Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EspPrivStoreAtt116.exe

Overview

General Information

Sample name:EspPrivStoreAtt116.exe
Analysis ID:1590902
MD5:3653a466ffb4ccb78a2898a781dea130
SHA1:7c3a5e4267dfd27585a37b590543c4d9dec73ee2
SHA256:8b09a8bf369165115ad04e9c7f7c0058b506b560ec0324657188592e66cbcd8a
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • EspPrivStoreAtt116.exe (PID: 5332 cmdline: "C:\Users\user\Desktop\EspPrivStoreAtt116.exe" MD5: 3653A466FFB4CCB78A2898A781DEA130)
    • conhost.exe (PID: 4392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1612 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6412 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3432 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6264 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3924 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5616 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2800 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4236 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3132 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5964 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1268 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 2496 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4784 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7064 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 964 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 380 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6504 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3700 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1596 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4620 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6912 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6992 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5796 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4788 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5768 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1824 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1776 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2132 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5696 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5432 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4156 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4160 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5504 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EspPrivStoreAtt116.exeVirustotal: Detection: 61%Perma Link
Source: EspPrivStoreAtt116.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.6% probability
Source: EspPrivStoreAtt116.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169A84D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF76169A84D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616B63E0 CertOpenStore,GetLastError,CertCreateCertificateChainuser,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainuser,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF7616B63E0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616BF840 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7616BF840
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616BD750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7616BD750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169CAD0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF76169CAD0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616B6D00 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF7616B6D00
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761699B40 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF761699B40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169CB30 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF76169CB30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169CB20 CryptHashData,0_2_00007FF76169CB20
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761699C10 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF761699C10
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF76167F9F0
Source: EspPrivStoreAtt116.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF7616A9410
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: EspPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761695370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF761695370
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcionattprivatestore655.exe
Source: EspPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/esphvcionattprivatestore655.exeC:
Source: EspPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: EspPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217552923.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217399075.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217552923.000001FC604C8000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC604C8000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217399075.000001FC604C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/em
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/pacez
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/UsersH
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616BD750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7616BD750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616892900_2_00007FF761689290
