A790FB45B88FC90235CE5D47785DF38E462CB20

                                        Control-flow Graph

                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D42471,?,?,?,?,00007FF747D335A1), ref: 00007FF747D521D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D52221
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfree
                                        • String ID: <$<$<$`$v
                                        • API String ID: 306872129-2056843887
                                        • Opcode ID: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction ID: e8e5336a8b5b9e135479a56fa8549842bdac3c5dc01eefb17574120c075de106
                                        • Opcode Fuzzy Hash: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction Fuzzy Hash: 87914A72918BC1C6E310AF34D5043E977A0FB55B5CF585338CE991A39ADFBAA095CB20

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,00007FF747D82DCA,?,?,?,?,00007FF747D592FB), ref: 00007FF747D58F84
                                        • GetProcAddress.KERNEL32(?,?,00007FF747D82DCA,?,?,?,?,00007FF747D592FB), ref: 00007FF747D58FA9
                                        • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF747D82DCA,?,?,?,?,00007FF747D592FB), ref: 00007FF747D58FBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                        • API String ID: 27745253-3327535076
                                        • Opcode ID: a3bf490c5095baffb162cfe67ac90165bb99800fd7677d2cde9ff42bc9170434
                                        • Instruction ID: 42321ada587f17deb5a2145cf47c18b2414d5afa9b27340a4c07cea188754be4
                                        • Opcode Fuzzy Hash: a3bf490c5095baffb162cfe67ac90165bb99800fd7677d2cde9ff42bc9170434
                                        • Instruction Fuzzy Hash: CF41C352B1D642C6FB15BF16A910179A7A1AF46BD0F888630CE5D07794DE3DE487CB20

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnogetpeernamegetsockname
                                        • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                        • API String ID: 2911674258-670633250
                                        • Opcode ID: 4e6bea4614707d1fdfe342ad5f7c7d8b18d1e85eb23cc2e6cd7b7f77dbf280fa
                                        • Instruction ID: f1af2b0127e257fd92797a224360496271c3f040ea93917398b616c9ef4369ed
                                        • Opcode Fuzzy Hash: 4e6bea4614707d1fdfe342ad5f7c7d8b18d1e85eb23cc2e6cd7b7f77dbf280fa
                                        • Instruction Fuzzy Hash: 20918072A2DBC1C2D710EF25D5542E9B3A0FB89B88F849236DE4C47615DF39E186CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2062 7ff747d68fe0-7ff747d6900d getaddrinfo 2063 7ff747d69013-7ff747d69025 2062->2063 2064 7ff747d691a4-7ff747d691b1 2062->2064 2065 7ff747d6902b 2063->2065 2066 7ff747d69184-7ff747d6918d WSASetLastError 2063->2066 2068 7ff747d69030-7ff747d69036 2065->2068 2067 7ff747d69193-7ff747d691a0 2066->2067 2067->2064 2069 7ff747d6903d-7ff747d69040 2068->2069 2070 7ff747d69038-7ff747d6903b 2068->2070 2072 7ff747d69046 2069->2072 2073 7ff747d690f1-7ff747d690f8 2069->2073 2071 7ff747d69049-7ff747d6904d 2070->2071 2071->2073 2075 7ff747d69053-7ff747d6905a 2071->2075 2072->2071 2073->2068 2074 7ff747d690fe 2073->2074 2076 7ff747d69132-7ff747d6913f 2074->2076 2075->2073 2077 7ff747d69060-7ff747d69063 2075->2077 2079 7ff747d69147-7ff747d6914a 2076->2079 2080 7ff747d69141 freeaddrinfo 2076->2080 2077->2073 2078 7ff747d69069-7ff747d6907a malloc 2077->2078 2081 7ff747d6912c 2078->2081 2082 7ff747d69080-7ff747d690b5 malloc 2078->2082 2083 7ff747d6914c-7ff747d6914f 2079->2083 2084 7ff747d6917f-7ff747d69182 2079->2084 2080->2079 2081->2076 2087 7ff747d6911b-7ff747d6912a free 2082->2087 2088 7ff747d690b7-7ff747d690cd memcpy 2082->2088 2085 7ff747d6917a-7ff747d6917d 2083->2085 2086 7ff747d69151-7ff747d69178 free * 3 2083->2086 2084->2066 2084->2067 2085->2067 2086->2085 2086->2086 2087->2076 2089 7ff747d690de-7ff747d690e8 2088->2089 2090 7ff747d690cf-7ff747d690dc _strdup 2088->2090 2092 7ff747d690ee 2089->2092 2093 7ff747d690ea 2089->2093 2090->2089 2091 7ff747d69100-7ff747d69119 free * 2 2090->2091 2091->2076 2092->2073 2093->2092
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                        • String ID:
                                        • API String ID: 2364279375-0
                                        • Opcode ID: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction ID: 1aac56df41d9735e7b7fd1b955c6e18259b3202bfbe8e1f58d26e8b701a81d1c
                                        • Opcode Fuzzy Hash: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction Fuzzy Hash: 66516E75A1DB42C6EA64BF11A554239F7A0FB44B90F948239DE8E13798DF3CE446CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2094 7ff747d54ea0-7ff747d54ebe call 7ff747d55e80 2097 7ff747d54ec7 call 7ff747d7ee10 2094->2097 2098 7ff747d54ec0-7ff747d54ec5 call 7ff747d7ee50 2094->2098 2102 7ff747d54ecc-7ff747d54eed 2097->2102 2098->2102 2103 7ff747d5517b 2102->2103 2104 7ff747d54ef3-7ff747d54efb 2102->2104 2105 7ff747d55180-7ff747d5519c 2103->2105 2106 7ff747d54efd-7ff747d54f11 call 7ff747d7ea80 2104->2106 2107 7ff747d54f59-7ff747d54f61 2104->2107 2106->2107 2116 7ff747d54f13-7ff747d54f19 2106->2116 2108 7ff747d54f67-7ff747d54fa1 call 7ff747d7f5b0 2107->2108 2109 7ff747d55018-7ff747d55030 call 7ff747d7ef90 2107->2109 2117 7ff747d54fda-7ff747d54fee call 7ff747d7ef90 2108->2117 2118 7ff747d54fa3-7ff747d54fa6 2108->2118 2109->2118 2119 7ff747d55036-7ff747d5504e 2109->2119 2120 7ff747d54f1b-7ff747d54f22 free 2116->2120 2121 7ff747d54f28-7ff747d54f45 call 7ff747d596c0 2116->2121 2117->2118 2135 7ff747d54ff0-7ff747d54ff6 2117->2135 2124 7ff747d54fce 2118->2124 2125 7ff747d54fa8-7ff747d54fab 2118->2125 2126 7ff747d5506c-7ff747d55083 call 7ff747d56280 2119->2126 2127 7ff747d55050-7ff747d5505d call 7ff747d5abb0 2119->2127 2120->2121 2121->2103 2136 7ff747d54f4b-7ff747d54f52 2121->2136 2133 7ff747d54fd3-7ff747d54fd5 2124->2133 2130 7ff747d54fad 2125->2130 2131 7ff747d54fc2-7ff747d54fc9 2125->2131 2126->2105 2144 7ff747d55088-7ff747d55091 2127->2144 2145 7ff747d5505f-7ff747d5506a 2127->2145 2137 7ff747d54fb0 2130->2137 2131->2105 2133->2105 2140 7ff747d54ff8-7ff747d54fff free 2135->2140 2141 7ff747d55005-7ff747d55011 2135->2141 2136->2107 2142 7ff747d551e4-7ff747d551eb 2137->2142 2143 7ff747d54fb6-7ff747d54fbd 2137->2143 2140->2141 2141->2109 2142->2105 2143->2105 2144->2126 2146 7ff747d55093-7ff747d5509a 2144->2146 2145->2126 2145->2127 2147 7ff747d5509c-7ff747d550a2 2146->2147 2148 7ff747d550a4-7ff747d550cf call 7ff747d7ef90 2146->2148 2147->2126 2147->2148 2151 7ff747d5519d-7ff747d551a0 2148->2151 2152 7ff747d550d5-7ff747d550ec _strdup 2148->2152 2153 7ff747d550f9-7ff747d55119 call 7ff747d7ef90 2151->2153 2154 7ff747d551a6-7ff747d551a9 2151->2154 2152->2103 2155 7ff747d550f2 2152->2155 2160 7ff747d5511f-7ff747d55136 _strdup 2153->2160 2161 7ff747d551c0-7ff747d551c3 2153->2161 2154->2124 2156 7ff747d551af-7ff747d551b2 2154->2156 2155->2153 2156->2131 2158 7ff747d551b8-7ff747d551bb 2156->2158 2158->2137 2160->2103 2164 7ff747d55138 2160->2164 2162 7ff747d551c9-7ff747d551cc 2161->2162 2163 7ff747d5513f-7ff747d5515c call 7ff747d7ef90 2161->2163 2162->2124 2165 7ff747d551d2-7ff747d551d5 2162->2165 2169 7ff747d551ed-7ff747d551f0 2163->2169 2170 7ff747d55162-7ff747d55179 _strdup 2163->2170 2164->2163 2165->2131 2167 7ff747d551db-7ff747d551de 2165->2167 2167->2133 2167->2142 2169->2162 2171 7ff747d551f2-7ff747d5520a call 7ff747d7ef90 2169->2171 2170->2103 2170->2171 2174 7ff747d5520c-7ff747d55221 call 7ff747d5abb0 2171->2174 2175 7ff747d55227-7ff747d5523f call 7ff747d7ef90 2171->2175 2174->2103 2174->2175 2180 7ff747d55268-7ff747d55283 call 7ff747d7ef90 2175->2180 2181 7ff747d55241-7ff747d55244 2175->2181 2187 7ff747d55285-7ff747d5529a call 7ff747d5abb0 2180->2187 2188 7ff747d552a1-7ff747d552c4 strtoul call 7ff747d58c90 2180->2188 2181->2124 2182 7ff747d5524a-7ff747d5524d 2181->2182 2182->2131 2184 7ff747d55253-7ff747d55256 2182->2184 2184->2133 2186 7ff747d5525c-7ff747d55263 2184->2186 2186->2105 2193 7ff747d5529c 2187->2193 2194 7ff747d552ca-7ff747d552ea call 7ff747d7ef90 2187->2194 2188->2194 2193->2103 2197 7ff747d552ec-7ff747d552ef 2194->2197 2198 7ff747d5531d-7ff747d5533b _strdup 2194->2198 2197->2198 2199 7ff747d552f1-7ff747d552fb 2197->2199 2198->2103 2200 7ff747d55341-7ff747d55350 2198->2200 2201 7ff747d55302-7ff747d5530b 2199->2201 2202 7ff747d55358-7ff747d5535a 2200->2202 2203 7ff747d55352 2200->2203 2201->2201 2204 7ff747d5530d-7ff747d55318 call 7ff747d55f50 2201->2204 2202->2105 2203->2202 2204->2198
                                        APIs
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55E94
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EAA
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EBE
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55ED2
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EE6
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EFA
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55F0E
                                          • Part of subcall function 00007FF747D55E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55F22
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D54F22
                                          • Part of subcall function 00007FF747D7EE50: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE65
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE7F
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE9A
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EEB6
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EED2
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EEEA
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF02
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF1A
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF32
                                          • Part of subcall function 00007FF747D7EE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF4A
                                          • Part of subcall function 00007FF747D7EE50: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF64
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D55126
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D55169
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF747D552AE
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D5532B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$callocstrtoul
                                        • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                        • API String ID: 954404409-4150109901
                                        • Opcode ID: d5fc2bd1b97f74df62beba7fc475ceb3081383bd7182993d1400e2ae8b10f42b
                                        • Instruction ID: 70cd0a9cad5fba68273b50db7d598e0b569e6570f534ea61f3b1948c9e64750e
                                        • Opcode Fuzzy Hash: d5fc2bd1b97f74df62beba7fc475ceb3081383bd7182993d1400e2ae8b10f42b
                                        • Instruction Fuzzy Hash: E1C1B131A2CA82D7EB69BB25C9407B9A791FB44344FC50231DB1E5B685EF3CE512CB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction ID: 9e09665244528d3e26e70e5a05648ecd0b02170e60add4db1941d64a897f8318
                                        • Opcode Fuzzy Hash: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction Fuzzy Hash: 36911C71B2CE82C6EB647E299D402B9E690FB44754F90C335E91E86BC4DE3CE9468E10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                        • API String ID: 2635317215-3812100122
                                        • Opcode ID: 94f586bf51bbcc24e5a36e66b485c0dbac251b6b1e579bd488a4af3d2ed01ea2
                                        • Instruction ID: 707bfdcddfca09c730b05aa655fbc6642b3982726364ec7ec81fd2ff724f3343
                                        • Opcode Fuzzy Hash: 94f586bf51bbcc24e5a36e66b485c0dbac251b6b1e579bd488a4af3d2ed01ea2
                                        • Instruction Fuzzy Hash: D851C122A1CB82C3FA1ABB25A580379A791FB84790FD50231DB5E53794DF3CE4528F20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system
                                        • String ID: .8$h%49
                                        • API String ID: 3377271179-4206735779
                                        • Opcode ID: 5e185ff44131f8ffb292aacd92914df2fb238af3a598180558577508194563da
                                        • Instruction ID: 76dc287f2dde3bd847c14acb04f7ed019c0443d158d02e321edacd9dba1ad477
                                        • Opcode Fuzzy Hash: 5e185ff44131f8ffb292aacd92914df2fb238af3a598180558577508194563da
                                        • Instruction Fuzzy Hash: CC616162E287D6C9F301EF78E8451BCB771BB99708F405378CEC925E15EBA81249C754
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                        • String ID:
                                        • API String ID: 1133592946-0
                                        • Opcode ID: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction ID: 53a062561f866bf41ace0d8d1280e59368c00b40c5dab303bbd64ef2433480ed
                                        • Opcode Fuzzy Hash: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction Fuzzy Hash: B83150A1A2C203C2FA04BB64A5513F9E691AF46788FC44A34DA4D4B3D3DE2CA447CA70
                                        APIs
                                          • Part of subcall function 00007FF747D68FE0: getaddrinfo.WS2_32 ref: 00007FF747D69002
                                          • Part of subcall function 00007FF747D68FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D6906E
                                          • Part of subcall function 00007FF747D68FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D690A8
                                          • Part of subcall function 00007FF747D68FE0: memcpy.VCRUNTIME140(?,?,?,00007FF747D4BB05), ref: 00007FF747D690C1
                                          • Part of subcall function 00007FF747D68FE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D690CF
                                          • Part of subcall function 00007FF747D68FE0: freeaddrinfo.WS2_32(?,?,?,00007FF747D4BB05), ref: 00007FF747D69141
                                          • Part of subcall function 00007FF747D68FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D69155
                                          • Part of subcall function 00007FF747D68FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D6915F
                                          • Part of subcall function 00007FF747D68FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D4BB05), ref: 00007FF747D6916C
                                        • WSAGetLastError.WS2_32 ref: 00007FF747D4BB0B
                                        • WSAGetLastError.WS2_32 ref: 00007FF747D4BB15
                                        • EnterCriticalSection.KERNEL32 ref: 00007FF747D4BB30
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF747D4BB3F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4BB50
                                        • send.WS2_32 ref: 00007FF747D4BB73
                                        • WSAGetLastError.WS2_32 ref: 00007FF747D4BB7D
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF747D4BB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                        • String ID:
                                        • API String ID: 506363382-0
                                        • Opcode ID: 42967842f68ceaa853a16063dead967f6bbf823a8214e1f46a4740f52b57b5c3
                                        • Instruction ID: 447d980399a605327d0f7878315c128c637e4411a035f97411840babcba596a7
                                        • Opcode Fuzzy Hash: 42967842f68ceaa853a16063dead967f6bbf823a8214e1f46a4740f52b57b5c3
                                        • Instruction Fuzzy Hash: 4C31AB7161C642C2E750BF25E855269B7A0FF84B98F804331D65E836A8DF3CE447CB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction ID: 44fb5ef04015c818080b0d4679aa90a334513b2c9f0d8c9479b473d7fb7a9063
                                        • Opcode Fuzzy Hash: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction Fuzzy Hash: 86A1E921A3CA52C6EB697F25DC10279A295FF44B94F908335E95E46BC4DF3DD8028B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                        • API String ID: 1294909896-116363806
                                        • Opcode ID: 06d614f5a40dbf42b348ec526ed1014891f1a8567d3546127b6d1c09ef856b86
                                        • Instruction ID: 824438e9fe48b46758600c3d5a38b2243906fa46b1212deef72d307028e9ac38
                                        • Opcode Fuzzy Hash: 06d614f5a40dbf42b348ec526ed1014891f1a8567d3546127b6d1c09ef856b86
                                        • Instruction Fuzzy Hash: 32914972618F81C6EB10AF66D8506AD77A4FB84B85F844235CE8D577A8DF38D446CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                        • API String ID: 3056473165-3891197721
                                        • Opcode ID: b841224005b667f0fec0900590e035601761791e8c79bf0361c4f5e0c6ca09c0
                                        • Instruction ID: 502d9f0bae76e8eca6f4617888d9a780738e91f9ba4aebf8d4da31d46dad5271
                                        • Opcode Fuzzy Hash: b841224005b667f0fec0900590e035601761791e8c79bf0361c4f5e0c6ca09c0
                                        • Instruction Fuzzy Hash: 1971AF72B18B05CAEB10EB65D4506AD73A1FB48BA8F904335DE2D577D4EE38E40ACB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s$Connection #%ld to host %s left intact
                                        • API String ID: 1294909896-118628944
                                        • Opcode ID: e91a0139a46916ed625c7b167e581e5f61640a50a9e451340a2a8c6e17119c8f
                                        • Instruction ID: 8480088400ccfe23880a3ccdf2bfadc4b54c316fab27e777fdceda4a6232d3ff
                                        • Opcode Fuzzy Hash: e91a0139a46916ed625c7b167e581e5f61640a50a9e451340a2a8c6e17119c8f
                                        • Instruction Fuzzy Hash: EC919032B6C681C2E758BB25D9413F9A395FB44B94F844671CE4E17395CF38E462CB60
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D51ACB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D51AE1
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D518FD
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5191A
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5192E
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5194A
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51967
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5198A
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5199E
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519B2
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519D8
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519EC
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A00
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A4F
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A5C
                                          • Part of subcall function 00007FF747D51880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A85
                                        • memset.VCRUNTIME140 ref: 00007FF747D51B15
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 2717317152-3248832348
                                        • Opcode ID: cbfb84e7a1472e2dc6d1eeab6a04b2804bc59b0f2f042e7c9ebc47c7a51ee133
                                        • Instruction ID: ea80f3c71cdf622697de26909b37c9d47301d863a4c0c508d4690181aec870d4
                                        • Opcode Fuzzy Hash: cbfb84e7a1472e2dc6d1eeab6a04b2804bc59b0f2f042e7c9ebc47c7a51ee133
                                        • Instruction Fuzzy Hash: 8A71826291CAC2C2E751FF2594003BDA750FB85B98FD94336DA5D0B285DF3AE442CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memcpy
                                        • String ID: 1.1
                                        • API String ID: 4107583993-2150719395
                                        • Opcode ID: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction ID: 04ad0e47e39a4f1ae3e781bd4c7916b1a5ed9945801963562d005914dd33a441
                                        • Opcode Fuzzy Hash: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction Fuzzy Hash: 96516E72619E85C6E764AF22E9403AAB3A4FB49B84F848131CF9E57754DF3CE056CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 1294909896-3343404259
                                        • Opcode ID: 10657737ca2f4763c17a4a63984ea63c382b0e81ced8098d2d3c6f5d42afd508
                                        • Instruction ID: 32cd6a77b01da18ecae757ef71025bf9f209d874beb773290e7962ebf7ca2fa2
                                        • Opcode Fuzzy Hash: 10657737ca2f4763c17a4a63984ea63c382b0e81ced8098d2d3c6f5d42afd508
                                        • Instruction Fuzzy Hash: B5D1C561A6C642C5FB25BF69D4523BCA3A1FF40B88F885671CE4D17689DF38E442CB60
                                        APIs
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D328B7
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32927
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32987
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D329D7
                                          • Part of subcall function 00007FF747D32850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32A27
                                        • MessageBoxA.USER32 ref: 00007FF747D33737
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3379A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                        • String ID: keyauth.win$null
                                        • API String ID: 3545939226-2841560827
                                        • Opcode ID: 3e5abb7288890a4fc8899d222c24889ad372a90a3be2c578b41b68e9d64047e2
                                        • Instruction ID: 04d8d39a0809c879703d2ba5324948f46ee287606b19650beae60a6d114d3076
                                        • Opcode Fuzzy Hash: 3e5abb7288890a4fc8899d222c24889ad372a90a3be2c578b41b68e9d64047e2
                                        • Instruction Fuzzy Hash: 7451DA62B2C781C6FB04FB75D5453AC6361AB05B88FC04234DE4D27B8ACF3CA1928B90
                                        APIs
                                          • Part of subcall function 00007FF747D58F70: GetModuleHandleA.KERNEL32(?,?,?,00007FF747D82DCA,?,?,?,?,00007FF747D592FB), ref: 00007FF747D58F84
                                        • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF747D592FB), ref: 00007FF747D82DE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressCallerHandleModuleProc
                                        • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                        • API String ID: 2084706301-3788156360
                                        • Opcode ID: 8c00c9138cdfd17adfae597e72f02553676a85cbf6f4c48e13838bd5606a6a78
                                        • Instruction ID: 89ff28cf3e7e3947ad8c3a0db8eef36ed166fb34aef3aaf8e3ee35a3bcac9e63
                                        • Opcode Fuzzy Hash: 8c00c9138cdfd17adfae597e72f02553676a85cbf6f4c48e13838bd5606a6a78
                                        • Instruction Fuzzy Hash: 3EF03CA5E2EB03D1FE49BF15A9817B0A7A0AF55344FC90634C40D46395EE3CB5878B60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 0-3343404259
                                        • Opcode ID: 0941e4454e05a29280e0911c3d610acfc878dd03c0a985a790bc3422c380df87
                                        • Instruction ID: 4b15dffbf92405b0aad6f6dbdb67eddbb210cffa1cf6c5033f27b28b2f46c93b
                                        • Opcode Fuzzy Hash: 0941e4454e05a29280e0911c3d610acfc878dd03c0a985a790bc3422c380df87
                                        • Instruction Fuzzy Hash: CBB1B662A6C642C5FB64BF29C05627CA3A0FF41B98F984671CA0E472C5DF79E442CB60
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D61CE0