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616872900_2_00007FF761687290
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616885D00_2_00007FF7616885D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169A84D0_2_00007FF76169A84D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761671AA00_2_00007FF761671AA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761671E400_2_00007FF761671E40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76168FEA00_2_00007FF76168FEA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166D3100_2_00007FF76166D310
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616A53000_2_00007FF7616A5300
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616792A00_2_00007FF7616792A0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76168A1500_2_00007FF76168A150
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616931A00_2_00007FF7616931A0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616B63E00_2_00007FF7616B63E0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166956D0_2_00007FF76166956D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616985D00_2_00007FF7616985D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169A9150_2_00007FF76169A915
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169A90C0_2_00007FF76169A90C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166974B0_2_00007FF76166974B
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616BD7500_2_00007FF7616BD750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616717500_2_00007FF761671750
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616BF7D00_2_00007FF7616BF7D0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761683C400_2_00007FF761683C40
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166EC300_2_00007FF76166EC30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761695CF00_2_00007FF761695CF0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616ADB300_2_00007FF7616ADB30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166AC0D0_2_00007FF76166AC0D
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616B0E900_2_00007FF7616B0E90
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616A9E300_2_00007FF7616A9E30
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761680F100_2_00007FF761680F10
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76169CEE00_2_00007FF76169CEE0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616B1EC00_2_00007FF7616B1EC0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF76166DEA00_2_00007FF76166DEA0
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616610000_2_00007FF761661000
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF761673940 appears 49 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF76168ABB0 appears 37 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF76168AC40 appears 33 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF7616896C0 appears 46 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF761680B50 appears 70 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF761686400 appears 326 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF7616C0B6C appears 47 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF76168AD20 appears 34 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF761686280 appears 380 times
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: String function: 00007FF761689790 appears 36 times
Source: classification engineClassification label: mal56.winEXE@68/18@1/2
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761672620 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF761672620
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4392:120:WilError_03
Source: EspPrivStoreAtt116.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EspPrivStoreAtt116.exeVirustotal: Detection: 61%
Source: EspPrivStoreAtt116.exeReversingLabs: Detection: 63%
Source: EspPrivStoreAtt116.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\EspPrivStoreAtt116.exe "C:\Users\user\Desktop\EspPrivStoreAtt116.exe"
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: EspPrivStoreAtt116.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EspPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EspPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant ESP\x64\Release\EpicGames.pdb source: EspPrivStoreAtt116.exe
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EspPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761689290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF761689290
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeWindow / User API: threadDelayed 2703Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 2210Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exe TID: 1468Thread sleep time: -135150s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7616C067C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C0A18 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7616C0A18
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761689290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF761689290
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C0384 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7616C0384
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7616C067C
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C0824 SetUnhandledExceptionFilter,0_2_00007FF7616C0824