                                          • Part of subcall function 00007FF747D62270: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D622CA
                                          • Part of subcall function 00007FF747D62020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D620B8
                                          • Part of subcall function 00007FF747D62020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D620C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                        • API String ID: 3095843317-1242256665
                                        • Opcode ID: c5e2180f9f9cf6fdb7d008c5cb0212e23c1ef3b8c29572bc44d1bb43f673ab2e
                                        • Instruction ID: 64c15b9fa9ca35ca39f28c6b6e484a2a5189f06975c870cba6d98679a151d0f2
                                        • Opcode Fuzzy Hash: c5e2180f9f9cf6fdb7d008c5cb0212e23c1ef3b8c29572bc44d1bb43f673ab2e
                                        • Instruction Fuzzy Hash: D1418771A1CA82C6E760FB25E4003BAB7A1EF89784F988132DA4D47685DE3DD446CF60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket$calloc
                                        • String ID:
                                        • API String ID: 2958813939-0
                                        • Opcode ID: b6a456a4a089e4e3369fdf0305b80fa9ba2a8c6b6d91dea78aa5f024105f3f8c
                                        • Instruction ID: 98edcc1336b06be934572de3a2b324b21c74e798e039ce98b0babe237a7a1986
                                        • Opcode Fuzzy Hash: b6a456a4a089e4e3369fdf0305b80fa9ba2a8c6b6d91dea78aa5f024105f3f8c
                                        • Instruction Fuzzy Hash: C3416031A2CA42D2E740FF34D4512E9A361EF88768FC44735DE5E4A2DAEF39D1468B20
                                        APIs
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF747D311FA), ref: 00007FF747D40928
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF747D311FA), ref: 00007FF747D409C9
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D409E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 326894585-0
                                        • Opcode ID: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction ID: a95af23586598f2db8b21381433705b0881653d92597982291c4355c1bb11b42
                                        • Opcode Fuzzy Hash: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction Fuzzy Hash: 9631E862B6D746C1FA15BB51E94137C9250AF05BE4F980BB0DE6D0BBC2DE3CA4938750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                        • API String ID: 0-3791222319
                                        • Opcode ID: 7fa13c49b24e689c40520287ff494307deb94f068bb3c06259e26676ef4ea447
                                        • Instruction ID: ce337b71d0f3171c997cc627a4a0a492f9c3be664e18181bf0bd1e514ae400b8
                                        • Opcode Fuzzy Hash: 7fa13c49b24e689c40520287ff494307deb94f068bb3c06259e26676ef4ea447
                                        • Instruction Fuzzy Hash: 5251A332A2CA42C6EB64FB259944279A790FB857A4F94C331DE5D472D5EE3CE412CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freerecv
                                        • String ID:
                                        • API String ID: 2032557106-0
                                        • Opcode ID: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction ID: 507aaaff6b2529ba7861c2ce9ae6cec3ec776de7fe6a79b1fd5e8e62bb623add
                                        • Opcode Fuzzy Hash: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction Fuzzy Hash: D9C1C73266C682C6EB65BB25D8513B9A390FB447A4F844375DEAE437C4EE3CD8468F10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 1294909896-3248832348
                                        • Opcode ID: acf7e0c6a19e3e6413a3c3b3ac2091e70b7d1ead12cd6da52550afa0c6970e1d
                                        • Instruction ID: 22d6d81d7829f6a0a62f1a282d8575ad13fdf4913356f7f16b7462eaed735257
                                        • Opcode Fuzzy Hash: acf7e0c6a19e3e6413a3c3b3ac2091e70b7d1ead12cd6da52550afa0c6970e1d
                                        • Instruction Fuzzy Hash: C6518462A1CAC1C2E741AF35D1503EDA750EB84B98F884231DE8C5B3D9DF79E496CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 4275364305-0
                                        • Opcode ID: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction ID: 126f72382f821dcdd7135844e22be3003416d6e00e57a307c5dbbf88414b3478
                                        • Opcode Fuzzy Hash: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction Fuzzy Hash: 63118261A2C586C2EE10FB10E455369A360FF897E4FC00331E59E066E9DF2CE486CF14
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID:
                                        • API String ID: 2514157807-0
                                        • Opcode ID: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction ID: f29ae389f0651d3591cf1dbfd2c3774d0f230bf6886b2bff4dfea38a40fd324d
                                        • Opcode Fuzzy Hash: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction Fuzzy Hash: 09E0DF61F18609C3FF286BB0A8657391294DB49732F844774CA3A863C0DA2C44D74B10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func__stdio_common_vfprintf
                                        • String ID:
                                        • API String ID: 2168557111-0
                                        • Opcode ID: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction ID: 46ff2ed00c7a3ab81f32a6765d3a0cb135c072dbd50b6eb780e458f0b396220f
                                        • Opcode Fuzzy Hash: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction Fuzzy Hash: AFE03972A08B81C2D600AB50F90455AF7A8FB997C4F804235EBCC57A29CF7CD1A6CB40
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction ID: 1e9b6813f6c1c5342b3ee8bf6ddd8282a07e9189d80435c1f8f9d15d7cca8701
                                        • Opcode Fuzzy Hash: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction Fuzzy Hash: 4A019612B2D541C2EF54FB2AE5593ADA790EF88FC8F884171D70E47295CE28D4968B10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket
                                        • String ID:
                                        • API String ID: 98920635-0
                                        • Opcode ID: 9aa50d9fc156e246847f462c3a65219810722acfc51c2770c2959e6d5f14f527
                                        • Instruction ID: 8f58cf62452736656b68c7e327defdda330f7cfd3320f54ba6382cf22fb56ddd
                                        • Opcode Fuzzy Hash: 9aa50d9fc156e246847f462c3a65219810722acfc51c2770c2959e6d5f14f527
                                        • Instruction Fuzzy Hash: FFE0ED2AE1A201C2DE08BB3188912A82360AB40B60FC04370C63D063C0CE2DA6579F10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _beginthreadex
                                        • String ID:
                                        • API String ID: 3014514943-0
                                        • Opcode ID: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction ID: 004ef11e1d5d58af9a638af1dc9c33046cb65e67a92dd3041c52e3ba56daafa8
                                        • Opcode Fuzzy Hash: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction Fuzzy Hash: 59D02BA3718A00839F10DF71A840029E251F788770B884738EE7D837E0DB3CD1424A00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ioctlsocket
                                        • String ID:
                                        • API String ID: 3577187118-0
                                        • Opcode ID: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction ID: 6324d2536b995ffa2a168dcf879f8542f389aab2e9123d338d7b4ba44eaf864c
                                        • Opcode Fuzzy Hash: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction Fuzzy Hash: DEC08056F25581C2C3447F615485087A771BBC4304FD56535D10742524DD3CD2E5CF40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                        • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                        • API String ID: 3939785054-690044944
                                        • Opcode ID: a1538a2fe93912e992e6f2d42a2ea1633298ef863c6a51220481b0b8fab12c33
                                        • Instruction ID: 87d9427f70d3a465e188327417561b8946a1d4fca71e5cebe4699de2203f3f9c
                                        • Opcode Fuzzy Hash: a1538a2fe93912e992e6f2d42a2ea1633298ef863c6a51220481b0b8fab12c33
                                        • Instruction Fuzzy Hash: CDC28271A2CA82C5EB50BB2594443F9A791EF41B98F888235CE4D0B6C9DE3DE547CB70
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                        • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                        • API String ID: 2059720140-3844637060
                                        • Opcode ID: aefc85c06da91ef1b4f678a21f8745f1fa9ed17bfba3c9c6ac9d2c0e2c9fcc93
                                        • Instruction ID: 002a4dd48faa8dcb00106b076a5e4d94a9bd2bcc5ca7069f098aeca921dede0c
                                        • Opcode Fuzzy Hash: aefc85c06da91ef1b4f678a21f8745f1fa9ed17bfba3c9c6ac9d2c0e2c9fcc93
                                        • Instruction Fuzzy Hash: C6728F61A6C686C6FB61FB26D4453B9A7A0FF45784F844271CA8E027D9DF2CE446CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 1664669839-85532522
                                        • Opcode ID: 57745755b259e84db2332ad81b64edb5a67cb0af63b873a31d00d3511d4f9ebf
                                        • Instruction ID: 836466952312020830e32b038f1dcd1e5679744b687e16797fea35067733fc80
                                        • Opcode Fuzzy Hash: 57745755b259e84db2332ad81b64edb5a67cb0af63b873a31d00d3511d4f9ebf
                                        • Instruction Fuzzy Hash: F8A2A362B2CA86C6EB10FB68D5443ADA361FB457A4F804331DA6D07AD9DF7CE086C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                        • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                        • API String ID: 561913010-2037819326
                                        • Opcode ID: cd7eead237edb2df29b0f3e516ee76bf61877b4d14e84d580c823e5bfa7684d5
                                        • Instruction ID: b8e26d3fc93a49d9d90bbf1704e77b7829a06f5b84b714bee50172651fc03a7c
                                        • Opcode Fuzzy Hash: cd7eead237edb2df29b0f3e516ee76bf61877b4d14e84d580c823e5bfa7684d5
                                        • Instruction Fuzzy Hash: 4C42C272A2C742C1EB50BB25E8402BDA7A1FB45BA4F814735CA6D07795DF3CE546CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastcallocfreegetsockname
                                        • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                        • API String ID: 2454324209-2383553807
                                        • Opcode ID: a5c87e57f183c2b1b57544dd0ccfb1f9742bdef05442f3db7c5aeea4c5c747ae
                                        • Instruction ID: 55e54d95211c9dc47ebe7f01d3dd378ff972710fcf4f88e2ece5d55f8035b8c3
                                        • Opcode Fuzzy Hash: a5c87e57f183c2b1b57544dd0ccfb1f9742bdef05442f3db7c5aeea4c5c747ae
                                        • Instruction Fuzzy Hash: 4022B761A2C786C2EB50BF25D4402BEA761FB45B84FC44232EA4E5B795DF3CE506CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                        • API String ID: 2190258309-2223379150
                                        • Opcode ID: 9269791fad170fb51524a65b613c9bd3239b3ce5b25056bc193c597442e6137b
                                        • Instruction ID: 17804d2e1d21b57248bdf0005f58e053864dfaf2b230f212c12b626238f7aafe
                                        • Opcode Fuzzy Hash: 9269791fad170fb51524a65b613c9bd3239b3ce5b25056bc193c597442e6137b
                                        • Instruction Fuzzy Hash: 4A125B72A1CB46C6EB10FF61E5542B9B7A4FB44B84F950235DA9D43B98DF38E406CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp$memset
                                        • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                        • API String ID: 3268688168-2769131373
                                        • Opcode ID: b5570f6d403c128652ce2c25ce15cc15f8bf162699db2796c53ee2ee932b2f9c
                                        • Instruction ID: fb53d22f82bd7b367a5d647e6f03c7cac09aa46f929e8a7ec289a05dfd7dd808
                                        • Opcode Fuzzy Hash: b5570f6d403c128652ce2c25ce15cc15f8bf162699db2796c53ee2ee932b2f9c
                                        • Instruction Fuzzy Hash: E0E1E162A2C692C6E750FB25D8002B9A760FB99B88FC15731DE4E53755DF7CE4828B20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-4282655970
                                        • Opcode ID: f67e65bda64f7bc2ff11744649ac0d4417b9831fe5915c7b7913ff7f7f31b820
                                        • Instruction ID: 7f4006aee88112598d81a970edb1d5e3dc2076a85ca76d9787cbb551bf3a6789
                                        • Opcode Fuzzy Hash: f67e65bda64f7bc2ff11744649ac0d4417b9831fe5915c7b7913ff7f7f31b820
                                        • Instruction Fuzzy Hash: 8081B561B2DA42C2FB65BF219850379A790BF85794FD48235CA9E067D0EF3CE456CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 958247072-579821726
                                        • Opcode ID: bb7f3fb9ed15c36171e49e9f8989b7fec12843ec510944212f621a99c3a71fb2
                                        • Instruction ID: 160072539e5588e663a820176123918aa45ab2085a86a9de859e4cc0c9ebcaae
                                        • Opcode Fuzzy Hash: bb7f3fb9ed15c36171e49e9f8989b7fec12843ec510944212f621a99c3a71fb2
                                        • Instruction Fuzzy Hash: E232A262A2CA86C6EB10FB68D5443EDA321FB45794F804331DAAD07AD9DF7CE186C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-1887299029
                                        • Opcode ID: d27a0d2bd81bbd69c5f44cbac832e1c64e7776eb9c4d4244ef604611dd81367d
                                        • Instruction ID: 3219043f21bfc7d1e64f345bf0f20109ee22a92b28a7d176e2fdc1f3fe7ecc38
                                        • Opcode Fuzzy Hash: d27a0d2bd81bbd69c5f44cbac832e1c64e7776eb9c4d4244ef604611dd81367d
                                        • Instruction Fuzzy Hash: E081B561B2DA42C2FB65BF219850379A790BF85794FD48235CA9E067D0EF3CE456CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup$fclosefgetsfopen
                                        • String ID: $default$login$machine$password
                                        • API String ID: 431015889-155862542
                                        • Opcode ID: 46801e4ccde35eed6738ec0e483ec203f36e37a38120e43c68a52e88cf771356
                                        • Instruction ID: b5eaac9a1e6f4eefeb7c73295c5654ab6223721c4cfedd776fa62a592505764e
                                        • Opcode Fuzzy Hash: 46801e4ccde35eed6738ec0e483ec203f36e37a38120e43c68a52e88cf771356
                                        • Instruction Fuzzy Hash: D2A1DA21A2D682C5FB61BF11945037AE6A0BF89784FC94235DE6E06794DE3DE44ACF30
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno$strtol
                                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                        • API String ID: 3596500743-988243589
                                        • Opcode ID: d49d3298ae75f34013cd756147334e6d7bf0667b6907b24902a762b26ed2f88a
                                        • Instruction ID: 5f767c482fdc0773206528332393a7bb9b399c66e863479779394b8fa1171114
                                        • Opcode Fuzzy Hash: d49d3298ae75f34013cd756147334e6d7bf0667b6907b24902a762b26ed2f88a
                                        • Instruction Fuzzy Hash: 47F1C572F2CA11CAEB24FF6894002BCB7A1BB54758F908336DE5E577D4DE38A4468B50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                        • API String ID: 600764987-1381340633
                                        • Opcode ID: 39d8055be6ec056283ed4960e21ca087c558c9f9d2422bf2f03a300a2b34b755
                                        • Instruction ID: 674df83b15d1694079c944aac0ab0b0e015d93ed0234b5f4dd3b4d8b7d241d5e
                                        • Opcode Fuzzy Hash: 39d8055be6ec056283ed4960e21ca087c558c9f9d2422bf2f03a300a2b34b755
                                        • Instruction Fuzzy Hash: E1318262A2D7C1C5E661BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                        • API String ID: 0-2774518510
                                        • Opcode ID: 745435d4fb9e7f04f50e6d905b171f08d47d5887c20ab5b3ce49ff8c6c0d15a0
                                        • Instruction ID: 31f4b1149ab91d39bb64553f2f475e521fc0f5d4941cef05764e532ffbd4047c
                                        • Opcode Fuzzy Hash: 745435d4fb9e7f04f50e6d905b171f08d47d5887c20ab5b3ce49ff8c6c0d15a0
                                        • Instruction Fuzzy Hash: EE421A25A2D7C2C7EB65BA3580403B9B790EB45B4CFCA4235CB9D47285DF2DA853CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                        • String ID: @
                                        • API String ID: 3606780921-2766056989
                                        • Opcode ID: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction ID: da3e76b4c95ca3f84f82ccd301291cb1ef9e0939c6836da4a175194acd02e12a
                                        • Opcode Fuzzy Hash: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction Fuzzy Hash: 2D216F7262D681C6E760BF51E45166AB371FBC9B84F845235EA8E03A18CF3CE546CF50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 313767242-0
                                        • Opcode ID: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction ID: d48dcdd15ee2a345593f402329f3c30803e81dd14066f42734ae73976b5ee18f
                                        • Opcode Fuzzy Hash: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction Fuzzy Hash: 6B3152B2619B82C6EB60AF60E8403EDB364FB85744F84453ADB4D57B94DF38D649CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                        • String ID: @
                                        • API String ID: 3016261861-2766056989
                                        • Opcode ID: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction ID: 5326289a267218cd3ea16622175517ed51efc16391110bd3ab77e041c77b1da8
                                        • Opcode Fuzzy Hash: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction Fuzzy Hash: 3441C062B186A0CEF7109BB5E4513EE7BB1F74A348F444125DE9D23A8ACB3CD11ADB50
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF747D6CED8,?,?,?,?,?,?,00007FF747D8411E), ref: 00007FF747D6CF56
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF747D6CED8,?,?,?,?,?,?,00007FF747D8411E), ref: 00007FF747D6D0BD
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D6D21C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                        • API String ID: 3985033223-3943651191
                                        • Opcode ID: 092af0b52317d516cc00b58607fe5a81875a0807e6a20edfeecc1d53f2319083
                                        • Instruction ID: 680c3ba53fa4465f526c7e133ff55fe7e9f698e466e145ef27acb42ceb87eed0
                                        • Opcode Fuzzy Hash: 092af0b52317d516cc00b58607fe5a81875a0807e6a20edfeecc1d53f2319083
                                        • Instruction Fuzzy Hash: AE91E97252CAD1C5EB21BB25A4103BABBA1EB85794F888331DAAD477D5CF3CD406CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$ErrorLastbind
                                        • String ID: bind() failed; %s
                                        • API String ID: 2604820300-1141498939
                                        • Opcode ID: 11c834e924142107a97f1254d32c74a80aa968f4d006e7e10ea6cca4b6756a31
                                        • Instruction ID: d03a7d773ae19faac57d4cdc3f9460cd4171f7fd4bcc6e1014ffd41ac3d2b191
                                        • Opcode Fuzzy Hash: 11c834e924142107a97f1254d32c74a80aa968f4d006e7e10ea6cca4b6756a31
                                        • Instruction Fuzzy Hash: 2751AF32A1CB82C6EB15BB65C5503B9B3A4FB48B84F844235CE4D4B785DF3CE45A8B20
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 0-1379995092
                                        • Opcode ID: 1a46011813abe3df587649df29dca278059a1793d187c85371252c5ab630468f
                                        • Instruction ID: cdefd7ce7cdaa9dfe3b15d224cbc90c6246481de90a28bf0b683b635255d56fa
                                        • Opcode Fuzzy Hash: 1a46011813abe3df587649df29dca278059a1793d187c85371252c5ab630468f
                                        • Instruction Fuzzy Hash: 5D42F42292D9A2C7E6357A149644379EF91FFC4794FD24330DA9E476C4DE3CE8438A60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2.6$3ee9e40d39e383d059f410c5d176cbefa3865cab68dfcd7cde49bcebd7424293$9WIvTVJa9m$Loader Principal | Private Store$https://keyauth.win/api/1.2/
                                        • API String ID: 0-1941432435
                                        • Opcode ID: ec952fdf6a254412496e28a8ad1894173477c2024606998da486d48c1547abbb
                                        • Instruction ID: 8a2775fd8c5bd8aa121011b258c3a0b568fdb01ffb46e7487c00407bd470d48c
                                        • Opcode Fuzzy Hash: ec952fdf6a254412496e28a8ad1894173477c2024606998da486d48c1547abbb
                                        • Instruction Fuzzy Hash: BB123B62D3EB82CAF703B73594011A4F354AFA7784F85D336ED4431966EF29B2878A44
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                        • String ID:
                                        • API String ID: 2933794660-0
                                        • Opcode ID: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction ID: 78ce92147010449fb6e3ef975098f99c47ac54226a2f5370de6a62b25dd7c5c7
                                        • Opcode Fuzzy Hash: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction Fuzzy Hash: A3114C22B28B01C9EB00EF60E8442A873B4F759758F840E31DA2D827A8DF38E1658750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _getpidhtons
                                        • String ID:
                                        • API String ID: 3416910171-0
                                        • Opcode ID: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction ID: 171ced9e794107d508376764819a101ff7c6141ae5b80057a4a9ac2a0105b276
                                        • Opcode Fuzzy Hash: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction Fuzzy Hash: 6E117C62A287D0CAD304CF35E5001AD77B0FB5CB84B44962AFB8987B18EB78D690CB04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@
                                        • String ID:
                                        • API String ID: 1029415015-0
                                        • Opcode ID: 4d63e86f281f0f8040124130d05909f5cac1b0fcea5ece721468537f7454344d
                                        • Instruction ID: 3481224308f2a84975a21f337bf32f3290b1d2080e6ef9ee61a8265c97d1ebcf
                                        • Opcode Fuzzy Hash: 4d63e86f281f0f8040124130d05909f5cac1b0fcea5ece721468537f7454344d
                                        • Instruction Fuzzy Hash: 1181BC32B29B99CAEB00EB79D4843AC6770E715B88F944236DE4E57785DF38D082C720
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction ID: 7c4eb8e911909a073dd45f24176bab144b61a2c939f96f5e959b797d82e70034
                                        • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction Fuzzy Hash: F0610662B2DB44C3EB10EB19E444279A261E7597D4F509331DE5E87B88EF3DE442CB00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction ID: 087a186d1779e6829f0b83e9f65967c48f4c14333110bb0c142953dfb32fd42f
                                        • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction Fuzzy Hash: D0417433725554C7E78CDE2AC8266AD73A2F39D304F95C239DA1A87385DA369906CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction ID: 7f292d5b19a7f65cd62ba88e07ee59f881bd71dc2d8649c776bbe345e54d5e6c
                                        • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction Fuzzy Hash: 02F08C65325767FEFE04853B4624FBD5E419BC0B40FA36975CC80020CBC69E5493DB14
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction ID: 0871690c9454fa8c8366d056e41a5d7aad80959c56e7156c87d1119ffae5a300
                                        • Opcode Fuzzy Hash: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction Fuzzy Hash: 2CA001A1A2EC02D0EA04BB00AA50024A2A5EB92300B851631C10D55164DE3CB612CA60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CounterPerformanceQuery
                                        • String ID: Closing connection %ld
                                        • API String ID: 3490100708-2599090834
                                        • Opcode ID: ada762a4b1bdea5d3c0d07d156a09a90b4b219ab25b2b57008472897e8c19366
                                        • Instruction ID: dca23f2d6d78bd86de6f6c6debfbdd16e0283cb5d11574eb07bb9a561cc684a1
                                        • Opcode Fuzzy Hash: ada762a4b1bdea5d3c0d07d156a09a90b4b219ab25b2b57008472897e8c19366
                                        • Instruction Fuzzy Hash: 61C1177651CB82C2E750BF21E4502AC7364FB85F98F980231DEAE1B799CF389156C724
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                        • API String ID: 1294909896-2200874227
                                        • Opcode ID: 630c380efc76a5ffed2834d8e06e875a5572cadbc702f6c11330fde0c288aba2
                                        • Instruction ID: 2a0af2312acf58827d72d31b79565e6ec99f4cee7a18e8718763a59d75bdf538
                                        • Opcode Fuzzy Hash: 630c380efc76a5ffed2834d8e06e875a5572cadbc702f6c11330fde0c288aba2
                                        • Instruction Fuzzy Hash: 51028E61A1DB83C2EB60BB21A4403BAA395EF45B94FC40635CE4D4B795EF3CE546CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$strpbrk
                                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 2737852498-2994854565
                                        • Opcode ID: 50beff97ebaddc7567a4d4a9652863f836772c72075f966d32c1a3f403d900ce
                                        • Instruction ID: 6c6baea5a16d7fec5314df49f8c63afc7c16a323d4a86f3c035bec598104e1ff
                                        • Opcode Fuzzy Hash: 50beff97ebaddc7567a4d4a9652863f836772c72075f966d32c1a3f403d900ce
                                        • Instruction Fuzzy Hash: DAD18D62A2D752C1EA11FB6194106B9A3A4BF8AB88FC44731DD4D1B795EF3DE407CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy$htonl
                                        • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                        • API String ID: 82385936-242323837
                                        • Opcode ID: 8613a6aaf9016ec076c90eba3747679c487425defe278e58e2270cd0f603949f
                                        • Instruction ID: a2a1f848f955978a316ffbc768866eb4ba9ffda46c2fc48f53491ae7aa1bcab3
                                        • Opcode Fuzzy Hash: 8613a6aaf9016ec076c90eba3747679c487425defe278e58e2270cd0f603949f
                                        • Instruction Fuzzy Hash: BAC13972A2CA42C6E710BB65E4402ADA7B4FB84B84F814235DE5D17B98DF3CE406CF20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: ff93a7ff90db5c03afc919c651086042200295bbab4818e17e53cf2dce08d76c
                                        • Instruction ID: a85c21218423938a4e2f341ff5eba9b7c4f9536edbcc2e00bd3144216c68ddf8
                                        • Opcode Fuzzy Hash: ff93a7ff90db5c03afc919c651086042200295bbab4818e17e53cf2dce08d76c
                                        • Instruction Fuzzy Hash: 5771EC7A558B81C2D740AF61E8942BC73B8FB88F89F580631CE9E5A35CCF389156C635
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 1391767211-579821726
                                        • Opcode ID: b4181fabc4b1670fa255aea07025be61e2b85e2ee8de99fa825b751f8390a22b
                                        • Instruction ID: d4c18a42a2f1363fd4f3a091bf42e1cd9eace674fa50f5491d6add0843511c13
                                        • Opcode Fuzzy Hash: b4181fabc4b1670fa255aea07025be61e2b85e2ee8de99fa825b751f8390a22b
                                        • Instruction Fuzzy Hash: 6F229062A2CB85C6EB10EB68D8443ADA321FF457A4F904335DA6D07AD9DF7CE086C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$_strdupfreehtonsmemset
                                        • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                        • API String ID: 130798683-4053692942
                                        • Opcode ID: dd297c6df8cd8424e2bd6f979904963bf5a1dead78cd15da62e6547e348515e1
                                        • Instruction ID: 39043d6d22db492d0cb4965b59d707bcae1e2020a90eef7492d5d4d100d130f3
                                        • Opcode Fuzzy Hash: dd297c6df8cd8424e2bd6f979904963bf5a1dead78cd15da62e6547e348515e1
                                        • Instruction Fuzzy Hash: 95E17D72A2C682C6EB60BF14D4403ADB7A4FB45B94F855231DA9E17748DF3CE546CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 1346393832-579821726
                                        • Opcode ID: 45795471a48e67c8abc9e4026c2df720b199cf89e055554f4f9b8d24a099660b
                                        • Instruction ID: 38a3f1d1285df15ea43e5b76b8b122aed371f6804039162868fb761860be4308
                                        • Opcode Fuzzy Hash: 45795471a48e67c8abc9e4026c2df720b199cf89e055554f4f9b8d24a099660b
                                        • Instruction Fuzzy Hash: 06129462B2CA85C6FB10FB68D5443ADA321EB857A4F805331DA6D17AD9DF7CE086C710
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E4A6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E4CC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E4DD
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E54B
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E57C
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E59C
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E5AE
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E610
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E681
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E698
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E753
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E7C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF747D7DBDF), ref: 00007FF747D7E7D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$free$_strdupcalloc
                                        • String ID: LDAP$base$one$onetree$sub$subtree
                                        • API String ID: 112326314-884163498
                                        • Opcode ID: e236e2e6d817617efa494662559fcc5df441cb7a7ccf82c35be98ef86a44c401
                                        • Instruction ID: 3109d31750528788669ee5826266fa0063ef6f785078fd4a685ae4b4fa35a497
                                        • Opcode Fuzzy Hash: e236e2e6d817617efa494662559fcc5df441cb7a7ccf82c35be98ef86a44c401
                                        • Instruction Fuzzy Hash: C6B19266A2DB86C2EB55BB259410279E790FF49784FC48635DE8D0B784EF3CE446CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrstrtol
                                        • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                        • API String ID: 1626215102-895336422
                                        • Opcode ID: 389a94f45e149e10ada5d78404fb401863fe9fe4206c8ef92805649dd6b5d67c
                                        • Instruction ID: 341284f9f1868c4a9266027db8739a66e808e1aa46b665ecc7541594b536f74b
                                        • Opcode Fuzzy Hash: 389a94f45e149e10ada5d78404fb401863fe9fe4206c8ef92805649dd6b5d67c
                                        • Instruction Fuzzy Hash: 4861C0A0B2D642D9EA24BB26E8002B9E254AF41BD0FD44331C91E5B6D1DF3CE10BCB60
                                        APIs
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46067
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C9A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C9AC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C9D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C9DC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4CA60
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4CA69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                        • API String ID: 1294909896-1595554923
                                        • Opcode ID: d0f9f5741b8606d7082873dd084e5b5c62746362a97b26e35185e4727763db7a
                                        • Instruction ID: 377f192e84a6bd15e2b49e822a2560a912e72cce8ae1bf3187fbf832afd3f228
                                        • Opcode Fuzzy Hash: d0f9f5741b8606d7082873dd084e5b5c62746362a97b26e35185e4727763db7a
                                        • Instruction Fuzzy Hash: 7EE1BE22B6C652D2FA64BB11D5012B9A790BF01B84FC84775CE4D57781EF3CE85ACB20
                                        APIs
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D36496
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF747D36528
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF747D36569
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D366B3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D366F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D36740
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D36781
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D367DE
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D36898
                                          • Part of subcall function 00007FF747D8FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF747D343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D8FB32
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D368D9
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D369A6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D369E7
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D36A0A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                        • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                        • API String ID: 264867259-3075834232
                                        • Opcode ID: 9d7d61f4c3d02218e256affeb54d8d628810e04e4d710cc77930749f09e94d0a
                                        • Instruction ID: 0c7ae37d94fc53bb28bda4d46fbf61057b2382700c024673943433461215f56e
                                        • Opcode Fuzzy Hash: 9d7d61f4c3d02218e256affeb54d8d628810e04e4d710cc77930749f09e94d0a
                                        • Instruction Fuzzy Hash: 3712C462E2CA42C6EB14FB64E54436DA761EB457E8F804331DA6D13BD9DE7CE086C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                        • String ID:
                                        • API String ID: 1087521380-0
                                        • Opcode ID: 2e53ff19ecb3a8b38f1d63baef50b79b2243b4e56db0847dfde610ffbf885c05
                                        • Instruction ID: 5e28ec65eee55c0f7dd3d82de24b67e95decb2f5c81c5995bbac1ebb3e823d2a
                                        • Opcode Fuzzy Hash: 2e53ff19ecb3a8b38f1d63baef50b79b2243b4e56db0847dfde610ffbf885c05
                                        • Instruction Fuzzy Hash: DEB1BE21A6EB42D5EE65BB25D515379A7A0BF88B94F880770CE4D037C4DF2CE452CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                        • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                        • API String ID: 1094891576-1753329177
                                        • Opcode ID: 2844ed0effed1fe397a68b4e1a8124bd816c60ffca8f10f412f787e44cf8c05d
                                        • Instruction ID: e605658c9ca1f9f45ce9c823460b2d1ee16f815869fb44fd0b009643abd95f36
                                        • Opcode Fuzzy Hash: 2844ed0effed1fe397a68b4e1a8124bd816c60ffca8f10f412f787e44cf8c05d
                                        • Instruction Fuzzy Hash: 29D19D62A2C686C6EB24BB21D4007F9A760FB45798FC54731DA5D1BAC5DF3CE402CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                        • API String ID: 3103143820-2414412286
                                        • Opcode ID: 7b9e4824925e9b7f55e927efd2cd488aa311533b9d912ce27fe012692574f343
                                        • Instruction ID: ea268adc7f0732dbb44c598c86c672fb694216fb9390fd7c0d59dfc0f06e6935
                                        • Opcode Fuzzy Hash: 7b9e4824925e9b7f55e927efd2cd488aa311533b9d912ce27fe012692574f343
                                        • Instruction Fuzzy Hash: 73D1B622B2C682D2EA59BB24E4402BDE7A0FF85784F940232DB4D0BB55DF7CE152CB51
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                        • API String ID: 2243338858-131330169
                                        • Opcode ID: 2efa04c74230399bd258a16cad822e2e5ead02ff0f79d9f2166992b9371edbb0
                                        • Instruction ID: a7424e06fd50321511ebc877fdc82f3360815173e8cbdfe637d666fcbacacab7
                                        • Opcode Fuzzy Hash: 2efa04c74230399bd258a16cad822e2e5ead02ff0f79d9f2166992b9371edbb0
                                        • Instruction Fuzzy Hash: A091A122B2C7C2C2EB54BB2595443B9A7E0FB85B80F944235DA8E0B795DF3CE4568B11
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno
                                        • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                        • API String ID: 3939687465-1752685260
                                        • Opcode ID: 2c2ecc4646857d6feea65fdae523bac12c2e5c780fb340e982890c109351eac7
                                        • Instruction ID: 837390382410996ea668d106a9bacd3cd2772a8e12b7fe05344ee49c9e97e79e
                                        • Opcode Fuzzy Hash: 2c2ecc4646857d6feea65fdae523bac12c2e5c780fb340e982890c109351eac7
                                        • Instruction Fuzzy Hash: 4D51A562A2C682C5E620BF20E6413BAB760BF49744FC04675DA8D02699CF3CF506CA20
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D355DE
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3560C
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3561A
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D35654
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D356A5
                                        • memset.VCRUNTIME140 ref: 00007FF747D354D3
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                          • Part of subcall function 00007FF747D36320: memcpy.VCRUNTIME140 ref: 00007FF747D36496
                                          • Part of subcall function 00007FF747D31FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D35812
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3583E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3584C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D35887
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D358DA
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D359C1
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF747D359D9
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF747D359E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                        • String ID: value
                                        • API String ID: 2102519606-494360628
                                        • Opcode ID: 0ba03602f28abc066c3fcc0a8834273002c93528edaf180a920beb04a508591a
                                        • Instruction ID: 13e8e881f3b58243184b7548b662357ca8a8b3d46f8bd021f7de7e899d9d79a9
                                        • Opcode Fuzzy Hash: 0ba03602f28abc066c3fcc0a8834273002c93528edaf180a920beb04a508591a
                                        • Instruction Fuzzy Hash: E9F1B762A2C681C6EB10FB74E4443ADA760EB457A4F545331EAAD13AE9DF3CD186CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup
                                        • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                        • API String ID: 1922034842-2519073162
                                        • Opcode ID: 15ff60a6d3c237a336e91ef1e3c4139078ef5d79dd09f5cb9ca67aec89cc51db
                                        • Instruction ID: 42a5ca4fc57853f1a0cd443f84bb8b2dd4b902c6a8d0b6a0fc34f64c9067b831
                                        • Opcode Fuzzy Hash: 15ff60a6d3c237a336e91ef1e3c4139078ef5d79dd09f5cb9ca67aec89cc51db
                                        • Instruction Fuzzy Hash: DA918161A2DA93C1FB71FE119A103B9A790AF51B84FC98235CE4D47685EE2DF503CB20
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF747D8063F), ref: 00007FF747D8D93D
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF747D8063F), ref: 00007FF747D8D95F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF747D8063F), ref: 00007FF747D8D970
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF747D8063F), ref: 00007FF747D8D99E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: ../$/..$/../$/./
                                        • API String ID: 111713529-456519384
                                        • Opcode ID: a08b28c9933b0941f2efcac164ecd33f5fb3166c4cd9c360851c52c316a69ecd
                                        • Instruction ID: a49ba7fb9c2ac534e01c6a17df9d9679d0a4db458591bcd6ec735d039c12e158
                                        • Opcode Fuzzy Hash: a08b28c9933b0941f2efcac164ecd33f5fb3166c4cd9c360851c52c316a69ecd
                                        • Instruction Fuzzy Hash: A1719A21E2C682D5FB217F119610279EF60AB1ABA4F954371CAAE077D4DE2CF453CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                        • API String ID: 111713529-3006446216
                                        • Opcode ID: 70e30d1e3deb7aee05ef397fcba1ec1dd57ac269af20da9b052408b51782595d
                                        • Instruction ID: 60bfa32b11a045afceb42187534f0a09fb30e1ac43d2ffcc677eae0f4316688a
                                        • Opcode Fuzzy Hash: 70e30d1e3deb7aee05ef397fcba1ec1dd57ac269af20da9b052408b51782595d
                                        • Instruction Fuzzy Hash: 2371FB92A2D7C1C5E711FB2594042B9FBA0EF467C8F994232CA5D17396DE2CE047CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                        • API String ID: 2190258309-1086287758
                                        • Opcode ID: 3d979c6cc7bd14e6c2ad7290a7be4d6b36be52882975864e4d86410aa6b77bbe
                                        • Instruction ID: 70851a43de865610c9db437bd3e0ebe41596b4d79fc40ed451be23bc50524d11
                                        • Opcode Fuzzy Hash: 3d979c6cc7bd14e6c2ad7290a7be4d6b36be52882975864e4d86410aa6b77bbe
                                        • Instruction Fuzzy Hash: 82B14B72A1CB46C6EB10AF61E9402A9B7A4FB48B94F900235DE9D47B58DF3CE546CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                        • API String ID: 1294909896-1220118048
                                        • Opcode ID: 9e8e4190fbbe9dbac736ea4e8f4861b9deb4eea0a2613b1050bd1a2de14b6a8a
                                        • Instruction ID: 0b6b8e6798cf6c10da077f7718d565685359d82d5baa89a82912f96e92bc0051
                                        • Opcode Fuzzy Hash: 9e8e4190fbbe9dbac736ea4e8f4861b9deb4eea0a2613b1050bd1a2de14b6a8a
                                        • Instruction Fuzzy Hash: C1716261A2C746D2EA24FB6195401F9A391FF89B84FC54232EE9D0778DEE3CD507CA60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloctolower
                                        • String ID: %%%02x
                                        • API String ID: 1244608590-4020994737
                                        • Opcode ID: b00e4fd80b47b58873b5033442e7745e1c8edbf3f5bc81cfb43fb87cb640654b
                                        • Instruction ID: f3afddd65c6c907a6dcde5a86df726f6ebb42715f659e8982208f9eb72b58848
                                        • Opcode Fuzzy Hash: b00e4fd80b47b58873b5033442e7745e1c8edbf3f5bc81cfb43fb87cb640654b
                                        • Instruction Fuzzy Hash: 6DA1E55292C282C5FB79BB25951037DABE0AF45B84F894671DE8E0A3C5DE2CE407DB30
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID:
                                        • API String ID: 111713529-0
                                        • Opcode ID: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction ID: 6ab7decc0ada3bd00df1fd7f80caf0558b3773f24d8f5393698e3bed0c0c785a
                                        • Opcode Fuzzy Hash: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction Fuzzy Hash: 4A617E66A19B41C2EB25EF51A544229B3A0FB48B90B858635CF4D43798EF3CE496CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                        • API String ID: 1294909896-2312071747
                                        • Opcode ID: 00f0f5a2b586d4b12147fcf8204e59185c13d3c04a4c7b2c1e6b1d2f36cf66b6
                                        • Instruction ID: 0e05fb3f8232171ceecf153443b94f43e7c57965a8692d57128eaa2a495d36d8
                                        • Opcode Fuzzy Hash: 00f0f5a2b586d4b12147fcf8204e59185c13d3c04a4c7b2c1e6b1d2f36cf66b6
                                        • Instruction Fuzzy Hash: 1AD1A361A2C6C2C6EA64BF2596013B9E2A0FB45794FC44335DAAD0B6C1DF7CF4478B21
                                        APIs
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                          • Part of subcall function 00007FF747D36320: memcpy.VCRUNTIME140 ref: 00007FF747D36496
                                          • Part of subcall function 00007FF747D31FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3A861
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3A88F
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3A89D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3A8D7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3A934
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3A9ED
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3AA1B
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3AA29
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3AA63
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3AAB4
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3AAFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: 5326661d5e7fbd7017e2f05cc9af570629d592ff744eb586dc6c91cc8db18cda
                                        • Instruction ID: 268e98c6389f427ee66e42221758da98792a3986d4e615a78cf54d6f66dbe66e
                                        • Opcode Fuzzy Hash: 5326661d5e7fbd7017e2f05cc9af570629d592ff744eb586dc6c91cc8db18cda
                                        • Instruction Fuzzy Hash: D7A18762B2CA85C6FB10FB64E5443AD6361FB857A4F900331E66D12AD9DF7CE086CB50
                                        APIs
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                          • Part of subcall function 00007FF747D36320: memcpy.VCRUNTIME140 ref: 00007FF747D36496
                                          • Part of subcall function 00007FF747D31FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C0F0
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3C11E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3C12C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C166
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C1C3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C27C
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3C2AA
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF747D3C2B8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C2F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C343
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3C38D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: 743d420fd752d394023e5d147ab696b386a989657152b2f6896b1dcf388bf412
                                        • Instruction ID: 892ba578789db7fe6603d70419b35fe89154458d63fef1b3c6ce412886ad3c9a
                                        • Opcode Fuzzy Hash: 743d420fd752d394023e5d147ab696b386a989657152b2f6896b1dcf388bf412