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616C0894 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7616C0894
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761695370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF761695370
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616A5300 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF7616A5300
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616ABE00 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7616ABE00
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF7616AC060 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7616AC060
Source: C:\Users\user\Desktop\EspPrivStoreAtt116.exeCode function: 0_2_00007FF761687F40 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF761687F40
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590902 Sample: EspPrivStoreAtt116.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 56 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 AI detected suspicious sample 2->43 8 EspPrivStoreAtt116.exe 1 2->8         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.1.5, 443, 49715 CLOUDFLARENETUS United States 8->35 37 127.0.0.1 unknown unknown 8->37 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 16 other processes 8->17 process6 process7 19 sc.exe 1 11->19         started        21 sc.exe 1 13->21         started        23 taskkill.exe 1 15->23         started        25 taskkill.exe 1 17->25         started        27 taskkill.exe 1 17->27         started        29 taskkill.exe 1 17->29         started        31 9 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EspPrivStoreAtt116.exe61%VirustotalBrowse
EspPrivStoreAtt116.exe63%ReversingLabsWin64.Trojan.Generic
EspPrivStoreAtt116.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe0%Avira URL Cloudsafe
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
http://167.114.85.75/esphvcionattprivatestore655.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/esphvcionattprivatestore655.exe0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeEspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcionattprivatestore655.exeC:EspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcioffbronkzatualizadoh96.exeC:EspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/esphvcionattprivatestore655.exeEspPrivStoreAtt116.exefalse
      • Avira URL Cloud: safe
      unknown
      https://keyauth.win/api/1.1/emEspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://keyauth.win/api/1.2/UsersHEspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://curl.haxx.se/docs/http-cookies.htmlEspPrivStoreAtt116.exefalse
            high
            https://curl.haxx.se/docs/http-cookies.html#EspPrivStoreAtt116.exefalse
              high
              https://keyauth.cc/panel/bronkzware/LoaderEspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217552923.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217399075.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC604CC000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217552923.000001FC604C8000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC604C8000.00000004.00000020.00020000.00000000.sdmp, EspPrivStoreAtt116.exe, 00000000.00000003.2217399075.000001FC604C8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://keyauth.win/api/1.1/pacezEspPrivStoreAtt116.exe, 00000000.00000002.4045525981.000001FC6046C000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://keyauth.win/api/1.2/EspPrivStoreAtt116.exe, 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.26.1.5
                  keyauth.winUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1590902
                  Start date and time:2025-01-14 16:55:46 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 31s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Run with higher sleep bypass
                  Number of analysed new started processes analysed:38
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:EspPrivStoreAtt116.exe
                  Detection:MAL
                  Classification:mal56.winEXE@68/18@1/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 48
                  • Number of non-executed functions: 234
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.253.72, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.1.5PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                    tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                      SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                            dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      keyauth.winSPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSSPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      http://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
                                      • 172.67.74.152
                                      tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      email.emlGet hashmaliciousunknownBrowse
                                      • 172.64.41.3
                                      http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                      • 188.114.96.3
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eSPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.26.1.5
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.1.5