                                        • Instruction Fuzzy Hash: 47A17A62A2CA85C6EB00FB68E4443AD6361FB457B4F901331DA6D17AD9DF7CE096CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$malloc
                                        • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                        • API String ID: 3103867982-1477229593
                                        • Opcode ID: 0d6b655dcbdeab51feffedeff9afb7f8b29fec1c10cdc3d2b61d959f6e169dc5
                                        • Instruction ID: a6e30f59aceac98335e37a66733c8f9b42a9e16f228e567d05d4f80f0ef46cd9
                                        • Opcode Fuzzy Hash: 0d6b655dcbdeab51feffedeff9afb7f8b29fec1c10cdc3d2b61d959f6e169dc5
                                        • Instruction Fuzzy Hash: E3C17D72A28B41C6EB10FF65E4402ADB7A5FB44B88F810236DE4D57B58DF38D846CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                        • API String ID: 2190258309-1457932261
                                        • Opcode ID: ad1976b87a44fb8d818fdb44e7480ec08fb280e608e4c6ec3807d1ae1869fbba
                                        • Instruction ID: 61e08ea46845adec34fe2f801323845ec33d051f9a50fdb6aa01fd694dac2690
                                        • Opcode Fuzzy Hash: ad1976b87a44fb8d818fdb44e7480ec08fb280e608e4c6ec3807d1ae1869fbba
                                        • Instruction Fuzzy Hash: 8161DF61A2C782C5EB15FB61A4083FAA390BB45794FC50632DD6E07799EF3CE146CB20
                                        APIs
                                        • memset.VCRUNTIME140 ref: 00007FF747D7A69B
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D7A7C5
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46067
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46073
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D7A77F
                                          • Part of subcall function 00007FF747D45FA0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF747D45FB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freestrncpy$_strdupmemset
                                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                        • API String ID: 3826632026-748038847
                                        • Opcode ID: e5b4f2103c453911aedcd51cbfc018986ff4a876cf622d445cf5e43f37735157
                                        • Instruction ID: c6526ca66c6b31313b0bda07687236757c286db2e6a5891f7ee00a8cae186851
                                        • Opcode Fuzzy Hash: e5b4f2103c453911aedcd51cbfc018986ff4a876cf622d445cf5e43f37735157
                                        • Instruction Fuzzy Hash: 12713A72A2DAC6D1FB21BF24D4417E9A360FF85788FC44232DA8D4A255EF38D546CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                        • API String ID: 1294909896-3837278924
                                        • Opcode ID: 11243cacde7ed8b8b05c4affb2ad3395ef562e7c02fa1d8338817df6b4ae1186
                                        • Instruction ID: 4d85bc1d822dcf11cb946b53c469f0a8aaf0e272f649f7de4e0b0548cbef5270
                                        • Opcode Fuzzy Hash: 11243cacde7ed8b8b05c4affb2ad3395ef562e7c02fa1d8338817df6b4ae1186
                                        • Instruction Fuzzy Hash: 56D1A46261CA82C5EB11EF24D0403B9B7A1FB85B98FC58232DA4E5B785DF7CD546CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast
                                        • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                        • API String ID: 4042023021-4197595102
                                        • Opcode ID: 7bbb2639de61ab8c1464d414514da25b57dc3edd0b8e6112f819213a615a5998
                                        • Instruction ID: 3b744684e9f7c52721c8bd5e18fe863266dd17ab10ed0b40a6b6e21df181d8ff
                                        • Opcode Fuzzy Hash: 7bbb2639de61ab8c1464d414514da25b57dc3edd0b8e6112f819213a615a5998
                                        • Instruction Fuzzy Hash: 7AB1517262C682C6D765AF29D4407A977A0FB88F88F844232DE4E4B758DF38D446CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                        • API String ID: 1802528911-931584821
                                        • Opcode ID: b789f81208a5b9aa444f3937666235559fc3fee082451b45fb7e3bbc3329918e
                                        • Instruction ID: a42aeef9f30929dfba9960718f130fd3538bf1fa726dd0bdf319be17093799fe
                                        • Opcode Fuzzy Hash: b789f81208a5b9aa444f3937666235559fc3fee082451b45fb7e3bbc3329918e
                                        • Instruction Fuzzy Hash: DF917E6262CAC1D5E721AF64E4457EAA3A0FF857A8F840231EE8D07A85DF3DD146CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$freestrchrstrncmpstrtol
                                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                        • API String ID: 2070079882-2404041592
                                        • Opcode ID: 87368c59f9fe8063e5992f5de28ffce5ae937202ea33b7f2a591c5681f9ad303
                                        • Instruction ID: a0bb466d6c6d8bcce9abb68233eb519df5e20e79c23ea403a706d8f95ced5c88
                                        • Opcode Fuzzy Hash: 87368c59f9fe8063e5992f5de28ffce5ae937202ea33b7f2a591c5681f9ad303
                                        • Instruction Fuzzy Hash: E5510851E2CAE2C7FB65BB159420375ABD1AF01B94FC94231CA8D062C5EE2CE447CB71
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$none
                                        • API String ID: 4109794434-3629594122
                                        • Opcode ID: 17cfc58c2ff132a4fc18a63d81c33083011eece3fc44a1e24eabeae53038068d
                                        • Instruction ID: cecd647e15e7e1422c772423f5be712703a6e759c9ac57f1dc57c9ba656094ec
                                        • Opcode Fuzzy Hash: 17cfc58c2ff132a4fc18a63d81c33083011eece3fc44a1e24eabeae53038068d
                                        • Instruction Fuzzy Hash: 1351B721A6D782C1FA75BB21951127AE790FF85B80F884674DE8E07785DF3CE4478B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                        • API String ID: 3510742995-1652449680
                                        • Opcode ID: d138500cbaf182bc5e16dc619f2f2d0803747c55357b2c7ce644f458475db220
                                        • Instruction ID: e764c11dae9f09c068f179170a48665cf65decefbb76d5581c5bf96d0494a6df
                                        • Opcode Fuzzy Hash: d138500cbaf182bc5e16dc619f2f2d0803747c55357b2c7ce644f458475db220
                                        • Instruction Fuzzy Hash: 07A18231A2CA83C2E750BF20D8503B9A791EB45B98FC55231DE4E5B295EE3CE546CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                        • API String ID: 1294909896-3146291949
                                        • Opcode ID: be4495601e09c0e77f4391925541b9df5882915bdba6fd6e21452db4e1504eff
                                        • Instruction ID: 11d0b10a9c753ae78ae5cfac06a3229322e433d40aee94f6ad15213c64e5f60a
                                        • Opcode Fuzzy Hash: be4495601e09c0e77f4391925541b9df5882915bdba6fd6e21452db4e1504eff
                                        • Instruction Fuzzy Hash: F9919021B2CF92C2FB64BB3595403BDA290FF45B84F848635DA4E47685EF2CE442CB60
                                        APIs
                                          • Part of subcall function 00007FF747D32380: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32479
                                          • Part of subcall function 00007FF747D32380: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D324B8
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                          • Part of subcall function 00007FF747D33BC0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D33C06
                                          • Part of subcall function 00007FF747D35DE0: memcpy.VCRUNTIME140(?,?,?,00007FF747D31DCA), ref: 00007FF747D35E71
                                          • Part of subcall function 00007FF747D33C40: memcpy.VCRUNTIME140 ref: 00007FF747D33C93
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32181
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D321D2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32212
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32264
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D322A3
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF747D322F6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32347
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: parse error$parse_error
                                        • API String ID: 2484256320-1820534363
                                        • Opcode ID: 7e088b45bbefa9f75e37261047a4b994afe4f3e673d1bf87e421fbd8d98dbb04
                                        • Instruction ID: 54da5762fa5d93c9477c56923846604aa98f9e9e38dbb716016a4ed63f5542af
                                        • Opcode Fuzzy Hash: 7e088b45bbefa9f75e37261047a4b994afe4f3e673d1bf87e421fbd8d98dbb04
                                        • Instruction Fuzzy Hash: CAB19262E28B46C6EB00EF64E9443AD6761EB457A4F904731DA6D03AE9DF7CE0C6C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                        • API String ID: 1865132094-1312055526
                                        • Opcode ID: dd9d7af58e6bbe8eb93ee73e5defa075ebf5cb275832164a3fb021438fdb4af6
                                        • Instruction ID: 227a7e78b13b160dfc9b1d526a76dd054c96a95cf935b8e9209b7c212ace0096
                                        • Opcode Fuzzy Hash: dd9d7af58e6bbe8eb93ee73e5defa075ebf5cb275832164a3fb021438fdb4af6
                                        • Instruction Fuzzy Hash: 3671C762A2C683C2E760BB2494403BDA7E0EB45B94FD90231DE8D4B699DF3DD4478B71
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D518FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5191A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5192E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5194A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51967
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5198A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D5199E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D519EC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A5C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51F05), ref: 00007FF747D51A85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction ID: 174ce4fdbd45a2c6f59589cf16e619e7ca784d8c135661676d13222935ee6eae
                                        • Opcode Fuzzy Hash: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction Fuzzy Hash: 5E51FD3156CA82C1EB14BF61D8912FD63A0FF84F88F884631DE5E5B759CE3990428B30
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                        • API String ID: 1294909896-1896214517
                                        • Opcode ID: 17df755b10fac1e88797debdb8b90d3a62f6c9fec5382a4a4cac19bd8b1938f0
                                        • Instruction ID: cc4b1b2cc6af26e307e00b930227d53c7a9a1c23bde9cf9482a19f6e1cd9d7d8
                                        • Opcode Fuzzy Hash: 17df755b10fac1e88797debdb8b90d3a62f6c9fec5382a4a4cac19bd8b1938f0
                                        • Instruction Fuzzy Hash: C2D16E6251D782C5EB60EF14E4403A9B7A0FB45B94F890276DEAD07798DF3CE44ACB24
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                        • API String ID: 2190258309-1670639106
                                        • Opcode ID: 2a7873e3fd38833d2e4eee7041f00873f26491dc6f2d32e7f3074412294e4d36
                                        • Instruction ID: 85225eff517533fe9f6dbb2400988058959ae0364fcb6ce70a47c51cd232ac37
                                        • Opcode Fuzzy Hash: 2a7873e3fd38833d2e4eee7041f00873f26491dc6f2d32e7f3074412294e4d36
                                        • Instruction Fuzzy Hash: 7BA1A56292DE82C5EB64BF31D4403BCABA1FB45788F844235EA4E47A85DF3CD482C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$strrchr$_access_stat64
                                        • String ID:
                                        • API String ID: 2557200964-0
                                        • Opcode ID: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction ID: 2ff009c8c4fad43610e58aea91d2c7f729690fd0992ef47df15721f4454c6a6a
                                        • Opcode Fuzzy Hash: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction Fuzzy Hash: C1417F61B5DB46D6EA10BB51E495279A3E0FF48B90F844234DB5E07B94EF3CE416CB20
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE65
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE7F
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EE9A
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EEB6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EED2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EEEA
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF02
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF1A
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF32
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF4A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D54EC5,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D7EF64
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$callocfree
                                        • String ID:
                                        • API String ID: 1183638330-0
                                        • Opcode ID: 6c5616982f5c6c375460ad02fc021eb938bf1702e2b18ac9b8deb50ac20e7ea7
                                        • Instruction ID: a1a6e66e979f70e2264694211e76775af439c1f487a1155deaeb3b53bd0db8b9
                                        • Opcode Fuzzy Hash: 6c5616982f5c6c375460ad02fc021eb938bf1702e2b18ac9b8deb50ac20e7ea7
                                        • Instruction Fuzzy Hash: E531F625A2EB02C2EE59FFA5E050238E3E0FF48B41B880635DE5D56B44EF3CE451CA61
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy$strchr
                                        • String ID:
                                        • API String ID: 1615377186-0
                                        • Opcode ID: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction ID: 0466ba6a240e0631ab0e7c1623ca6c1ab2cf649b3849462fb2b4ff3281ceb04f
                                        • Opcode Fuzzy Hash: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction Fuzzy Hash: 7451806572DB82C6EA65BF15A61427AE391BB44BC4FC94630DE8D07748DF3CF40A8B20
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF747D54619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 7dce388daf7c0360c429ed901a4c1932f585a7893eb07c867ca39c62f188127c
                                        • Instruction ID: 65cafe4992764bea11dd7fb1efc105d9093293b98a92acf907dc021dd85fe70b
                                        • Opcode Fuzzy Hash: 7dce388daf7c0360c429ed901a4c1932f585a7893eb07c867ca39c62f188127c
                                        • Instruction Fuzzy Hash: 7471D262A1CB92C3EB65BB25D4543AAA7A0FB44784F860231CF5D07390DF3DE412CB62
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF747D54619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 730130e72ca5b2f77c77e0587357a2e092e42673f74bbb5f9fb3c086bc5617db
                                        • Instruction ID: 513605b402ee8a7c4e2d755b109cc66499a07e10cf3c925b1184bf8cb4748625
                                        • Opcode Fuzzy Hash: 730130e72ca5b2f77c77e0587357a2e092e42673f74bbb5f9fb3c086bc5617db
                                        • Instruction Fuzzy Hash: 77519162A1CB92C3EB25BB65D4543AAA7A0FB44784F860231CF5D47390DF3DE452CB61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                        • API String ID: 0-1262176364
                                        • Opcode ID: ded250658884f41e0378a3ce4c28d0c9ad827b194099825220e4300c7fafc72d
                                        • Instruction ID: 651f6a065dede9f6f21fd2dff3800348da6fcd5af07fc3f605375d84ffd6f477
                                        • Opcode Fuzzy Hash: ded250658884f41e0378a3ce4c28d0c9ad827b194099825220e4300c7fafc72d
                                        • Instruction Fuzzy Hash: D0410622B2C252C6EB25BF55E4402B9E360BF41BC0FC44235DA4E1B695DF3CE846CBA0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                        • API String ID: 2653869212-571364039
                                        • Opcode ID: 85ef8a2e2dfbfb936179137d0ee52b8a74c34417c923e49ee921cd5827ac486f
                                        • Instruction ID: 888b18eba66b35be566637706e015a3f774d4f47aa4034f02614fb0f1d9421fc
                                        • Opcode Fuzzy Hash: 85ef8a2e2dfbfb936179137d0ee52b8a74c34417c923e49ee921cd5827ac486f
                                        • Instruction Fuzzy Hash: 4E41A162A2C782C9EB11BB61D4442F9A761BB057C8FC50631CE4E1B799EF3CE146CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchr
                                        • String ID: Unknown error %u (0x%08X)
                                        • API String ID: 1897771742-1058733786
                                        • Opcode ID: a90bddafad2764df06534b3e101ce169d681fc9f8201aec5c8a569fdeda9d07a
                                        • Instruction ID: d82b92da002721b643cb617046352034824c5f022010d2f9880c78ca292c672f
                                        • Opcode Fuzzy Hash: a90bddafad2764df06534b3e101ce169d681fc9f8201aec5c8a569fdeda9d07a
                                        • Instruction Fuzzy Hash: 32218662A6C781C2E7217F26A90522AFAD0BF55BD0FC44274DE8A13754CE3CE4428B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                        • API String ID: 600764987-1502336670
                                        • Opcode ID: 840bd877c669b48a6a94fe034f9355eb143cb0b64956bc24ea057a86771c70ac
                                        • Instruction ID: a827ca9b713dc70dec7b46ef3ebee845090aea5b44851bc7481659dc708ea383
                                        • Opcode Fuzzy Hash: 840bd877c669b48a6a94fe034f9355eb143cb0b64956bc24ea057a86771c70ac
                                        • Instruction Fuzzy Hash: 21318262A2D7C1C5E661BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                        • API String ID: 600764987-3862749013
                                        • Opcode ID: 8904872445799dc1951122d08534c98c99bda82e2818c7aac7f99ee106927005
                                        • Instruction ID: 37dfc3ee5cc4630ff3aff4e0241044a18ebf9dc3e6bdaa0d92fd9d471b6918d3
                                        • Opcode Fuzzy Hash: 8904872445799dc1951122d08534c98c99bda82e2818c7aac7f99ee106927005
                                        • Instruction Fuzzy Hash: 18318262A2D7C1C5E661BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                        • API String ID: 600764987-1052566392
                                        • Opcode ID: c63af1cd2aabe92ea6c560fb305aaf36189a3a90deb3d1dd0a1db05c7edba30e
                                        • Instruction ID: ce89277c4c312cee93a04f926109e48c648a7708e414f726aa6d52b66831186f
                                        • Opcode Fuzzy Hash: c63af1cd2aabe92ea6c560fb305aaf36189a3a90deb3d1dd0a1db05c7edba30e
                                        • Instruction Fuzzy Hash: 59318262A2D7C1C5E661BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                        • API String ID: 600764987-1965992168
                                        • Opcode ID: 660b00ea6d2708d63aff5c1d89183b731f15090953f73bcd8295e0b2a5769022
                                        • Instruction ID: ef6913b326a72a2eac058cf526ad8d45476c7a81fa7f324b5f9ecc3827ac7e05
                                        • Opcode Fuzzy Hash: 660b00ea6d2708d63aff5c1d89183b731f15090953f73bcd8295e0b2a5769022
                                        • Instruction Fuzzy Hash: 9A318262A2D7C1C5E661BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                        • API String ID: 600764987-2628789574
                                        • Opcode ID: 1bf145a435fb618fef3f911721eddb159762ac6c7d7498e0217c3f5d397e766c
                                        • Instruction ID: 1ed22a30450f5b85af6dea506160cd77ca25c8a42b103e7dc799ff2773ab1966
                                        • Opcode Fuzzy Hash: 1bf145a435fb618fef3f911721eddb159762ac6c7d7498e0217c3f5d397e766c
                                        • Instruction Fuzzy Hash: 67318262A2D7C1C5E621BF20E5113AAB7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                        • API String ID: 600764987-2710416593
                                        • Opcode ID: 014b7078a5638918f36abdcc571b31f9088153de8ebe60f2355983b34161cd2c
                                        • Instruction ID: 9d346050219f455125d49f3874185840031856d9ec1ee078b7319141a78dd39e
                                        • Opcode Fuzzy Hash: 014b7078a5638918f36abdcc571b31f9088153de8ebe60f2355983b34161cd2c
                                        • Instruction Fuzzy Hash: 02318262A2D7C1C5E661BF20E5113AAF7A4FB89744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                        • API String ID: 600764987-618797061
                                        • Opcode ID: a90a319c955fa056155f22b8ab89f66d967a83091b8405e3dea220e42267a1f4
                                        • Instruction ID: 119ef49ad07de7ac4469ef1bd1e81cb433cdc29e5ee2f1ebe50618b424fd1d0f
                                        • Opcode Fuzzy Hash: a90a319c955fa056155f22b8ab89f66d967a83091b8405e3dea220e42267a1f4
                                        • Instruction Fuzzy Hash: F431836262D7C1C5EB21BF20E5113AAB7A0FB85744FC00676DA8D02A99CF3CE545CF20
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D78318
                                          • Part of subcall function 00007FF747D56150: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF747D61F65,?,?,00000000,00007FF747D622C5), ref: 00007FF747D56165
                                          • Part of subcall function 00007FF747D56150: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF747D61F65,?,?,00000000,00007FF747D622C5), ref: 00007FF747D5617B
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D78138
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D78289
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D78352
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D7835E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memcpy$realloc
                                        • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                        • API String ID: 657767516-1165944077
                                        • Opcode ID: 9de94ae0787e8141cb01241ab22280e239d4ca6153fd1568bc598eaa28a65770
                                        • Instruction ID: 423a6d4174d02d564c238d38807424c5ab8ab7a570d9599cab02609b49a207b4
                                        • Opcode Fuzzy Hash: 9de94ae0787e8141cb01241ab22280e239d4ca6153fd1568bc598eaa28a65770
                                        • Instruction Fuzzy Hash: 8A719E32B1DB85D6EA54EB25E8043A9A7A4FB49B84F844231EE9D47744DF3CE462CB10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_time64
                                        • String ID:
                                        • API String ID: 3087401894-0
                                        • Opcode ID: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction ID: 61de43dc9e75058bdc974f3064f71225a0785536e7445ca9c62206f88dcf1cc6
                                        • Opcode Fuzzy Hash: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction Fuzzy Hash: 7C21FB36A6DA41C1EB20BF62E844229A370FB58FC4F584531DE9E13758DE3CE446CB64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                        • API String ID: 0-808606891
                                        • Opcode ID: 458a01d5bfcce189351ee8b925d4386c51c3ca0d126a416866c77a1180e90565
                                        • Instruction ID: bf629ce149af07a2ea89591ddf0ed8e9e9e51402c6b893749b67f85501722138
                                        • Opcode Fuzzy Hash: 458a01d5bfcce189351ee8b925d4386c51c3ca0d126a416866c77a1180e90565