                                      No context
                                      Process:C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):302
                                      Entropy (8bit):3.6129496847513636
                                      Encrypted:false
                                      SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXV/12To3G3oJXV/1WXqowvxOwVGt:H041ls/1HJ/1wcV4
                                      MD5:C7F3DB7690DFC6AF6C4758A6E97F62F8
                                      SHA1:853E06686F94A41861B9379D7C4DF2345561A93C
                                      SHA-256:3F9AECCCCC7B4411BCD809C0093342741B094C43BF546060544E078D76B8C522
                                      SHA-512:F05B260B2A5CCDD4C15EB42DA458B476CC6DFC8F1318587CE690581AF1D2FB785C98C7B8CCABAEF62DDE528BBD4D25D8AEB54241978C4D2C1CCC1DD1876D9A2D
                                      Malicious:false
                                      Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant ESP (HVCI DESLIGADO): ..[2] Iniciar Valorant ESP (HVCI HABILITADO): ....[+] Selecione a opcao:
                                      Process:C:\Windows\System32\cmd.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):44
                                      Entropy (8bit):4.003997527334849
                                      Encrypted:false
                                      SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                      MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                      SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                      SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                      SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                      Malicious:false
                                      Preview:The system cannot find the file specified...
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):6.420268214401962
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:EspPrivStoreAtt116.exe
                                      File size:510'464 bytes
                                      MD5:3653a466ffb4ccb78a2898a781dea130
                                      SHA1:7c3a5e4267dfd27585a37b590543c4d9dec73ee2
                                      SHA256:8b09a8bf369165115ad04e9c7f7c0058b506b560ec0324657188592e66cbcd8a
                                      SHA512:a0a1f67e3df1224fd57baefe57df2438993422d29f1f8965118de636eca6f5eb39c76b210e6e4a703d41df6a7ee2cf9f6e81b2b1d8d365d9d2a5fa331bdde157
                                      SSDEEP:12288:GMPtninPfug6cNLjkEWBBu2cl71MzRUMk:ntninnugrNpWBU2S71AUMk
                                      TLSH:28B47D56A7A817E9D1A7C03CC547C603E7B6B4991311DBDB43A0CA791F237E26E3A720
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x140060368
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677DDF0D [Wed Jan 8 02:12:29 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:551e5f19de2baa264d46ee5c6718793c
                                      Instruction
                                      dec eax
                                      sub esp, 28h
                                      call 00007F4AE0E62FB8h
                                      dec eax
                                      add esp, 28h
                                      jmp 00007F4AE0E62907h
                                      int3
                                      int3
                                      jmp 00007F4AE0E6326Eh
                                      int3
                                      int3
                                      int3
                                      inc eax
                                      push ebx
                                      dec eax
                                      sub esp, 20h
                                      dec eax
                                      mov ebx, ecx
                                      xor ecx, ecx
                                      call dword ptr [00001D9Bh]
                                      dec eax
                                      mov ecx, ebx
                                      call dword ptr [00001D8Ah]
                                      call dword ptr [00001DE4h]
                                      dec eax
                                      mov ecx, eax
                                      mov edx, C0000409h
                                      dec eax
                                      add esp, 20h
                                      pop ebx
                                      dec eax
                                      jmp dword ptr [00001DE0h]
                                      dec eax
                                      mov dword ptr [esp+08h], ecx
                                      dec eax
                                      sub esp, 38h
                                      mov ecx, 00000017h
                                      call dword ptr [00001DD4h]
                                      test eax, eax
                                      je 00007F4AE0E62A99h
                                      mov ecx, 00000002h
                                      int 29h
                                      dec eax
                                      lea ecx, dword ptr [00019492h]
                                      call 00007F4AE0E62C5Eh
                                      dec eax
                                      mov eax, dword ptr [esp+38h]
                                      dec eax
                                      mov dword ptr [00019579h], eax
                                      dec eax
                                      lea eax, dword ptr [esp+38h]
                                      dec eax
                                      add eax, 08h
                                      dec eax
                                      mov dword ptr [00019509h], eax
                                      dec eax
                                      mov eax, dword ptr [00019562h]
                                      dec eax
                                      mov dword ptr [000193D3h], eax
                                      dec eax
                                      mov eax, dword ptr [esp+40h]
                                      dec eax
                                      mov dword ptr [000194D7h], eax
                                      mov dword ptr [000193ADh], C0000409h
                                      mov dword ptr [000193A7h], 00000001h
                                      mov dword ptr [000000B1h], 00000000h
                                      Programming Language:
                                      • [IMP] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x710800x70.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f400x140.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x606e80x60800663f6c1b9737e67c2a6764e4ebff456eFalse0.5325529266515544data6.334586632421333IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x620000x16ec40x17000ed19f2f03e8e4c95b88fa40516677ba6False0.3795219089673913data5.599387100824537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x790000xe080x40052aed000567e6839374d043cd5841bf5False0.2138671875data2.4461568678801138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x7a0000x405c0x42001f44589aeb34f25d94952a45d7939e4fFalse0.47407670454545453data5.699721075250355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x800000x4ec0x60043a6897ca7133ec62c7e8be294ec97b7False0.5162760416666666data4.831811206446416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                      USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                      ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                      SHELL32.dllShellExecuteA
                                      MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                      urlmon.dllURLDownloadToFileA
                                      Normaliz.dllIdnToAscii
                                      WLDAP32.dll
                                      CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                      WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                      VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                      VCRUNTIME140_1.dll__CxxFrameHandler4
                                      api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                      api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                      api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                      api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                      api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                      api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                      api-ms-win-crt-utility-l1-1-0.dllqsort
                                      api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                      api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:56:50.144165039 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.144268036 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.144362926 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.175689936 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.175735950 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.653250933 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.653415918 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.654680014 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.654690981 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.654931068 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.657737017 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.703330994 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.826159000 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.826242924 CET44349715104.26.1.5192.168.2.6
                                      Jan 14, 2025 16:56:50.826385975 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.841675043 CET49715443192.168.2.6104.26.1.5
                                      Jan 14, 2025 16:56:50.841718912 CET44349715104.26.1.5192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:56:50.114689112 CET5157053192.168.2.61.1.1.1
                                      Jan 14, 2025 16:56:50.121952057 CET53515701.1.1.1192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:56:50.114689112 CET192.168.2.61.1.1.10xee40Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:56:50.121952057 CET1.1.1.1192.168.2.60xee40No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:56:50.121952057 CET1.1.1.1192.168.2.60xee40No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:56:50.121952057 CET1.1.1.1192.168.2.60xee40No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                      • keyauth.win