                                        • Instruction Fuzzy Hash: 6FB14F6291CA41C6E764AF28D48027CB775FB15B68FE44736C65E022D8DF3CE986CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchrstrtol
                                        • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                        • API String ID: 137861075-1224060940
                                        • Opcode ID: d78e3ff692bd5202c6bbaa1cddfaf308f6c3017d1e039b30db1cab326158a513
                                        • Instruction ID: 510b328a451ca504f5fd8b9cdd08b71af4d8a218f88faa5f112fdd3934ba1d23
                                        • Opcode Fuzzy Hash: d78e3ff692bd5202c6bbaa1cddfaf308f6c3017d1e039b30db1cab326158a513
                                        • Instruction Fuzzy Hash: 9251C262A1CA92C6EB71BF11A4003A9AB90FB41BD8FC54235DE9D07799CF3CD102CB61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                        • API String ID: 1812939018-2300960079
                                        • Opcode ID: ee9c7fb4e66f63f348d74e1a4e5acb793a6270c316ecf6ef76d56138e9452937
                                        • Instruction ID: 3840b4b60e573d92128327b4b5126c7816ef3b79d3b0d9023ef1c8bbd8317765
                                        • Opcode Fuzzy Hash: ee9c7fb4e66f63f348d74e1a4e5acb793a6270c316ecf6ef76d56138e9452937
                                        • Instruction Fuzzy Hash: 8E51B662A2CB81C1EB11BB15E410779A7A1BB8AB84FC44331DA4D1B795DF2DD446CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                        • API String ID: 2653869212-3672398475
                                        • Opcode ID: ae44b6cc25f1171be3da277d17204bf0ad59979bfeed4c3c9ad4a1016a462e04
                                        • Instruction ID: ddb5b068b64e0e66a17c76c2e59510674adb73a22ce0c22724bd28a151e5291d
                                        • Opcode Fuzzy Hash: ae44b6cc25f1171be3da277d17204bf0ad59979bfeed4c3c9ad4a1016a462e04
                                        • Instruction Fuzzy Hash: 6341A362A2C782C5EB14BB6194441F9A764BF05BC8FC50631CE5E1B399DF3CE142CB20
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D49FDD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A007
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A011
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A01B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A025
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A02F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A039
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A043
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A04D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A056
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF747D519C9,?,?,00000000,00007FF747D51F05), ref: 00007FF747D4A071
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: d7d34b462b37f848da9da001d28a70684121efa3768a5134ab5a88cf8768e960
                                        • Instruction ID: 4dd4abd16f96b28a2126692198a204209ac2ccc252175ab70425614d8de9c753
                                        • Opcode Fuzzy Hash: d7d34b462b37f848da9da001d28a70684121efa3768a5134ab5a88cf8768e960
                                        • Instruction Fuzzy Hash: CE21C976A68A41C2DB20BF61E854229A370FB88FC5F541531DE9E5376CCE3CD846DB24
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocmemcpy
                                        • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                        • API String ID: 4276657696-1832275178
                                        • Opcode ID: 469a3e2e16c267789cc01c7905be1eba584b916866bd235b0b9d2c5f4a0e47db
                                        • Instruction ID: ed94138fc10c179ab28c9e1957f3a765a56b56ba8d263ec91e13fefcba366245
                                        • Opcode Fuzzy Hash: 469a3e2e16c267789cc01c7905be1eba584b916866bd235b0b9d2c5f4a0e47db
                                        • Instruction Fuzzy Hash: 30A15D62A1DB82C5EA79BF11A5003A9B7A4FB44B84F844236CE8D07799DF3CE447CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: 4ccdc9ab91a0535d77fa9aa8c0208e1d0a080a60d205a77c385ac69a42cf734e
                                        • Instruction ID: 0e70faa4cda1c2613ba215ce249dc0b58a0dc40068e7f86b2bb64776289df629
                                        • Opcode Fuzzy Hash: 4ccdc9ab91a0535d77fa9aa8c0208e1d0a080a60d205a77c385ac69a42cf734e
                                        • Instruction Fuzzy Hash: 2561F651A2C782C5EB18B76185142B9A791FF067D4F894735CA6F0B7C5EE3CE146C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: e569bb298ba613fd79d8233cd29af96ef3bc2d3c48f7074fe414be77698e85c2
                                        • Instruction ID: 9128d0fbd22ed20d7ca5aef3ebf0209d1ded31c48f7aaec50369eb8e6e7b12b0
                                        • Opcode Fuzzy Hash: e569bb298ba613fd79d8233cd29af96ef3bc2d3c48f7074fe414be77698e85c2
                                        • Instruction Fuzzy Hash: 5E612751A2C382C5FB18B76285142B9AB65AF05BE4F854735CA6F0B7C9DE3CE147CB20
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF747D64DF8), ref: 00007FF747D81920
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF747D64DF8), ref: 00007FF747D81957
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF747D64DF8), ref: 00007FF747D8197E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                        • API String ID: 1294909896-3948863929
                                        • Opcode ID: df50d3c08605608153538d01eb3d3f3672086f7079c31e4fc3a596cca71a9e3d
                                        • Instruction ID: 7e1445f6fa0e339dfa2cc9cb499a15d1607323d1f80fc37bdb608d8c03b3b390
                                        • Opcode Fuzzy Hash: df50d3c08605608153538d01eb3d3f3672086f7079c31e4fc3a596cca71a9e3d
                                        • Instruction Fuzzy Hash: 41618132A1CB81C1E760EF15E4443AAB3A5FB49B84F81023ADA8D47758DF3DD446CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                        • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                        • API String ID: 1392894463-1168109407
                                        • Opcode ID: a3a8ded29e8c24b2ee7d97979504e82674f803be7010108302ac092b5f4bb2fd
                                        • Instruction ID: e01ee36d198c8cfe487f6ade20c7debd6b33d3af2f1cb95f307bcc23b3a56a9a
                                        • Opcode Fuzzy Hash: a3a8ded29e8c24b2ee7d97979504e82674f803be7010108302ac092b5f4bb2fd
                                        • Instruction Fuzzy Hash: 4A418561A2C682C6EB50BB2598402B9A791EF45BC4FC84335DA5E5B285DF2CE507CB30
                                        APIs
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF747D76F27
                                          • Part of subcall function 00007FF747D774D0: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D77506
                                          • Part of subcall function 00007FF747D774D0: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D7755B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _fstat64_openstrchr
                                        • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                        • API String ID: 3410096895-1509146019
                                        • Opcode ID: 01dd6ab8f4d09f50ff5c44cdaf420cac4376a94eb13f76e700b4a2f32865bb00
                                        • Instruction ID: 6c526c9079b45f0a237590ce1d857a8f51986be96ea5c66cafc19decb51c7eae
                                        • Opcode Fuzzy Hash: 01dd6ab8f4d09f50ff5c44cdaf420cac4376a94eb13f76e700b4a2f32865bb00
                                        • Instruction Fuzzy Hash: B2B1A671A2C783C5EB20BB2199503BAA395FF84B94FC44631DE4D5B755EE3CE4028B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$mallocrealloc
                                        • String ID: 0123456789-$<DIR>$APM0123456789:
                                        • API String ID: 359134164-4291660576
                                        • Opcode ID: 179db5e6ecdb2eedd8a35f1361e26f9261d76770616d7f3031361c8db7d08d42
                                        • Instruction ID: d00cc2ee0c9a24a87c4f09eb03db61df9b4602f26ff6f7b17e6aaaa4d766f544
                                        • Opcode Fuzzy Hash: 179db5e6ecdb2eedd8a35f1361e26f9261d76770616d7f3031361c8db7d08d42
                                        • Instruction Fuzzy Hash: F3B17D36A1D702C6EB25BF25D050339A7A4FB48B48F964235CA6E07794CF38E45ACB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: %s?%s$Failed sending Gopher request
                                        • API String ID: 111713529-132698833
                                        • Opcode ID: ddaea8a7c805b85e97cfc97d06849bffeb7f6a5976ec26ddf779ff86ca1f3d16
                                        • Instruction ID: c12df53ddb472df3607b07f1bc68bc7289cd9c20b185e0a18877474f79667cc1
                                        • Opcode Fuzzy Hash: ddaea8a7c805b85e97cfc97d06849bffeb7f6a5976ec26ddf779ff86ca1f3d16
                                        • Instruction Fuzzy Hash: D1517222A2DA82C2E651BB75A8001BAE790BB85BE4FD44331DE6D477D5EF3CD4038B14
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: 418e4009ded77f161f9af62bfedde694c8209946c77fb1f942d757c564764665
                                        • Instruction ID: a64d2f5bb83e606bdc22d5c7c02653be2deb040e8edc8aed58d580f63d3e34c8
                                        • Opcode Fuzzy Hash: 418e4009ded77f161f9af62bfedde694c8209946c77fb1f942d757c564764665
                                        • Instruction Fuzzy Hash: 6161C872B2CA85C6EB10EB64E9443ED6361FB853A4F404331EA6C12AD9DF7CD086C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freeisupper$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3511497317-3412697401
                                        • Opcode ID: 8d89a09bf5400fcc1cd5c5f644c77fedc83b1f5116acc45fddb3a315d80fcb1c
                                        • Instruction ID: 1ee10bb1474cba3c658662567bfc7ea6bd2a3d3a56a308b8f4af833523e59997
                                        • Opcode Fuzzy Hash: 8d89a09bf5400fcc1cd5c5f644c77fedc83b1f5116acc45fddb3a315d80fcb1c
                                        • Instruction Fuzzy Hash: 66515A11A2D692C5FB39BB244114339AB92EF52BA0F864735C6BF476C5CE2DA043CB30
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D77506
                                        • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D7755B
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D775CC
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D775D9
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF747D776EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _close$_fstat64_openstrchr
                                        • String ID: Can't get the size of %s$Can't open %s for writing
                                        • API String ID: 423814720-3544860555
                                        • Opcode ID: 4646d5958fd0afe558b6e628580ec2560eed784401f815918089c05b269bd973
                                        • Instruction ID: 421de2cabf89e7e2f9d497008bc369eb849236c45f2e34c3ead67c4b1bbe13f0
                                        • Opcode Fuzzy Hash: 4646d5958fd0afe558b6e628580ec2560eed784401f815918089c05b269bd973
                                        • Instruction Fuzzy Hash: C351A461B2DA82C2EB54BB2594103BDA395FF85BE4FC48635DA4E4B395DE3CE4438B10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdupstrtol
                                        • String ID: %%%02x
                                        • API String ID: 2999891020-4020994737
                                        • Opcode ID: 74a58f8c083852693bf64881fee03805f566497237c963ec1128527847eabe63
                                        • Instruction ID: 11142ece27162bd7683660ebb405c79b84ef6f508be76c4447038f5bd159c3ef
                                        • Opcode Fuzzy Hash: 74a58f8c083852693bf64881fee03805f566497237c963ec1128527847eabe63
                                        • Instruction Fuzzy Hash: 1151E612A2D682C5FA7ABB21501037DAB91AF45790F880372DE9E0A3C5DF2DE407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1496848336-4020994737
                                        • Opcode ID: 11a0c1ad3791ab075d9d13a3d2058a3ec95cb1eb7b8996445b049866087062de
                                        • Instruction ID: 4715802d7aa5c72710d3814a72445f6941d4aa66ccefa55ffd4c57056c75f7d3
                                        • Opcode Fuzzy Hash: 11a0c1ad3791ab075d9d13a3d2058a3ec95cb1eb7b8996445b049866087062de
                                        • Instruction Fuzzy Hash: 6441D41292D692C5EA7ABB216014379AB91AF45790F880772DEDE0A3C5DF2DE407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLasthtonssend
                                        • String ID: Sending data failed (%d)
                                        • API String ID: 2027122571-2319402659
                                        • Opcode ID: cdf648138e32f3fc23531406c7103014d14e0a80102c8f5fd913e13258011adc
                                        • Instruction ID: d38231474fc3f8698a4d22503517f223c8b06e3644ba48f478478c9748dcaaba
                                        • Opcode Fuzzy Hash: cdf648138e32f3fc23531406c7103014d14e0a80102c8f5fd913e13258011adc
                                        • Instruction Fuzzy Hash: F141BC32618A86C1E7047F75D510AACB720FB56F89F844A32DB9907798DF7CE00AC721
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 111713529-2901970132
                                        • Opcode ID: ca63b734f412c840d6899bd84df25f9a28c05b6b7bdbaacd8ec7812dce174e8f
                                        • Instruction ID: 2505068b460d82ddc3c526df403436757686ffcbe3474c1e67551ad7975320ac
                                        • Opcode Fuzzy Hash: ca63b734f412c840d6899bd84df25f9a28c05b6b7bdbaacd8ec7812dce174e8f
                                        • Instruction Fuzzy Hash: 39318661A2C782C5EB14BB6195041F9A7A1BF057C8FC50A35DE5E1B799EF3CE106CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 111713529-517259162
                                        • Opcode ID: 848f9bd136f30b638347715e6b3aa5fb2b1dd1155d484af4729bc6df23dfb9d6
                                        • Instruction ID: 7a6b21ee066e4cc141732fa4371ea342003a619332daccb2d30761e196b07003
                                        • Opcode Fuzzy Hash: 848f9bd136f30b638347715e6b3aa5fb2b1dd1155d484af4729bc6df23dfb9d6
                                        • Instruction Fuzzy Hash: DB319451E2D782C5EB14BB6195041F9A7A5BF05BC8FC50635CE5E1B39AEE3CE102CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-3805148269
                                        • Opcode ID: 6bc4953928094462d9ddc4680efa67f630c3a844b9dad982d79f32fd4d5d8a3e
                                        • Instruction ID: b5dc1d5e8ee31f25d4e65011421c4ff8e1f1e0e15aefafc82bb17dc64579a257
                                        • Opcode Fuzzy Hash: 6bc4953928094462d9ddc4680efa67f630c3a844b9dad982d79f32fd4d5d8a3e
                                        • Instruction Fuzzy Hash: 7071AFA1A3C782C4EB14BB6499041F9A7A1FB057C4FC64635CA9D1B799DF3CE146CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-599393795
                                        • Opcode ID: 2f203b4647518da1f2e7f5e41acfa6be74a516219f63d053806ad01f872eec19
                                        • Instruction ID: 8ddca2875843125171f7113d980b51e3f3921c2b54cfeeedbf890932d806bb2f
                                        • Opcode Fuzzy Hash: 2f203b4647518da1f2e7f5e41acfa6be74a516219f63d053806ad01f872eec19
                                        • Instruction Fuzzy Hash: 0661F2A1A2C782C4EB14BB6695041B9EBA8FB057D4FC64631CA5D0B798DF3CE143CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 901724546-1663925961
                                        • Opcode ID: 9e4491614718e25cc1eab2119404d1c2449d3d8cad68613c048e147f197bde4b
                                        • Instruction ID: 03b9e2204d60030d1d8ebaf6506ddbead137e7d1234488bd8535783e9a2220d9
                                        • Opcode Fuzzy Hash: 9e4491614718e25cc1eab2119404d1c2449d3d8cad68613c048e147f197bde4b
                                        • Instruction Fuzzy Hash: A1513612A2C6C2C6EF18B71594143B9A7A1FF45BD4F850335CA6F077D5EE2CE0468B21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                        • API String ID: 1294909896-1642401773
                                        • Opcode ID: c20ed9e9c4c1ecd284888910d56604651b787efe85db17391b1f6a76b1734e99
                                        • Instruction ID: e7ec372f94d6dc0035a3261b3e9153fd91a70e14fa6b07f961e5eddcb1c87ed4
                                        • Opcode Fuzzy Hash: c20ed9e9c4c1ecd284888910d56604651b787efe85db17391b1f6a76b1734e99
                                        • Instruction Fuzzy Hash: B3516061A2C782D5EB14BB60D4001F9A7A1FB05BC8FC94631DA5E1B799DF3CE546CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID:
                                        • API String ID: 1169197092-0
                                        • Opcode ID: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction ID: 3e379e7376c22cda50743a6345bd9508b5a19940a51806afc002fae5f3acae69
                                        • Opcode Fuzzy Hash: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction Fuzzy Hash: D5515026A2EB81C1EB59EF55F040128B7A4FB48B8474C1275DF4D17B58EF28E4A2CB14
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-3876350232
                                        • Opcode ID: 03dff17ac0cd915ebebac05d076bcb7c51ce859e12afd2d7d7880ca572dcb3ce
                                        • Instruction ID: 021703511ef73e20e5d3e330fa05d14d981e581c4f71e2de2589af29eec52a14
                                        • Opcode Fuzzy Hash: 03dff17ac0cd915ebebac05d076bcb7c51ce859e12afd2d7d7880ca572dcb3ce
                                        • Instruction Fuzzy Hash: 4251B261A2C782C4EB14BB65D4001F9EB65FB05B98FC90631CA5E1B399DF3CE646CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: 9cfc241ff50fa9f1d546cf1a4f6eb5ae5dff09977d4f1df51ff9215a3f6f9d9a
                                        • Instruction ID: 91bce44b187d1828481e363ce11f57c04317705b9429bb7824a26e3938c9e2fb
                                        • Opcode Fuzzy Hash: 9cfc241ff50fa9f1d546cf1a4f6eb5ae5dff09977d4f1df51ff9215a3f6f9d9a
                                        • Instruction Fuzzy Hash: F241B461A2C782C5EB15BB6195041F9A7A1BF05BC8F894A31CE5E1B799EE3CE1068720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                        • API String ID: 2190258309-1780565354
                                        • Opcode ID: 3f5d1b0395fc86ec87808a220fdd74a165c91be78bb230dcae632f790c8615ad
                                        • Instruction ID: 43ea433b696e60c56026ac4fba8f81625831e50bf210fe3549be0717205546a6
                                        • Opcode Fuzzy Hash: 3f5d1b0395fc86ec87808a220fdd74a165c91be78bb230dcae632f790c8615ad
                                        • Instruction Fuzzy Hash: FE419761A2C782C1EB65BB25E8443B8A7A0FB45788F944531CE9D17796EE3CD447CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: f9c98c4728642ed9e1a96ad5c64d8c7b5bcb162c8dc94b6f4a0ea47b6ce93bc3
                                        • Instruction ID: 46805035ef969f4f29a1095bd06fa3f1464fa1d5381c5f29a42e0ef7ead93ff7
                                        • Opcode Fuzzy Hash: f9c98c4728642ed9e1a96ad5c64d8c7b5bcb162c8dc94b6f4a0ea47b6ce93bc3
                                        • Instruction Fuzzy Hash: 8C41447291CB42C2EB61BF21E44027973A4FB49F94F948635DA8E53758CF38D852DB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction ID: 51e45f52832f347dce2c38bde86a80650d6dda2465a361498f4f782711e8c84d
                                        • Opcode Fuzzy Hash: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction Fuzzy Hash: 3531FA3665CA51C6E720BF51E844229A774FB88FC4F580631DE9D17B58CE3DD442DB24
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 075dd9aaa7fd2ff04b308241928e586f3d38968302706bc707c29608b7b674ee
                                        • Instruction ID: 9f142a8cedbdebd62e7856d70c48429f1e66bfa8b30f4dda1e86e5e2a552536a
                                        • Opcode Fuzzy Hash: 075dd9aaa7fd2ff04b308241928e586f3d38968302706bc707c29608b7b674ee
                                        • Instruction Fuzzy Hash: D321A376A68A41C2DB20AF61E854129A374FB88BD4F540631DE9E5376CCF3CD856CB24
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction ID: a31b250cdea3ead92fb2d1d5716faa3dd85043772e401a2c923d36f49a80eaee
                                        • Opcode Fuzzy Hash: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction Fuzzy Hash: FE01CC66668A01C2DB24BF61E854138A330FF88FC5B541631CD9E5336CCF2CD846D764
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF747D833C3), ref: 00007FF747D84058
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF747D833C3), ref: 00007FF747D8409A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF747D833C3), ref: 00007FF747D8413F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF747D833C3), ref: 00007FF747D84152
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D84637
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memcpystrchr
                                        • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                        • API String ID: 1438451818-3030351490
                                        • Opcode ID: e52e08a378c4958454822736a8cccfbaa44d85129ded56afc962efaf92a4d31d
                                        • Instruction ID: ad988be3f96970d87daac0a1bd48a0a9741158d9685d0cd721804ff70bcf070e
                                        • Opcode Fuzzy Hash: e52e08a378c4958454822736a8cccfbaa44d85129ded56afc962efaf92a4d31d
                                        • Instruction Fuzzy Hash: C402D361B2C783C5F710BE61C8407B9A796EF55B8CFD64231DE1D8778ADE68D4028BA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpymemset
                                        • String ID:
                                        • API String ID: 1579693990-0
                                        • Opcode ID: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction ID: 2d55cf51a1dd420cbaf9500cb764af9ce01ef95cf686f4b90dbe5fed0b73bea8
                                        • Opcode Fuzzy Hash: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction Fuzzy Hash: 1E91C121B2C782C2FA64BF62945037AA690BF45FD4F854234DE6D4B785EF2CF4028B64
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF747D598B8), ref: 00007FF747D59A05
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF747D598B8), ref: 00007FF747D59A1F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64$Internal error removing splay node = %d
                                        • API String ID: 1114863663-13178787
                                        • Opcode ID: 4abe602e0432aed16e7e57adae7ae147e6c576377803e4fc3a9105ccc54124ad
                                        • Instruction ID: 5a8980710d6f5457772605507729a8ad5223cb8524dd2abb4e2ffb808554f5ab
                                        • Opcode Fuzzy Hash: 4abe602e0432aed16e7e57adae7ae147e6c576377803e4fc3a9105ccc54124ad
                                        • Instruction Fuzzy Hash: 32A1D633A1C642C6EB20AF14E44477DBBA4FB49B58F865235CA9D43258DF3CD20ACB60
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF747D4B23A,?,?,?,?,?,?,?,00007FF747D4B007), ref: 00007FF747D68221
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF747D683C3
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF747D683E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                        • API String ID: 2644425738-1191287149
                                        • Opcode ID: 9224fbc54b73e1d84aa41a66293c8d90ff55d81bd2fcf765c44fad8682bdecb1
                                        • Instruction ID: f6eaa19a4a556a014b66535a453bb6d66f8ab45375df01adfb78e98bc14f052b
                                        • Opcode Fuzzy Hash: 9224fbc54b73e1d84aa41a66293c8d90ff55d81bd2fcf765c44fad8682bdecb1
                                        • Instruction Fuzzy Hash: 1551F822B2DBC6C5EE61BB15D44017EE7A1AB56B88FD48231DA4D47749DE3CE443CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 573759493-910067264
                                        • Opcode ID: 763c38d78dc5c79ae395204bc3932b69c6bc1704969ec7dd7c9d72dfa48182f2
                                        • Instruction ID: d831aefb93434e709c85f813bb01e8f70c4efc61d10b30e590d294ec71a70c56
                                        • Opcode Fuzzy Hash: 763c38d78dc5c79ae395204bc3932b69c6bc1704969ec7dd7c9d72dfa48182f2
                                        • Instruction Fuzzy Hash: A161F361A2C692C4FB25BB249504279FBA4AF42780FC64232D69D52A88CF3DE547CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                        • API String ID: 2190258309-3231818857
                                        • Opcode ID: cc4af213bcdcfd7440e4ed7acfa4c34d05be6f0fa52ceb2334c71298c3da4e5a
                                        • Instruction ID: 70e97cf597812259fe195814e6013d6d10978c976dd901bd27b05d68fab59e24
                                        • Opcode Fuzzy Hash: cc4af213bcdcfd7440e4ed7acfa4c34d05be6f0fa52ceb2334c71298c3da4e5a
                                        • Instruction Fuzzy Hash: F151A062A3C6C2C5EB25BB25A8042B9E7A4FB45BC0F950231DA9D03755DF3CE147CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrmemcpyrecvfrom
                                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                        • API String ID: 3107918033-477593554
                                        • Opcode ID: a3e2849103a70247068220ebcdcc0a559ec76594586829a5efb8fe2af2be80d4
                                        • Instruction ID: 4feefbc516c54ac9f5fff74346365f78abbb7dcf6fe3c2fa8206402a21f49b02
                                        • Opcode Fuzzy Hash: a3e2849103a70247068220ebcdcc0a559ec76594586829a5efb8fe2af2be80d4
                                        • Instruction Fuzzy Hash: D3512571A2C682C9EB64FF2595103B9B394FB45B45F844236DA4E4B784DE3CE44ACF60
                                        APIs
                                          • Part of subcall function 00007FF747D36DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF747D323DB), ref: 00007FF747D36E5E
                                          • Part of subcall function 00007FF747D36DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF747D323DB), ref: 00007FF747D36E6C
                                          • Part of subcall function 00007FF747D36DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF747D323DB), ref: 00007FF747D36E82
                                          • Part of subcall function 00007FF747D33BC0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D33C06
                                          • Part of subcall function 00007FF747D35DE0: memcpy.VCRUNTIME140(?,?,?,00007FF747D31DCA), ref: 00007FF747D35E71
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32479
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D324B8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32506
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32554
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                        • String ID: at line $, column
                                        • API String ID: 2665656946-191570568
                                        • Opcode ID: cd88fc2eb0c43cf2dea86ed3eb464c30a0ca442cdfdcf6784071c49820cf1abd
                                        • Instruction ID: 096bb97e2d5f7aa541a8b4ec222566bd6ba6e2b5e2d8de76fb4680489de92616
                                        • Opcode Fuzzy Hash: cd88fc2eb0c43cf2dea86ed3eb464c30a0ca442cdfdcf6784071c49820cf1abd
                                        • Instruction Fuzzy Hash: FB51B062F28B86C6FB04EFA4E5443AC6321EB447A8F404331DA6D13BD9DE38E196D350
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                        • API String ID: 1294909896-1255959952
                                        • Opcode ID: f198fbd2046383c1a6cce593e2bc3142b815703f912c50491b5b73dd462a67c1
                                        • Instruction ID: 9db1add9039214a6af947f9ef643562dacdb96247e3e50ef5cd4f30a0c1fed3b
                                        • Opcode Fuzzy Hash: f198fbd2046383c1a6cce593e2bc3142b815703f912c50491b5b73dd462a67c1
                                        • Instruction Fuzzy Hash: 41510472A1C642D2FB11FB65D4402BCB7A0FB45B94F8A0235DA5D83681DF3EE45ACB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 2f12533ae5c7d22c91c98250c81db4f994baa735569bf2d412694917429020a2
                                        • Instruction ID: b05cc4ece61731568bd17a28198f407c12df78a22c47c975fede3bed0bf25bc8
                                        • Opcode Fuzzy Hash: 2f12533ae5c7d22c91c98250c81db4f994baa735569bf2d412694917429020a2
                                        • Instruction Fuzzy Hash: 0A41F31292D682C5EA7ABB216110379AB91AF45794F880772DADE0A3C5DF2DE407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: a2a6ca694af6d6b6ff358b0db032f8cc45bfc6661a346e6da40368cd7cad8861
                                        • Instruction ID: 07fc4be3a7636bcbc7045d99e114ce17cfb19eeb950a9338c147411a0ae25c22
                                        • Opcode Fuzzy Hash: a2a6ca694af6d6b6ff358b0db032f8cc45bfc6661a346e6da40368cd7cad8861
                                        • Instruction Fuzzy Hash: 0941E51292D292C4FA7AB7216010379AB91AF45794F880772DEDE0A3C5DF2DE407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: d0b26e73ffc5f99cf69ba09fbf06d48aaf8e2ad000c814df662444c5f3b2e9b2
                                        • Instruction ID: 0e82ece7d56fe050adeedf9721f3ed92a0651252d00b183b829c0de381503f54
                                        • Opcode Fuzzy Hash: d0b26e73ffc5f99cf69ba09fbf06d48aaf8e2ad000c814df662444c5f3b2e9b2
                                        • Instruction Fuzzy Hash: 1141D612D2D692C4FA7AB7215110379AB91AF45790F880772DE9E0A3C5DF2DA407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 6ddab9e1bea1c4541d84d215edef0730235214fb9ebe75839b84cfb8c703a0c1
                                        • Instruction ID: 080bcb0d63da43378aaa316e067d7c28c09de450190a68de00ea76af3e56749e
                                        • Opcode Fuzzy Hash: 6ddab9e1bea1c4541d84d215edef0730235214fb9ebe75839b84cfb8c703a0c1
                                        • Instruction Fuzzy Hash: D341E50292D292C5FA7AB7215010379AB91AF05790F880772DE9E0A3C5DF2DA407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: add6d49ce95373930ca12822ca5706401dd4ce203f97ecf9262891c636c1e989
                                        • Instruction ID: f723b3e8d0713c0b41810cfc8704973096f666533dc2aa0d8f720a685a0f3f2d
                                        • Opcode Fuzzy Hash: add6d49ce95373930ca12822ca5706401dd4ce203f97ecf9262891c636c1e989
                                        • Instruction Fuzzy Hash: E441F602D2D292C4FA7AB7215010379AB91AF05790F880772DE9E0A3C5DF2DE407DB30
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: f24707c84e03f7a66e94ac29b5f0433a77d803606814e6d8575d6aa59e1712ec
                                        • Instruction ID: 7158bb4d7c4560cfae75dfbc9ad1e1da624ad995fa356b619a36b4088968d345
                                        • Opcode Fuzzy Hash: f24707c84e03f7a66e94ac29b5f0433a77d803606814e6d8575d6aa59e1712ec
                                        • Instruction Fuzzy Hash: 2E41D612D2D692C5FA7AB7215110379AB91AF45790F880772DEDE0A3C5DF2DE407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 79a656023e6bd4345ef3070d038f4b0a04e506819340c9dc18019e0ab5006f97
                                        • Instruction ID: a8007f67567b1fcfa55e772aff6813d1a6f406a120daced899c0bc01dd60151e
                                        • Opcode Fuzzy Hash: 79a656023e6bd4345ef3070d038f4b0a04e506819340c9dc18019e0ab5006f97
                                        • Instruction Fuzzy Hash: 3941D61292D792C4FA7AB7215010379AB91AF45790F880372DE9E0A3C5DF2DA407DB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr
                                        • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                        • API String ID: 2830005266-711804848
                                        • Opcode ID: d589d7f1a0eca895f8ffff6343643548f106be98028e10f8c7df182552c1a110
                                        • Instruction ID: 6572dfd700636ddcd343fc38d73ae7b1d4212c97151ae59b0ddc315107606e8c
                                        • Opcode Fuzzy Hash: d589d7f1a0eca895f8ffff6343643548f106be98028e10f8c7df182552c1a110
                                        • Instruction Fuzzy Hash: 3E41D821B3CA82C2EA54FB1AA5001B9E790AF457C8FCC9235DA4D47786EE1CE5438F64
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64
                                        • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                        • API String ID: 1670930206-870032562
                                        • Opcode ID: 74e62bef8fa31f227eae4ae217bd9c3a0d0584a610b1ab6dd052daefc5e3ab35
                                        • Instruction ID: aacec5118713a03a3d28b190a09bb0330d4c4f2ebc9268e853a79a40aae18f20
                                        • Opcode Fuzzy Hash: 74e62bef8fa31f227eae4ae217bd9c3a0d0584a610b1ab6dd052daefc5e3ab35
                                        • Instruction Fuzzy Hash: 6441B576B38615C7DB20EF2AE040568A7A4F799F88FD05132DE0D8B798DE39E552CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-3155708153
                                        • Opcode ID: 770020365c6d0c45be4cfa23b1a94b6c3da9defd2c613fd296cabf1a0c258870
                                        • Instruction ID: a402bfddefd0a3b3a320d39454fbad3cfe3e9a7ee23afca03324483fc1571711
                                        • Opcode Fuzzy Hash: 770020365c6d0c45be4cfa23b1a94b6c3da9defd2c613fd296cabf1a0c258870
                                        • Instruction Fuzzy Hash: 6E41A451A2C782C9EF14BB6194001F9A7A1BF057C8FC54A31DE5E0B799EF3CE1068B20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                        • API String ID: 2190258309-3662781045
                                        • Opcode ID: 81ec5cdf911039d5ac5546a4cba887d0936b7f84550cb837826ce393f7bf0ef0
                                        • Instruction ID: 434e60fe7401e3e70e8d6ced19e05b0999d00d9db21efab2a28192e327221df6
                                        • Opcode Fuzzy Hash: 81ec5cdf911039d5ac5546a4cba887d0936b7f84550cb837826ce393f7bf0ef0
                                        • Instruction Fuzzy Hash: 57418162A2CA82D5EB10FB25E4001AAE360FB45BC4FD90632DA9D17759DF3CE546CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-659367561
                                        • Opcode ID: 0727d6f78932e429ab4fbfca8d635a4f14a82bbe5beda4dd6ce3d34bcfbc9a7f
                                        • Instruction ID: 444ef8a5a7afcb5507b75edfb4a4ea0f1cd0fa8d692a48fd8df435fd4ea9465b
                                        • Opcode Fuzzy Hash: 0727d6f78932e429ab4fbfca8d635a4f14a82bbe5beda4dd6ce3d34bcfbc9a7f
                                        • Instruction Fuzzy Hash: 2641DA51B2D782C9EF14B76695041F9ABA5AF05BC8FC55A31CE1E0B796DE3CE102CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: .
                                        • API String ID: 1865132094-916926321
                                        • Opcode ID: 126cce29423b04e181cdf8db6ab3ac814217b907ae3d6256a840f172d07d0515
                                        • Instruction ID: 7e3431ad4b013d7fc9ce88a8d9e96e99022dd966fc05c9d84ad0c6ae62e84bc1
                                        • Opcode Fuzzy Hash: 126cce29423b04e181cdf8db6ab3ac814217b907ae3d6256a840f172d07d0515
                                        • Instruction Fuzzy Hash: F1416022A2CB95C2E760BB91D500379A7A4FB44B80F954631DA4D4B7C4DF7CE452CFA0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: 1041f1c514f0783e2dd224254fe01bacb26eac6c194eb6be230712af05d872a0
                                        • Instruction ID: fe294915ad1fdaff07c07d1a63d10a93cbbea86c8caa499ceb93c7a1a5b8c465
                                        • Opcode Fuzzy Hash: 1041f1c514f0783e2dd224254fe01bacb26eac6c194eb6be230712af05d872a0
                                        • Instruction Fuzzy Hash: 8F41C161A2C782C4EB14BB6295041F9A761BF05BC8FC94631CE1E1B799EF3CE106CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: isupper$freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 2172629687-3412697401
                                        • Opcode ID: f595869c9dc7c6358f2bb1277ec5f6ddccb6b3985ee67b44c1d93163b6242026
                                        • Instruction ID: 328ab54ff10dbc7d7417e1331fc5433a8d60c045b307b67d424964b19789bb30
                                        • Opcode Fuzzy Hash: f595869c9dc7c6358f2bb1277ec5f6ddccb6b3985ee67b44c1d93163b6242026
                                        • Instruction Fuzzy Hash: 2D31F751E2D692C5FB32FB254504338EBD1AF52B94F865731C9AE52AC5CE2EA443CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 3519880569-1663925961
                                        • Opcode ID: f6c58c40ca3c7ba21690231e68ce7d023b12d9f0ab968a8b5222cd54bd54690d
                                        • Instruction ID: 46d52c47da56d35f72b4d9931d4d786e22b6d6b9e7123a2c2f512f9012e79a8f
                                        • Opcode Fuzzy Hash: f6c58c40ca3c7ba21690231e68ce7d023b12d9f0ab968a8b5222cd54bd54690d
                                        • Instruction Fuzzy Hash: CF31A661B2D782C5EE25FB16A5042BAA360BF85BD4F850631CD5D17795EE3CE0468B10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanf_strdupfree
                                        • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                        • API String ID: 860312144-3309259123
                                        • Opcode ID: 826ba58853a3d136957f2169816f333a83ec11baa541e78f2ddb2eeea56b2deb
                                        • Instruction ID: 690831e4313c9fc7402efeb732032cd155ba483b0d9551840bfb5d5afe3f29da
                                        • Opcode Fuzzy Hash: 826ba58853a3d136957f2169816f333a83ec11baa541e78f2ddb2eeea56b2deb
                                        • Instruction Fuzzy Hash: 1531AE26E2CE42C2EA68BB21D4401BDA361FF85BC4FD48632CA4D47255DF2CE853CB61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1941130848-1663925961
                                        • Opcode ID: 2a26922783b79db217bfca0c63685440ab013e418253220c7c111f94832e3c4e
                                        • Instruction ID: bad3755916f86183f74ef7c6f934ee1f32b47d4de1290bdb47068de6c8383025
                                        • Opcode Fuzzy Hash: 2a26922783b79db217bfca0c63685440ab013e418253220c7c111f94832e3c4e
                                        • Instruction Fuzzy Hash: 33215062A2CA82C6EB10FB55E4442BAA364FF85BC4F840531DE4D17759EF2CE106CB10
                                        APIs
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D55F85
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D55FB1
                                        • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D55FB9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D55FDB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF747D532CC), ref: 00007FF747D55FF2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_errnostrerrorstrtoul
                                        • String ID: Invalid zoneid: %s; %s
                                        • API String ID: 439826447-2159854051
                                        • Opcode ID: 90ed70e7a9103df2e2ca6645ded79d52b4d57e1b227f7637ba387c6d3f74f995
                                        • Instruction ID: d2ca3e38fb137b5842dd4fb2d55543566c48e120d71366400c31011f0f7c91bb
                                        • Opcode Fuzzy Hash: 90ed70e7a9103df2e2ca6645ded79d52b4d57e1b227f7637ba387c6d3f74f995
                                        • Instruction Fuzzy Hash: BE11B671A2D642C2EB51BB61E440578A370FF85B84FD40231DA5E57B94DF2CE846CF10
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55E94
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EAA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EBE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55ED2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EE6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55EFA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55F0E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D55F22
                                          • Part of subcall function 00007FF747D7EE20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D55F3B,?,?,00000000,00007FF747D51983,?,?,00000000,00007FF747D51F05), ref: 00007FF747D7EE35
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: cc701dd807a2de35d7b90ce0a0f5c20ef81b97b0dbdd88433eb2069ca0843ede
                                        • Instruction ID: b279a241ecc061e0271f07c04c087d24c71992493b26924495ffd4ad7a40e2a1
                                        • Opcode Fuzzy Hash: cc701dd807a2de35d7b90ce0a0f5c20ef81b97b0dbdd88433eb2069ca0843ede
                                        • Instruction Fuzzy Hash: 9D11B036518F80C1D710AF61E9941E873B4FBC9FCAB680531DE9A8F798CF388096C620
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 76dd59e71e33e2bcc016bbdad4e6cf1ec256d42fdf36b4fa1aa37c38543d4c45
                                        • Instruction ID: 41049821241373f74e5b43d28e547d01b25a5e3b53fccb17bdb45bf3987791bb
                                        • Opcode Fuzzy Hash: 76dd59e71e33e2bcc016bbdad4e6cf1ec256d42fdf36b4fa1aa37c38543d4c45
                                        • Instruction Fuzzy Hash: D5F0F966A6C901C2D724BFA2E8541386330FB88F85B641531CD6E563ACCE2CD856D764
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction ID: eb3e345f0d20f0691c4fd1dec59fa33ee2c6c60139c3765e0c9caa13afd3b583
                                        • Opcode Fuzzy Hash: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction Fuzzy Hash: FC31C3A272D742C6EE14BB16A5041A8E255AB04BE0FD44B31DEAD077D5DF3CE096CB50
                                        APIs
                                        • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF747D33C35,?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D34FB3
                                        • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF747D33C35,?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D34FC1
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF747D33C35,?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D34FFA
                                        • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF747D33C35,?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D35004
                                        • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF747D33C35,?,?,?,?,?,00007FF747D31D9B), ref: 00007FF747D35012
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D35041
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: 13b12c59ad332770c5e2ef552953df7cc1051dc384361dca5f05cbda1b42f09a
                                        • Instruction ID: 733544119957dc20eeb099098cb63d55f407c773c9cd5dca797ae1b6caab5b01
                                        • Opcode Fuzzy Hash: 13b12c59ad332770c5e2ef552953df7cc1051dc384361dca5f05cbda1b42f09a
                                        • Instruction Fuzzy Hash: 0A41C46272D682C6EE24BF56A50426DE751BB04BE4F984730DF6D0B7C5DE3CE0428750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConditionMask$InfoVerifyVersion
                                        • String ID:
                                        • API String ID: 2793162063-0
                                        • Opcode ID: 0bb4b56c4cc27db388f41d9e992b02de2c6f235a1dc9b89760d7901d9c668bf9
                                        • Instruction ID: d8fac04d20e59ab86d36fa58662eb7b5b02a6b0e0bd10de6a797cc0ec640b689
                                        • Opcode Fuzzy Hash: 0bb4b56c4cc27db388f41d9e992b02de2c6f235a1dc9b89760d7901d9c668bf9
                                        • Instruction Fuzzy Hash: 3D41BA22E2D692C7E630AB11A414BBAF350FBD6344F925335E9CD02B54DE3CE4869F20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: f06e59eeaae8cef8ada80270bc3da1753f3d925e9ea74eb361696e54cb589952
                                        • Instruction ID: e56c682ba69b6c4085a5cc4b1ec765a44902e4239c5ca02b8c77535f691bc485
                                        • Opcode Fuzzy Hash: f06e59eeaae8cef8ada80270bc3da1753f3d925e9ea74eb361696e54cb589952
                                        • Instruction Fuzzy Hash: B341A462A2C781C9EB14BB6195041F9A761BF05BD8F894631DE5E1B789EF3CE106C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: eb71e361cb7bb7c5c670ba90f5c307ba5558737232c48933c27f903f0aa1aeed
                                        • Instruction ID: ac0a21541b62335c181aa7f8ac611ed74c81fa2e994bbcfb8314e6ea74a11b46
                                        • Opcode Fuzzy Hash: eb71e361cb7bb7c5c670ba90f5c307ba5558737232c48933c27f903f0aa1aeed
                                        • Instruction Fuzzy Hash: 8C41C661B2C782C9EB14FB6295041F9A761BF05BC8F894631CE5E1B799DE3CE142C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$freemalloc
                                        • String ID: PLAIN
                                        • API String ID: 3313557100-4000620671
                                        • Opcode ID: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction ID: 4ff38f8b2dca966a805bfa243a01f6b7323de402ff98914159101521a5f6f06f
                                        • Opcode Fuzzy Hash: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction Fuzzy Hash: E531C766A1CB81C2EB10AF65E4403A9A790FB45BE8F858735DEAC477D5DE3CD046CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: d0c4e00c47ee3360ed2ac029bdbd6d24406b99e1f2b9c97bef61e0dd94b29b23
                                        • Instruction ID: 7062bf02d9866a4a8de00477e255c0b31db6b641e9e62d4a263ac5136e44aee6
                                        • Opcode Fuzzy Hash: d0c4e00c47ee3360ed2ac029bdbd6d24406b99e1f2b9c97bef61e0dd94b29b23
                                        • Instruction Fuzzy Hash: 6A319461A2C782C9EB14BB6195001F9A7A1BF057C8FC50A31DE5E1B799EF3CE106CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfreememcpystrchr
                                        • String ID: CAPA$Got unexpected pop3-server response
                                        • API String ID: 2887963327-1591402739
                                        • Opcode ID: b1d3e936dd382e64101da7c55902cb61b4af86ecf09ec8689194697eb391ecd8
                                        • Instruction ID: 3d2e0fd3e0745f9806a4446ef57406e10bfa4d00df9956ed269b6dd00e6a85c8
                                        • Opcode Fuzzy Hash: b1d3e936dd382e64101da7c55902cb61b4af86ecf09ec8689194697eb391ecd8
                                        • Instruction Fuzzy Hash: 6231B3A2B2D782D2FA55BB9595002B9A390BB45794FC40B35CA1E0B3D1DF3CE466CB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3061335427-2901970132
                                        • Opcode ID: 4d427e1f30d5a391f89b43e81b84bcd4672e43ef37116d2b3609367e89548b99
                                        • Instruction ID: 832d433043d6a2e7fd087c245d85d67a0a7b38d28c434eef0f71c715d5a9872a
                                        • Opcode Fuzzy Hash: 4d427e1f30d5a391f89b43e81b84bcd4672e43ef37116d2b3609367e89548b99
                                        • Instruction Fuzzy Hash: 2A318461A2C781C9EB14BB6195041F9A7A1BF057C8FC50A35DE5E1B799EF3CE106CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3061335427-2901970132
                                        • Opcode ID: 45ec44654f83844e4bdd7469c646499786ef12c6f28734da3caf99f7d0388d96
                                        • Instruction ID: 75a1efdf8a08bd0aec2324dd3c5de9abf9289b3c143dc8d6e9485c2d5acc97fa
                                        • Opcode Fuzzy Hash: 45ec44654f83844e4bdd7469c646499786ef12c6f28734da3caf99f7d0388d96
                                        • Instruction Fuzzy Hash: CE318461A2C781C9EB14BB6195001F9A7A1BF057C8FC50A35DE5E1B799EF3CE106C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%s%lx$Signature