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.649715104.26.1.54435332C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-14 15:56:50 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                      Host: keyauth.win
                                      Accept: */*
                                      Content-Length: 74
                                      Content-Type: application/x-www-form-urlencoded
                                      2025-01-14 15:56:50 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                      Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                      2025-01-14 15:56:50 UTC1322INHTTP/1.1 200 OK
                                      Date: Tue, 14 Jan 2025 15:56:50 GMT
                                      Content-Type: application/json; charset=UTF-8
                                      Content-Length: 475
                                      Connection: close
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bRIKiYnFrxRqhn8RnPPIGho621iAtCxT3YN5yqPtB0zsTrx60wSfdTJPElB0Ix2mWiSk9ymM1OZ%2FKaTsQ%2BY%2FxL2d9QBxRNz2KfmEBwuNEwkNNDbPMInDrio3fmSa"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Acknowledge: Credit to VaultCord.com
                                      X-Powered-By: VaultCord.com
                                      content-security-policy: upgrade-insecure-requests
                                      permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                      referrer-policy: strict-origin-when-cross-origin
                                      strict-transport-security: max-age=31536000; includeSubDomains
                                      x-content-security-policy: img-src *; media-src * data:;
                                      x-content-type-options: nosniff
                                      x-frame-options: DENY
                                      x-xss-protection: 1; mode=block
                                      Access-Control-Allow-Headers: *
                                      Access-Control-Allow-Methods: *
                                      Access-Control-Allow-Origin: *
                                      Server: cloudflare
                                      CF-RAY: 901ed180fa0a728d-EWR
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1988&min_rtt=1979&rtt_var=760&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2344&recv_bytes=862&delivery_rate=1422308&cwnd=234&unsent_bytes=0&cid=795d77640feb7203&ts=189&x=0"
                                      2025-01-14 15:56:50 UTC47INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69 7a 65
                                      Data Ascii: {"success":true,"code":68,"message":"Initialize
                                      2025-01-14 15:56:50 UTC428INData Raw: 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 38 38 66 33 31 34 34 32 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73 74 6f 6d 65
                                      Data Ascii: d","sessionid":"88f31442","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","custome


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Users\user\Desktop\EspPrivStoreAtt116.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\EspPrivStoreAtt116.exe"
                                      Imagebase:0x7ff761660000
                                      File size:510'464 bytes
                                      MD5 hash:3653A466FFB4CCB78A2898A781DEA130
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:1
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:3
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:9
                                      Start time:10:56:46
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:12
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:13
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:10:56:47
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:10:56:48
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:10:56:49
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff606eb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:10:56:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:10:56:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:10:56:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:10:56:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff677fe0000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:10:56:50
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6a5ac0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:22.8%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:100