                                        • API String ID: 2190258309-1406629954
                                        • Opcode ID: 3a8dd7c126c2bb8997d435d8e9448206225087e5cb925a77442ceabf54e7fb7f
                                        • Instruction ID: ef14afae1ac085a73197759a5cd4a74ab57ad3235d9d8446a230b30791edab8d
                                        • Opcode Fuzzy Hash: 3a8dd7c126c2bb8997d435d8e9448206225087e5cb925a77442ceabf54e7fb7f
                                        • Instruction Fuzzy Hash: 25318362B2C682C6EE20BB25E4442B9A361FF45BC4F950631DE5D17755EF2DE006CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupcallocfree
                                        • String ID:
                                        • API String ID: 1236595397-0
                                        • Opcode ID: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction ID: 159897bde01bd1e2ebd2746ba7fd738315f75fc48009638451144bdf6f0badc2
                                        • Opcode Fuzzy Hash: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction Fuzzy Hash: 4F31A432A1CB85C2EB51EB15E0503BDA7A0FB85B89F984131DE8D0B795DF3DD4968B20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: 8ff51399e34fb18bdfa4065b559064d0e27037ba38114c71594b9cf6c5c9ea19
                                        • Instruction ID: 715014b762c50ba64ff3e73aa3b9f9b8c84ef6ff49b4df32416d9f789bc87fc0
                                        • Opcode Fuzzy Hash: 8ff51399e34fb18bdfa4065b559064d0e27037ba38114c71594b9cf6c5c9ea19
                                        • Instruction Fuzzy Hash: 8031C891E2D782C5EB14BB6195001F9A765BF05BC8FC50A35CE5E1B39AEE3CE142CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: e8f8e1119d8f664448a53c165c6e65c980d9a364779f0fe52f2c216c99377cce
                                        • Instruction ID: 4575c391192c73a170001e8c3e20b4a251974191cd42f2da9b3eac307307cead
                                        • Opcode Fuzzy Hash: e8f8e1119d8f664448a53c165c6e65c980d9a364779f0fe52f2c216c99377cce
                                        • Instruction Fuzzy Hash: A531A751A2D782C5EB14BB6195041F9A761BF05BC8FC51A35CE5E1B39AEE3CE102CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: 5ec3e6fecba39bd3d991c3c6fb9a38e0fd5dbbeef94bd947f9992e81f5bad80f
                                        • Instruction ID: fe391bf24dee48eb0b07dcb5abafd4048d12d68139a43d9ba6b8f8812c284c35
                                        • Opcode Fuzzy Hash: 5ec3e6fecba39bd3d991c3c6fb9a38e0fd5dbbeef94bd947f9992e81f5bad80f
                                        • Instruction Fuzzy Hash: CF31B691A2D782C5EB14BB6195001F9A765BF05BC8FC50A35CE5E1B39AEF3CE102CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: OS/400$SITE NAMEFMT 1
                                        • API String ID: 3061335427-2049154998
                                        • Opcode ID: 238c0afdacb31243b85ac3d1db810fa013d497470da026d92261a530de5efd79
                                        • Instruction ID: 27fe42131d7a7a1706494fdad5b54a1cc485fa152b0419911cc4d27b3294e101
                                        • Opcode Fuzzy Hash: 238c0afdacb31243b85ac3d1db810fa013d497470da026d92261a530de5efd79
                                        • Instruction Fuzzy Hash: 7231B421A2D682C5F7B5BB25A8503B8A360BF45784FD44131CE8D6B785EE3CE447CB25
                                        APIs
                                          • Part of subcall function 00007FF747D34320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                          • Part of subcall function 00007FF747D33C40: memcpy.VCRUNTIME140 ref: 00007FF747D33C93
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D326F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D32740
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF747D32790
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D327DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: out_of_range
                                        • API String ID: 2484256320-3053435996
                                        • Opcode ID: 76b5d1f39a06f829aa9331822407c70e4fe0090e782a3815653c09b6c0711f4b
                                        • Instruction ID: 0eb30fa9b3ad3f4704e8d86b760cdb1e1f7fb41900f22d4462dcc0bfffbe8e15
                                        • Opcode Fuzzy Hash: 76b5d1f39a06f829aa9331822407c70e4fe0090e782a3815653c09b6c0711f4b
                                        • Instruction Fuzzy Hash: 17518E72A28B42D9EB00EF64D5503AC7365FB557A8F804331EA6C03AD9DF38E196C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno_strdupstrcspnstrncmpstrspn
                                        • String ID: 0123456789abcdefABCDEF:.
                                        • API String ID: 2191890455-446397347
                                        • Opcode ID: ca6300237a503bd3a250d5ee3d5486e4091a75e784b40d1668d8d2c94c973a18
                                        • Instruction ID: d8089e1cbacf0148dce8f8dc4d7b68b8ca88fdd2ddbaf085a1dc8c40024cff58
                                        • Opcode Fuzzy Hash: ca6300237a503bd3a250d5ee3d5486e4091a75e784b40d1668d8d2c94c973a18
                                        • Instruction Fuzzy Hash: 7D41E452A2CAC5C5EB31BB209810379F794EB06B54FC90636DAAD476C5DF2CE44BCB21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 573759493-632690687
                                        • Opcode ID: 343ef0198a30bded6e874855b7bac8952b7913ac847ed004ba77e1029ef942e7
                                        • Instruction ID: d6eee044875563ca3f85aad0e0e80f3f486f68cf47b93574edd69029b9a4f73d
                                        • Opcode Fuzzy Hash: 343ef0198a30bded6e874855b7bac8952b7913ac847ed004ba77e1029ef942e7
                                        • Instruction Fuzzy Hash: BA41D461A2DA82D5FB71FB249140378FB91AB41780FDA5732C69E12689CF3DE543CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: tolower$_time64
                                        • String ID: :%u$Hostname in DNS cache was stale, zapped
                                        • API String ID: 4068448496-2924501231
                                        • Opcode ID: 521fe6832f3cf790d4b15facc39401459d45f648660c420e41be536990509afb
                                        • Instruction ID: faed1df87bde6f05f59c70a4c8cccfae4df723f71c4e293120d390794ac72985
                                        • Opcode Fuzzy Hash: 521fe6832f3cf790d4b15facc39401459d45f648660c420e41be536990509afb
                                        • Instruction Fuzzy Hash: 6A41A362A2CA82D6EA25BF11E4407B9A761EB45B98FC54332DE4D0B795DF3CE106CB10
                                        APIs
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34351
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D34416
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D3446A
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D34471
                                          • Part of subcall function 00007FF747D8FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF747D343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D8FB32
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID: https://keyauth.win/api/1.2/
                                        • API String ID: 1155477157-3933380396
                                        • Opcode ID: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction ID: 3ed20224c9fa18b442aebed8b7042314f75a098877fe814298d9d6c544b5cc23
                                        • Opcode Fuzzy Hash: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction Fuzzy Hash: 6C31BD62B2EA86C6FA18BA95A6142789241AB05FE4F940730CE3D07BD5DE7CE0838750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_close_openmalloc
                                        • String ID: Couldn't open file %s
                                        • API String ID: 3412525164-447283422
                                        • Opcode ID: 2aa78f5bc71d4c5fa95e3ddca835f94173a24e12e9090b31d0f437c2ad20b55b
                                        • Instruction ID: 22fafa7eb2f928ca76b38c7d7f1927873be5b41f34d5d11302a66a630a455d8b
                                        • Opcode Fuzzy Hash: 2aa78f5bc71d4c5fa95e3ddca835f94173a24e12e9090b31d0f437c2ad20b55b
                                        • Instruction Fuzzy Hash: C141B461A1CB81C1EB14BF25E40027DE7A5FB45BE8F984631DA9D4B798CF3CE4428B21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnofreememcpyrecv
                                        • String ID: Recv failure: %s
                                        • API String ID: 267823591-4276829032
                                        • Opcode ID: ca46f200b82e1adf06dd143e3a4dc972eed31ba8d415bfd83557f489aaddfe68
                                        • Instruction ID: 21c31bdcc8e56f856f6cdb985b2b64381aa4409b91c156c1e16b3b4e722e7779
                                        • Opcode Fuzzy Hash: ca46f200b82e1adf06dd143e3a4dc972eed31ba8d415bfd83557f489aaddfe68
                                        • Instruction Fuzzy Hash: F531CE76B19B41C2EB50BF11E9402A9A360BB58FD8F914231CE5D07788DE3CD456CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                        • API String ID: 1865132094-195851662
                                        • Opcode ID: f16b21b77d4c81fbba74814a81fdec6d0cbefe19cea108c1aebaaf06ca801d6d
                                        • Instruction ID: 7f9fc6d79242b8b2cd3c3e1357aa8a2b0522171961bbd81c4471f71e034b2aea
                                        • Opcode Fuzzy Hash: f16b21b77d4c81fbba74814a81fdec6d0cbefe19cea108c1aebaaf06ca801d6d
                                        • Instruction Fuzzy Hash: D0417432B2C682C2E755EF25E4903A9A790EB44B88FC94131DB4E4B795DF3DD492CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                        • API String ID: 1812939018-579818044
                                        • Opcode ID: 60c15f7d09dcad11e8e90f63e8166c11e01d1a905cc88d36ae392e94e60358de
                                        • Instruction ID: 2369c63e964980e56cec0c13124388bc46ee8ab17b5ee4c96fad83c949f3553f
                                        • Opcode Fuzzy Hash: 60c15f7d09dcad11e8e90f63e8166c11e01d1a905cc88d36ae392e94e60358de
                                        • Instruction Fuzzy Hash: C3319266A2CB81C1EB01FB25E4402B9E3A1FB89B94F844331DA9D0B795DF6CD506CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %s: %s$FALSE$TRUE
                                        • API String ID: 1865132094-3430445539
                                        • Opcode ID: a0668f6f08a5207906d9e598c81a2e904b764e4c26932b466be4701ecc668148
                                        • Instruction ID: b19785625a6ab073f4f94c65b439fdbcfc2e16b6d902eaa35703c95482fe68d5
                                        • Opcode Fuzzy Hash: a0668f6f08a5207906d9e598c81a2e904b764e4c26932b466be4701ecc668148
                                        • Instruction Fuzzy Hash: 04019651A2C782C5EA65BB56E8403BAA350BB45BC4FC94531CE9D07359DF2CE187CB20
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
                                        • API String ID: 0-3012371547
                                        • Opcode ID: b84debb6d9510ae538666e16e91284ee1a91bca776b13676c904f4af6de072ea
                                        • Instruction ID: e9ff9c2e6d10c4ddb79f292092096d59e577763e98934c3dee9610d2055ff16f
                                        • Opcode Fuzzy Hash: b84debb6d9510ae538666e16e91284ee1a91bca776b13676c904f4af6de072ea
                                        • Instruction Fuzzy Hash: 4261B473A1C786C6E705AB24D4403ADBBA5EB55BA4F848235DA4947785EB3CE442CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                        • API String ID: 1294909896-1891748601
                                        • Opcode ID: a61e15c8e497079b5260048dad64b39a4f76ef6f24250cbc46f7a90162b348d6
                                        • Instruction ID: 768414c2297b8e90f57a0306bcc024f4e60e64c88a1ec33279e691992fa10268
                                        • Opcode Fuzzy Hash: a61e15c8e497079b5260048dad64b39a4f76ef6f24250cbc46f7a90162b348d6
                                        • Instruction Fuzzy Hash: D351A56192C6C2C2EA65FB2495113B9E261AB417A4FC40335DAAD0B6C2DF7CF4478B61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3401966785-3412697401
                                        • Opcode ID: 80d142b2cfaed612c7625e82799aa2ed6ff54757b648a70adbdf1b712a748d0f
                                        • Instruction ID: 959cb667a59f1fb7d06d97f0371977b0e5130be456203c541497f29556eb5eba
                                        • Opcode Fuzzy Hash: 80d142b2cfaed612c7625e82799aa2ed6ff54757b648a70adbdf1b712a748d0f
                                        • Instruction Fuzzy Hash: 6A415A61B2D652C5FB25B6158914375A762EF81BE0F854732CABE473C9CD6CD083D720
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF747D8DEB0), ref: 00007FF747D8DF5F
                                          • Part of subcall function 00007FF747D68210: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF747D4B23A,?,?,?,?,?,?,?,00007FF747D4B007), ref: 00007FF747D68221
                                          • Part of subcall function 00007FF747D68210: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF747D683C3
                                          • Part of subcall function 00007FF747D68210: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF747D683E0
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF747D8DEB0), ref: 00007FF747D8DFCE
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF747D8DEB0), ref: 00007FF747D8DFE8
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF747D8DEB0), ref: 00007FF747D8E01E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: xn--
                                        • API String ID: 2644425738-2826155999
                                        • Opcode ID: b46ea498338ad0604a2fe1f816cf16bc5d623c34d4297be9ae51f102c711e271
                                        • Instruction ID: 5ce16ca6eb6efd7724da913b9d08c903b7de05b9c30d0ce74d86975d22f170af
                                        • Opcode Fuzzy Hash: b46ea498338ad0604a2fe1f816cf16bc5d623c34d4297be9ae51f102c711e271
                                        • Instruction Fuzzy Hash: 68410651B2D686C5FB54BA329514379D6829F85BC0FC58230DE2E977C6EE2CE0038F20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfreememset
                                        • String ID: CONNECT phase completed!$allocate connect buffer!
                                        • API String ID: 3505321882-591125384
                                        • Opcode ID: 78bf7f49cec57bb633d22496aba38610fa64e698063a4e1d5dfc42223fe7f2c4
                                        • Instruction ID: b1c1a4dc675f3f60f46bc90560cf2d9579bd2d43f79294a9bb9f4d78c3926df1
                                        • Opcode Fuzzy Hash: 78bf7f49cec57bb633d22496aba38610fa64e698063a4e1d5dfc42223fe7f2c4
                                        • Instruction Fuzzy Hash: F051A122B1CA82C3E758BB25D9443B9B3E0FB44B88F854135CB5C5B281DF79E56AC724
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: a198ade456d71fd290c192ef9094b732cc5983dbf1400fe6e936b787195600f5
                                        • Instruction ID: 43b859aac8cfd1420dd266a8832dfd6f3af91a180663fb46ad942b293649e228
                                        • Opcode Fuzzy Hash: a198ade456d71fd290c192ef9094b732cc5983dbf1400fe6e936b787195600f5
                                        • Instruction Fuzzy Hash: 66219166B1CAC1C6EB14AB25E4442A9A360FB44BD8F880632DE6D17799DF3CD142CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Failure sending QUIT command: %s$QUIT
                                        • API String ID: 1294909896-1162443993
                                        • Opcode ID: 4ca42619a1e31173df9d1b850f7224c4b4225d9bed481e7d5c2d2b67698de71c
                                        • Instruction ID: e631290fbabd8aaf0c63e5d8ac282b7c7131d1c27a1c135040ac1c91ebcc5285
                                        • Opcode Fuzzy Hash: 4ca42619a1e31173df9d1b850f7224c4b4225d9bed481e7d5c2d2b67698de71c
                                        • Instruction Fuzzy Hash: 7B314F31A6C782C1EB50FF26D5502B9A7A4FB85B84F884231DA9D0B755DF2CE452CB21
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$memcpy
                                        • String ID:
                                        • API String ID: 3478730034-0
                                        • Opcode ID: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction ID: be41607389177063828a98c327150263f55c53ea33386d58f4df444888decdb3
                                        • Opcode Fuzzy Hash: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction Fuzzy Hash: C621B271A1CB82C6E710BF229410229B7A0FB48BD0F948338DA9E5B79CDF3CD4428B10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupmalloc
                                        • String ID:
                                        • API String ID: 4236146995-0
                                        • Opcode ID: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction ID: 9b905ad20bb889dae4e5b2fd5493c58c5d5a27b2d20ebd5c562d2687279ccb32
                                        • Opcode Fuzzy Hash: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction Fuzzy Hash: E3215362B29B85C1EB85AB25905436863E1FF45B94F480234DE4D0B748EF29D491CB25
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 5365f1df1ed3cea1c2c7de787eb6e300e9b64ce9320d70a5ed4b329ba6b3b17f
                                        • Instruction ID: 560f7eff829df3f591824f8916ad042bf0604ff0b9c59a22d383b18d62022058
                                        • Opcode Fuzzy Hash: 5365f1df1ed3cea1c2c7de787eb6e300e9b64ce9320d70a5ed4b329ba6b3b17f
                                        • Instruction Fuzzy Hash: 19216566A2CA82C6EB24FB55E4442BAA364FF45BC4F850531DE5D17759DF3CE042CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: 41b76b45187b604ba47561f7a3e753a50d17ac0b22649e8f1a55bbcb22655a30
                                        • Instruction ID: f891bde62139a5d5cbff14856fd7226564cb4abcf8b49c8fc64a016991995daf
                                        • Opcode Fuzzy Hash: 41b76b45187b604ba47561f7a3e753a50d17ac0b22649e8f1a55bbcb22655a30
                                        • Instruction Fuzzy Hash: 88215366A2CA82C6EB10FB65E4442EAA364FF85BC4F840532DE5D17759DF3CE146CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: db904f56e6270d6705b2c490b5aa27aa7852b63d4b065eb65d90f7fbd933b535
                                        • Instruction ID: d01d8c5979d237541248b86607e5921d91fb1abd7a2126402d81f88f26169580
                                        • Opcode Fuzzy Hash: db904f56e6270d6705b2c490b5aa27aa7852b63d4b065eb65d90f7fbd933b535
                                        • Instruction Fuzzy Hash: 76215366A2CA82C6EB10FB65E4442EAA364FF85BC4F840532DE5D17759DF3CE146CB10
                                        APIs
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF747D42E89), ref: 00007FF747D437EF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncpy
                                        • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                        • API String ID: 3301158039-3625861382
                                        • Opcode ID: 6380039508780b6add5a13c08d96a73198b9f942589f9f0a8f4d674408762aa1
                                        • Instruction ID: 90f5cb5d578ad9599754939ec95b6176e6a8e73f5b1b0079b1ddfc76c8e562ce
                                        • Opcode Fuzzy Hash: 6380039508780b6add5a13c08d96a73198b9f942589f9f0a8f4d674408762aa1
                                        • Instruction Fuzzy Hash: 1D110AA1F6C243D1EA18771CE5552789BA0EF06780FC84371C68E16694DD6CE8828F10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction ID: 5c3696e0dd0b8d3aa733bb5977b5b6074bf67aa001e1cdaa1925a01794049b5f
                                        • Opcode Fuzzy Hash: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction Fuzzy Hash: E5113D7665CB41C6E620BF52E945229B370FF99B90F544231CF8E03B44CF39E4A68B20
                                        APIs
                                        Strings
                                        • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF747D66385
                                        • ** Resuming transfer from byte position %I64d, xrefs: 00007FF747D66128
                                        • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF747D6613B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fflush
                                        • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                        • API String ID: 497872470-664487449
                                        • Opcode ID: bd79883afe62d5623b510d7aa56eecf1353cfdfeba660c4b5f6e7e3670a9e63f
                                        • Instruction ID: e6819858e37f868b41d7f5ddcfdad8d404d7a466383d1fd144bdef912c314d19
                                        • Opcode Fuzzy Hash: bd79883afe62d5623b510d7aa56eecf1353cfdfeba660c4b5f6e7e3670a9e63f
                                        • Instruction Fuzzy Hash: 5B91C16271AB86C5DA60EB06E5447AAB368FB84BC0FC25132DE4D57B95EF3CD042CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreememcpy
                                        • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                        • API String ID: 1248052217-2064316097
                                        • Opcode ID: e7f5d127d64b5043630bf7317d16c6b8a388210296d33f11f9d51393ab09aec5
                                        • Instruction ID: f42621069d31e638070f07ca1b41502e9fed0ddf06c182a948433f5e636fbd22
                                        • Opcode Fuzzy Hash: e7f5d127d64b5043630bf7317d16c6b8a388210296d33f11f9d51393ab09aec5
                                        • Instruction Fuzzy Hash: 2641932261D6C6C5EB60BF2598047B9A390BF49B94FC58231DE5D8B385EE3CD4478B20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: FALSE$TRUE
                                        • API String ID: 1865132094-1412513891
                                        • Opcode ID: d19699eb54f18728884f9ffff41851f69321f2634b7708db4c0551ad8526aaa1
                                        • Instruction ID: 9dadf26eef1ead71e6468d8b48bca40bf1838763eabc84f76e9e704c49708d5e
                                        • Opcode Fuzzy Hash: d19699eb54f18728884f9ffff41851f69321f2634b7708db4c0551ad8526aaa1
                                        • Instruction Fuzzy Hash: FF41E4A2B2D356C4FF55BA659400378A7E1AF45794F864732CEAD063C8DE2FA4438E20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64$ErrorLast
                                        • String ID: TFTP response timeout
                                        • API String ID: 3339832089-3820788777
                                        • Opcode ID: ebf5c75c2f0a9778c56ed6f20c206e0eded9456d7be349dc799ff6862ca9f802
                                        • Instruction ID: 407c8f238a82534af3e1f62d116995734b34dd5daf2cbec88f2a237c2be75d24
                                        • Opcode Fuzzy Hash: ebf5c75c2f0a9778c56ed6f20c206e0eded9456d7be349dc799ff6862ca9f802
                                        • Instruction Fuzzy Hash: FD41923262CA41C5EB60BF25D4452BDA755AB85BA4F804331DE1D4B7C9DF3CE4068B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: TRUE
                                        • API String ID: 573759493-3412697401
                                        • Opcode ID: cd1d454baa3c7e85fe6ebb869d3b0c02f32a0f4473427cd0b0919bfb39ce13d5
                                        • Instruction ID: 790f039c007df76362874f159419f5692751e4e91c675b6dc8cbdceea106a0ed
                                        • Opcode Fuzzy Hash: cd1d454baa3c7e85fe6ebb869d3b0c02f32a0f4473427cd0b0919bfb39ce13d5
                                        • Instruction Fuzzy Hash: 38311A61A1D592C9FB21FB258544378AFD1EF41B94F894731CAAA536C9CE2ED143CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fwrite
                                        • String ID: ...$...