                                        execution_graph 47332 7ff761699770 47333 7ff761699785 47332->47333 47334 7ff761680ce0 47332->47334 47337 7ff7616997c0 47334->47337 47338 7ff76169980c 47337->47338 47360 7ff761686400 47338->47360 47340 7ff7616999c5 47344 7ff7616999df free 47340->47344 47348 7ff761699a02 47340->47348 47342 7ff761699a90 47346 7ff7616998dc 47342->47346 47347 7ff761699a99 free 47342->47347 47343 7ff761699a57 free 47343->47342 47344->47348 47345 7ff7616998b4 47373 7ff761672620 22 API calls 47345->47373 47375 7ff7616bff10 47346->47375 47347->47346 47350 7ff761699a35 47348->47350 47353 7ff761699a2c free 47348->47353 47350->47342 47350->47343 47351 7ff7616998c5 47374 7ff761686280 19 API calls 47351->47374 47353->47350 47356 7ff7616998d7 47356->47340 47356->47346 47370 7ff761686b40 47356->47370 47358 7ff761699984 47358->47340 47359 7ff761686400 15 API calls 47358->47359 47359->47340 47361 7ff761686409 47360->47361 47362 7ff76168655e 47360->47362 47369 7ff7616864d9 47361->47369 47384 7ff761689890 13 API calls 47361->47384 47362->47340 47362->47345 47362->47356 47364 7ff7616bff10 8 API calls 47364->47362 47365 7ff76168645c 47366 7ff7616864c1 47365->47366 47385 7ff761689790 47365->47385 47367 7ff76168650e fwrite fwrite 47366->47367 47366->47369 47367->47369 47369->47364 47389 7ff7616867e0 47370->47389 47373->47351 47374->47356 47376 7ff7616bff19 47375->47376 47377 7ff761680cfc 47376->47377 47378 7ff7616c03b8 IsProcessorFeaturePresent 47376->47378 47379 7ff7616c03d0 47378->47379 47433 7ff7616c05ac RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47379->47433 47381 7ff7616c03e3 47434 7ff7616c0384 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47381->47434 47384->47365 47388 7ff76168a150 13 API calls 47385->47388 47387 7ff7616897c3 47387->47366 47388->47387 47390 7ff7616868e7 send 47389->47390 47391 7ff76168684f 47389->47391 47392 7ff761686905 WSAGetLastError 47390->47392 47393 7ff761686914 47390->47393 47391->47390 47407 7ff7616968f0 47391->47407 47392->47393 47394 7ff761686920 47392->47394 47397 7ff7616bff10 8 API calls 47393->47397 47431 7ff761672e10 27 API calls 47394->47431 47400 7ff761686967 47397->47400 47398 7ff761686932 47432 7ff761686280 19 API calls 47398->47432 47400->47358 47402 7ff761686944 47402->47393 47403 7ff76168688c 47404 7ff761686894 malloc 47403->47404 47405 7ff7616868c0 recv 47403->47405 47404->47405 47406 7ff7616868dd 47404->47406 47405->47390 47405->47406 47406->47390 47408 7ff761696937 47407->47408 47410 7ff76169696b 47407->47410 47409 7ff761696941 47408->47409 47408->47410 47412 7ff761696948 WSASetLastError 47409->47412 47413 7ff76169695b Sleep 47409->47413 47430 7ff761696964 47409->47430 47411 7ff761696ae3 select 47410->47411 47418 7ff761696ab5 47410->47418 47416 7ff761696aba 47411->47416 47412->47430 47413->47430 47415 7ff7616bff10 8 API calls 47417 7ff761686883 47415->47417 47421 7ff761696bac 47416->47421 47422 7ff761696b82 __WSAFDIsSet __WSAFDIsSet 47416->47422 47416->47430 47417->47390 47417->47403 47418->47416 47419 7ff761696ac3 WSASetLastError 47418->47419 47420 7ff761696ad6 Sleep 47418->47420 47419->47416 47420->47416 47423 7ff761696bb4 __WSAFDIsSet 47421->47423 47424 7ff761696bdb 47421->47424 47422->47421 47425 7ff761696bc7 47423->47425 47426 7ff761696bca __WSAFDIsSet 47423->47426 47427 7ff761696be3 __WSAFDIsSet 47424->47427 47424->47430 47425->47426 47426->47424 47428 7ff761696bf6 47427->47428 47429 7ff761696bf9 __WSAFDIsSet 47427->47429 47428->47429 47429->47430 47430->47415 47431->47398 47432->47402 47433->47381 47435 7ff761699af0 47438 7ff7616b2d90 47435->47438 47439 7ff761699af9 47438->47439 47440 7ff7616b2d9e 47438->47440 47446 7ff761689110 47440->47446 47444 7ff7616b2dca 47444->47439 47445 7ff7616b2dd6 GetProcAddressForCaller 47444->47445 47445->47439 47447 7ff76168913d 47446->47447 47448 7ff7616891ef VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47447->47448 47449 7ff761689155 47447->47449 47450 7ff761689232 VerSetConditionMask 47448->47450 47451 7ff761689244 VerifyVersionInfoA 47448->47451 47452 7ff7616bff10 8 API calls 47449->47452 47450->47451 47451->47449 47453 7ff76168927b 47452->47453 47454 7ff761688f70 GetModuleHandleA 47453->47454 47455 7ff761688f92 47454->47455 47456 7ff761688f9a GetProcAddress strpbrk 47454->47456 47455->47444 47457 7ff761688fc7 47456->47457 47458 7ff761688ffe 47456->47458 47459 7ff761688fcf 47457->47459 47460 7ff761688fe8 LoadLibraryA 47457->47460 47461 7ff761689003 GetProcAddress 47458->47461 47462 7ff761689036 GetSystemDirectoryA 47458->47462 47459->47444 47460->47444 47461->47462 47465 7ff761689018 LoadLibraryExA 47461->47465 47463 7ff761689050 malloc 47462->47463 47464 7ff7616890f8 47462->47464 47467 7ff7616890ea free 47463->47467 47468 7ff76168907d GetSystemDirectoryA 47463->47468 47464->47444 47465->47444 47467->47464 47468->47467 47469 7ff76168908d 47468->47469 47470 7ff7616890e1 LoadLibraryA 47469->47470 47471 7ff7616890d6 47469->47471 47470->47471 47471->47467 47472 7ff76168f4f0 47473 7ff76168f53e 47472->47473 47506 7ff76168f860 47473->47506 47476 7ff761686400 15 API calls 47484 7ff76168f577 47476->47484 47477 7ff76168f6c5 47479 7ff7616bff10 8 API calls 47477->47479 47481 7ff76168f6f2 47479->47481 47480 7ff76168f5f6 47482 7ff76168f5fa 47480->47482 47483 7ff76168f61b 47480->47483 47535 7ff7616991c0 15 API calls 47482->47535 47486 7ff761698210 13 API calls 47483->47486 47484->47477 47521 7ff761698210 47484->47521 47488 7ff76168f62d 47486->47488 47487 7ff76168f60f 47487->47483 47489 7ff76168f70a 47487->47489 47490 7ff76168f631 47488->47490 47495 7ff76168f652 47488->47495 47492 7ff76168f714 47489->47492 47536 7ff7616991c0 15 API calls 47490->47536 47540 7ff76168ea70 27 API calls 47492->47540 47493 7ff76168f646 47493->47489 47493->47495 47495->47477 47500 7ff76168f683 47495->47500 47537 7ff7616b32c0 534 API calls 47495->47537 47496 7ff76168f736 47497 7ff76168f6be 