                                        • API String ID: 3559309478-2253869979
                                        • Opcode ID: 0c08b42f7022a8eadbaf655e4f3f22b107ec018da9aba7661bea463086124471
                                        • Instruction ID: c03a4cea050fd86ab758e0b9f574f123964b7876a012101334288e56461f7141
                                        • Opcode Fuzzy Hash: 0c08b42f7022a8eadbaf655e4f3f22b107ec018da9aba7661bea463086124471
                                        • Instruction Fuzzy Hash: 1931A221A2CA81D2EB64FB11D8447B9A7A1FB84B94FC14231DA5E037D4CF3DE15ACB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: acceptgetsocknameioctlsocket
                                        • String ID: Connection accepted from server$Error accept()ing server connect
                                        • API String ID: 36920154-2331703088
                                        • Opcode ID: d90d364c0727ca94725afdc3fe68e90bdb76af083fb7b2c4cd916c2428674588
                                        • Instruction ID: 261979d76b144a443855562f405d3fdf96d8d6041d05c65fdeda3733dbeca625
                                        • Opcode Fuzzy Hash: d90d364c0727ca94725afdc3fe68e90bdb76af083fb7b2c4cd916c2428674588
                                        • Instruction Fuzzy Hash: CB31722162C681C2EA54FB22A9043AAE360FB88BA4FC44331DA6D077C5DF3DE1068B10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s$LIST "%s" *
                                        • API String ID: 0-1744359683
                                        • Opcode ID: 01fd01fb85fd1cdc814dc4af1efcb68caa986b23848b21fa259ade442a81e157
                                        • Instruction ID: 645da89b9b7c7cd0722b8d66bf62c0d678794c6cc2a048924f9629c62b5bc0da
                                        • Opcode Fuzzy Hash: 01fd01fb85fd1cdc814dc4af1efcb68caa986b23848b21fa259ade442a81e157
                                        • Instruction Fuzzy Hash: DD116D22E2CA82C1EA54FB65E4401BCA760FB88FC4F888632DE0E07755DF2CE5478B50
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D622C5), ref: 00007FF747D61EE8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D622C5), ref: 00007FF747D61EF1
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D622C5), ref: 00007FF747D61F6A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D622C5), ref: 00007FF747D61F7B
                                        • memcpy.VCRUNTIME140(?,?,00000000,00007FF747D622C5), ref: 00007FF747D61FA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID:
                                        • API String ID: 3401966785-0
                                        • Opcode ID: 64d3edcc426b7471abd7909f8ebfd8dc1fd57c216fe30615d90dc291891f8035
                                        • Instruction ID: ab7e09ad25fe26e7083dd3ea78b51f1700f220ff930b453ccade073a86be0e67
                                        • Opcode Fuzzy Hash: 64d3edcc426b7471abd7909f8ebfd8dc1fd57c216fe30615d90dc291891f8035
                                        • Instruction Fuzzy Hash: 77313A22A1CB45C1EB50BB52E5402A9A3A0BB49BD4F948731EF6D477D9DF3DD4428B10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$free
                                        • String ID: chunked
                                        • API String ID: 171065143-1066005980
                                        • Opcode ID: 15733853558b65977956e4c6309eab796c1738a7f043fd983d1f8e97191936c3
                                        • Instruction ID: ba4886185de91e3c66374c29b0a8d5b812d3ca28b2c1d67dd2a8300c4f256dd7
                                        • Opcode Fuzzy Hash: 15733853558b65977956e4c6309eab796c1738a7f043fd983d1f8e97191936c3
                                        • Instruction Fuzzy Hash: EF51B921A2CA92C6EBA5BF119900779E796AF05BC4FC64131DE5C47785DF2CE4438B30
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 1294909896-910067264
                                        • Opcode ID: db9eeee5f1351480a12aa5f2da278e349761a42a46aad56eca97a60ea7c9fc7e
                                        • Instruction ID: 407e507aaa43a5ad3bc64b40a818ad21c4e4b6ed8f95092ec07a321d6a9395ca
                                        • Opcode Fuzzy Hash: db9eeee5f1351480a12aa5f2da278e349761a42a46aad56eca97a60ea7c9fc7e
                                        • Instruction Fuzzy Hash: 855126A2A2C696C4EB21BB24E504279FBA5EF41790FC54232CA9D06B44DF3CD483CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                        • API String ID: 1294909896-2632828617
                                        • Opcode ID: beebfd99418d3e134666a3b667360a78397b1afae66b590f3b48bc445c02abfd
                                        • Instruction ID: 05d554a215866d0ef28ea59ad75ea9290efa1a3f3e879aebc2cd5124eca9afc1
                                        • Opcode Fuzzy Hash: beebfd99418d3e134666a3b667360a78397b1afae66b590f3b48bc445c02abfd
                                        • Instruction Fuzzy Hash: 1F41B1A1A2C692C5EA64BB15A5042B9F7A4FB41B90FC64231CADD07758CF3CE547CB20
                                        APIs
                                        • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF747D3D1A8), ref: 00007FF747D3D66E
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF747D3D1A8), ref: 00007FF747D3D69C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF747D3D1A8), ref: 00007FF747D3D705
                                          • Part of subcall function 00007FF747D8FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF747D343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D8FB32
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D3D712
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                        • String ID:
                                        • API String ID: 2942768764-0
                                        • Opcode ID: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction ID: ad8835c145be403899960e4baf26a41d9b804c65d9543cb852d98219ce05caf6
                                        • Opcode Fuzzy Hash: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction Fuzzy Hash: 86419062729A85C6EA14FF25D14427DA351BB44BA4F948731CA7E477C4DF2CE092CB10
                                        APIs
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D3F13F
                                          • Part of subcall function 00007FF747D8FB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF747D343FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF747D31B59), ref: 00007FF747D8FB32
                                        • memcpy.VCRUNTIME140 ref: 00007FF747D3F12C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF747D3F1AD
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF747D3F1BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID:
                                        • API String ID: 1155477157-0
                                        • Opcode ID: cd72aa6c121de9375501edb4d1974f7368297c5730c63817e7cbdc5a7d023e1e
                                        • Instruction ID: 6d356eef8435beaa978e00374ce8458f6bc5a436e66504f3e52012c55c7583cb
                                        • Opcode Fuzzy Hash: cd72aa6c121de9375501edb4d1974f7368297c5730c63817e7cbdc5a7d023e1e
                                        • Instruction Fuzzy Hash: 9B41A262729A8AC2EE08FB25E5042ACA751EB05BE0F944731DA6D077D4CF3CE492C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction ID: 251715f624a9e01992262ad1aa6468e846a9d044f140c4b692433fa201fe6aa4
                                        • Opcode Fuzzy Hash: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction Fuzzy Hash: 7131C722A2DB41C1EA20FB12F54527AA250FB04BE0F944B75DEAD47786DE3CE092C790
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF747D6D2EB), ref: 00007FF747D8B19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: 9458df8b602da903cdb5424232a6394ac26afb359fa881c3766516657283d285
                                        • Instruction ID: ad08c3c23bea1ddecc56b1abe3d6dbfbb29b106a3a9028e880300b8c2a601486
                                        • Opcode Fuzzy Hash: 9458df8b602da903cdb5424232a6394ac26afb359fa881c3766516657283d285
                                        • Instruction Fuzzy Hash: 6A415232628B85C2EA50AF15B4401AAB7A4FB84BD0F950635DF9E07BA5DF38E496C710
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF747D6EB30,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF747D8B5D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D8B65C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: d2a8b9a4341a91b2540e73c8fc20f79953a9bdad88463489212d982f9f51326b
                                        • Instruction ID: 1cae5a1c6eb7be611ab3a7d2293d9dfb4c3c61517991cacc6fca4f4f5776a212
                                        • Opcode Fuzzy Hash: d2a8b9a4341a91b2540e73c8fc20f79953a9bdad88463489212d982f9f51326b
                                        • Instruction Fuzzy Hash: 9541523261CB45C2E651BB26B5401AAF3A0FB45B90F954635DF9E07BA5DF3CE092CB10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: 68a1c3225f446567fab754bf297663ac6e7eeb9fa881a6b95c3919f4eb555c52
                                        • Instruction ID: 4a9f2067cc5cc5433c08407e14048f55db0387508dafa12a0b93ca5e8c789246
                                        • Opcode Fuzzy Hash: 68a1c3225f446567fab754bf297663ac6e7eeb9fa881a6b95c3919f4eb555c52
                                        • Instruction Fuzzy Hash: 6631837272D646C6EE24BF25A5042ACE351AB44BE4FD84731EA6D077D5DE7CE0838710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                        • API String ID: 1294909896-918878739
                                        • Opcode ID: 7f4687f8412e3f34b693d9f25119206f39845ea297186b2d0ffc6b4486a475f8
                                        • Instruction ID: 384e05f5437b844026c850700a8c762773d4453237845af57c7a91f1df64f6fe
                                        • Opcode Fuzzy Hash: 7f4687f8412e3f34b693d9f25119206f39845ea297186b2d0ffc6b4486a475f8
                                        • Instruction Fuzzy Hash: 9331E462A1DA85D8EB21AF65D5002B9A762FB85784FD94632CA9D03784CF3CE543CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 1294909896-1153420294
                                        • Opcode ID: f83450b56afee37c46f647a23c326d31c9929905e360993e1279dba9b38c8cf3
                                        • Instruction ID: 91300d3cbd70d3460d08abf4b53c86e033a4290b8e899beb4585a572c641a1fa
                                        • Opcode Fuzzy Hash: f83450b56afee37c46f647a23c326d31c9929905e360993e1279dba9b38c8cf3
                                        • Instruction Fuzzy Hash: 3331A361A2CB81D5EB64BF51D8406A9B390FB45B84FD60631CADD07249CF7CE647CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3056473165-3412697401
                                        • Opcode ID: 832afbf59ecc20a4234f36153a96e11bc8f9fb7faa3d461da38802b0e2ff7b07
                                        • Instruction ID: d9291a53dc20a8d24e7c51af1b94c0eb74cf83821b52cf5e1bc64e64431d73ca
                                        • Opcode Fuzzy Hash: 832afbf59ecc20a4234f36153a96e11bc8f9fb7faa3d461da38802b0e2ff7b07
                                        • Instruction Fuzzy Hash: B821C466B2D642C4EF15BB1699043749762BF84BE4F864632CE6D077C8DE7DD0838720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: isupper$_strdupfree
                                        • String ID:
                                        • API String ID: 3359907120-0
                                        • Opcode ID: 5a40e33412ecbbb1d7606b782d11246842ca4fc635551d6b9b88eb33d9efcf03
                                        • Instruction ID: c36f6e29f4432a57037fee7fa6d585a01ad98a3ec4bdf5fea33535bb6d71ee07
                                        • Opcode Fuzzy Hash: 5a40e33412ecbbb1d7606b782d11246842ca4fc635551d6b9b88eb33d9efcf03
                                        • Instruction Fuzzy Hash: B2210651E2D592C9FB32FB208504338EFD09F52B40FCA1731C69A51689CE2EA143CB30
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D50DC9,?,?,?,?,00007FF747D5016B), ref: 00007FF747D6C878
                                        • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF747D50DC9,?,?,?,?,00007FF747D5016B), ref: 00007FF747D6C89E
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D50DC9,?,?,?,?,00007FF747D5016B), ref: 00007FF747D6C8BF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF747D50DC9,?,?,?,?,00007FF747D5016B), ref: 00007FF747D6C8D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: realloc$EnvironmentVariablefree
                                        • String ID:
                                        • API String ID: 2828309815-0
                                        • Opcode ID: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction ID: 5c016aecfbe607fca467af18b1594f6d22d9f3b72ade035c87eadf961541a913
                                        • Opcode Fuzzy Hash: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction Fuzzy Hash: 3A117321B1DB42C2EA70BB52654023AE391FB49FC0F984235DE5D53B98DE3CF4464B54
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Proxy-Connection: Keep-Alive
                                        • API String ID: 1294909896-2835282938
                                        • Opcode ID: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction ID: babbaf267bbd5558f99a2f3000a4c86a71ee04e884dca469e5bf5abf3927e862
                                        • Opcode Fuzzy Hash: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction Fuzzy Hash: 5A01C462B09A41C2FA157F95A5403A9A260AF48BE0F448330DEA9077D8DF3CE886C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$strchr
                                        • String ID:
                                        • API String ID: 1739957132-0
                                        • Opcode ID: 0dd7f80735f85da8f984343497c1d3cfee0a952a3c0d7bbcc3984797b00619ee
                                        • Instruction ID: c2ee3a5f6c8852ebbe63e623dda451a0fbfd43be480b89177a058576a6432e8a
                                        • Opcode Fuzzy Hash: 0dd7f80735f85da8f984343497c1d3cfee0a952a3c0d7bbcc3984797b00619ee
                                        • Instruction Fuzzy Hash: E7015251B2D781C2EE5ABB5A65541389290AF4CFC0F880535DEAE47B88EE1CD8478B24
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF747D6D1D3), ref: 00007FF747D6D8C2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF747D6D1D3), ref: 00007FF747D6D913
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: (){ %*]
                                        • API String ID: 3515966317-731572209
                                        • Opcode ID: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction ID: 56e53526ef15d13880c01eeff3bfad43b4c5652e26af7a0c426560967f462916
                                        • Opcode Fuzzy Hash: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction Fuzzy Hash: A431051191DA86C4FF217A157444378AB91AF56B94FD8C331DA8F033C6DA2DA907CA21
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %ld
                                        • API String ID: 1865132094-1112595699
                                        • Opcode ID: 9a0f07be874201d98365faa4423abb5b5fee152e51e2f861fb039d0b3822f29c
                                        • Instruction ID: 0d4066185eb4986c4059d1bcf210ff3b34191503b3c999360894193391e15680
                                        • Opcode Fuzzy Hash: 9a0f07be874201d98365faa4423abb5b5fee152e51e2f861fb039d0b3822f29c
                                        • Instruction Fuzzy Hash: A6316E22A1DA82C1FA79FB54D55037AA3A0AF44794F894235CE4D0B685EE2CE447CB31
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: identity
                                        • API String ID: 3515966317-1788209604
                                        • Opcode ID: 955830b352c9912bb6b1e7167117c3f4fabc45b9668959debec1ba71c805b7e9
                                        • Instruction ID: a71067927a66facb14cc0394a3d6839257ea9857dc7bffb448aefe4bf23ed73c
                                        • Opcode Fuzzy Hash: 955830b352c9912bb6b1e7167117c3f4fabc45b9668959debec1ba71c805b7e9
                                        • Instruction Fuzzy Hash: 6F319061E2DA56C2EB11BB15D940379A7A0EF55BE4FCA4331DE2D17784EE2CE4428B20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocrealloc
                                        • String ID:
                                        • API String ID: 948496778-3916222277
                                        • Opcode ID: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction ID: c27b10305b3fd90dc6d528cb6e61ea376fcc105ae6d1230eb297e48fc9264608
                                        • Opcode Fuzzy Hash: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction Fuzzy Hash: C3118E72619B81C2EB48AF26E140269B3A0FB08FD4F844735DE5E07788EF38D996C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: TRUE
                                        • API String ID: 1865132094-3412697401
                                        • Opcode ID: 9f7382e18b3041a3e93490953c45f0e4b0f4161914aac1650cb6f1c2e67001f6
                                        • Instruction ID: fdc67de00f44ea991a3a6d313c9bd2afb743999b0e756be3d14d6b82c38d004b
                                        • Opcode Fuzzy Hash: 9f7382e18b3041a3e93490953c45f0e4b0f4161914aac1650cb6f1c2e67001f6
                                        • Instruction Fuzzy Hash: 3E0192A6A1D655C4EB12BB51E900379A7B1BB44BD4FC64932CE5E06388DE7DD483CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: %s: %s
                                        • API String ID: 3985033223-1451338302
                                        • Opcode ID: ce95b56a7c92656b16259ff00a4cfcc9f4106ba29798c8b37636380f06af6113
                                        • Instruction ID: 50e60b9dd0a6eee9c50320c96292cfe5dabecd04872f23b5c0a0a9ff2c10a453
                                        • Opcode Fuzzy Hash: ce95b56a7c92656b16259ff00a4cfcc9f4106ba29798c8b37636380f06af6113
                                        • Instruction Fuzzy Hash: 7CF04F51A2C781C2EA65BB52A8007F9A750BB45BD4FC90631CE9E1735ADF2CE147CB24
                                        APIs
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46067
                                          • Part of subcall function 00007FF747D46040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D50640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF747D42471), ref: 00007FF747D46073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C546
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C556
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF747D4C564
                                        • memset.VCRUNTIME140 ref: 00007FF747D4C59F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID:
                                        • API String ID: 2717317152-0
                                        • Opcode ID: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction ID: f57950d4123a7ce233810528ee6cc7553a65f3875061d19048f212e0828c2855
                                        • Opcode Fuzzy Hash: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction Fuzzy Hash: 81210932E28B91E3E214EB22EA903A8A360F799744F519235EB9D53A55DF74F1F1C700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction ID: 5e1db5809f722267643f496ce566695913b69163fde769d197ac10a3139542a0
                                        • Opcode Fuzzy Hash: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction Fuzzy Hash: 8311E926A1DB45C2EB54BF65E59033CA3A4FF94F84F954631CA5E027A8CE3CD852CB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction ID: 0fbb2e142e9e67caa6088efb7bcd21a1189cdf9381c0abc32fa28f0c1330531c
                                        • Opcode Fuzzy Hash: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction Fuzzy Hash: 4C113A36618B80C6D750AF65E580368B3A4F784F84F984135DF8E57328CF38E8A6C760
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D8124E), ref: 00007FF747D85176
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D8124E), ref: 00007FF747D85197
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D8124E), ref: 00007FF747D851B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF747D8124E), ref: 00007FF747D851C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3374380186.00007FF747D31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF747D30000, based on PE: true
                                        • Associated: 00000000.00000002.3374304324.00007FF747D30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374435309.00007FF747D92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374511262.00007FF747DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3374575228.00007FF747DAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff747d30000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction ID: d77eebe73a752330be4057c1818f2849604a2bb48bf46f6d672701d016907b5f
                                        • Opcode Fuzzy Hash: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction Fuzzy Hash: 07119336628B45C2EB14AF66E99012CB3B9FB94F887540536CA5E43768CF38D852C7A0