47496->47497 47541 7ff761698f90 free free free 47496->47541 47497->47477 47500->47489 47501 7ff76168f6a0 47500->47501 47501->47477 47502 7ff76168f6c0 47501->47502 47503 7ff76168f6b9 47501->47503 47539 7ff76167b710 51 API calls 47502->47539 47538 7ff7616b34c0 314 API calls 47503->47538 47507 7ff76168f8a0 47506->47507 47508 7ff76168f8db 47507->47508 47509 7ff76168f8c6 tolower 47507->47509 47510 7ff761689790 13 API calls 47508->47510 47509->47508 47509->47509 47511 7ff76168f8f2 47510->47511 47512 7ff76168f938 tolower 47511->47512 47513 7ff76168f9d1 47511->47513 47520 7ff76168f95c 47511->47520 47515 7ff761689790 13 API calls 47512->47515 47516 7ff7616bff10 8 API calls 47513->47516 47514 7ff76168f996 _time64 47514->47513 47517 7ff76168f9b5 47514->47517 47515->47520 47518 7ff76168f55b 47516->47518 47517->47513 47519 7ff761686400 15 API calls 47517->47519 47518->47476 47518->47484 47519->47513 47520->47513 47520->47514 47522 7ff76169821c 47521->47522 47527 7ff761698246 47521->47527 47523 7ff761698221 _errno 47522->47523 47533 7ff761698237 47522->47533 47523->47480 47524 7ff761698307 47524->47480 47525 7ff7616982a0 strchr 47525->47527 47526 7ff76169845d 47529 7ff7616bff10 8 API calls 47526->47529 47527->47524 47527->47525 47528 7ff7616983b0 strchr 47530 7ff7616983d0 strchr 47528->47530 47528->47533 47531 7ff761698516 47529->47531 47530->47533 47531->47480 47532 7ff7616984c5 47532->47526 47542 7ff761698260 strchr 47532->47542 47533->47526 47533->47528 47533->47532 47535->47487 47536->47493 47537->47500 47538->47497 47539->47477 47540->47496 47541->47497 47542->47526 47543 7ff76167808b 47544 7ff76167809e 47543->47544 47545 7ff761678157 47544->47545 47548 7ff7616780a6 47544->47548 47566 7ff76168bfe0 47544->47566 47547 7ff7616780e3 47545->47547 47545->47548 47550 7ff761677610 292 API calls 47547->47550 47563 7ff761677b8b 47548->47563 47645 7ff76168be90 free 47548->47645 47550->47563 47551 7ff7616780dd 47551->47545 47551->47547 47551->47548 47586 7ff761691be0 47551->47586 47552 7ff761678db0 17 API calls 47552->47563 47554 7ff761678c32 47555 7ff761678c23 47672 7ff761686280 19 API calls 47555->47672 47560 7ff761686280 19 API calls 47561 7ff761677c2e 47560->47561 47561->47560 47561->47563 47563->47552 47563->47554 47563->47555 47563->47561 47604 7ff761687b00 47563->47604 47610 7ff761686280 19 API calls 47563->47610 47611 7ff761677610 47563->47611 47646 7ff761681d40 47563->47646 47670 7ff761676330 15 API calls 47563->47670 47671 7ff761695af0 22 API calls 47563->47671 47567 7ff76168c014 47566->47567 47568 7ff76168c02f 47566->47568 47567->47568 47673 7ff761680480 47567->47673 47569 7ff76168c071 memset 47568->47569 47572 7ff76168c035 47568->47572 47574 7ff76168c0a3 47569->47574 47571 7ff7616bff10 8 API calls 47573 7ff76168c1d5 47571->47573 47572->47571 47573->47551 47575 7ff76168c176 47574->47575 47576 7ff76168c0fe calloc 47574->47576 47686 7ff76168b390 404 API calls 47575->47686 47577 7ff76168c116 47576->47577 47578 7ff76168c12c 47576->47578 47577->47572 47580 7ff761686400 15 API calls 47578->47580 47582 7ff76168c13b 47580->47582 47581 7ff76168c186 47583 7ff761686400 15 API calls 47581->47583 47584 7ff76168c1a1 47581->47584 47582->47575 47583->47584 47584->47572 47585 7ff76168c1ab free 47584->47585 47585->47572 47587 7ff761691c0c 47586->47587 47588 7ff76168bfe0 407 API calls 47587->47588 47591 7ff761691c16 47588->47591 47589 7ff7616bff10 8 API calls 47590 7ff761691d72 47589->47590 47590->47545 47592 7ff761691d2c 47591->47592 47593 7ff761691c67 47591->47593 47596 7ff761691d46 47591->47596 47594 7ff761680480 255 API calls 47592->47594 47592->47596 47595 7ff761689790 13 API calls 47593->47595 47594->47596 47597 7ff761691cd8 calloc 47595->47597 47596->47589 47598 7ff761691cf0 47597->47598 47599 7ff761691cf7 47597->47599 47598->47596 47886 7ff761692270 47599->47886 47601 7ff761691d06 47601->47596 47896 7ff761692020 47601->47896 47605 7ff761687b4a 47604->47605 47606 7ff76168e0c0 2 API calls 47605->47606 47607 7ff761687b6a 47605->47607 47606->47607 47608 7ff7616bff10 8 API calls 47607->47608 47609 7ff761687bfe 47608->47609 47609->47563 47610->47563 47612 7ff76167764c 47611->47612 47621 7ff761677722 47611->47621 47946 7ff76167b860 47612->47946 47614 7ff761677657 free free 47616 7ff761677687 47614->47616 47615 7ff7616bff10 8 API calls 47617 7ff761677757 47615->47617 47618 7ff7616776c5 47616->47618 47974 7ff7616955d0 22 API calls 47616->47974 47617->47563 47964 7ff761678db0 47618->47964 47621->47615 47622 7ff76167778c 47968 7ff76168ee30 47622->47968 47623 7ff7616776df 47623->47621 47623->47622 47975 7ff76168f7f0 free free free free 47623->47975 47627 7ff7616777bb 47628 7ff7616777c0 free 47627->47628 47628->47628 47631 7ff7616777de 47628->47631 47629 7ff761677847 47632 7ff761689790 13 API calls 47629->47632 47630 7ff76167790b 47633 7ff761681d40 90 API calls 47630->47633 47631->47629 47631->47630 47634 7ff7616778a6 47632->47634 47635 7ff76167793d 47633->47635 47976 7ff76167f050 92 API calls 47634->47976 47979 7ff761681ec0 292 API calls 47635->47979 47638 7ff7616778c7 47639 7ff7616778cb 47638->47639 47640 7ff7616778f5 47638->47640 47642 7ff761686400 15 API calls 47639->47642 47978 7ff761681ec0 292 API calls 47640->47978 47643 7ff7616778e6 47642->47643 47977 7ff761681ec0 292 API calls 47643->47977 47645->47563 47647 7ff761681e7c 47646->47647 47649 7ff761681d62 47646->47649 47647->47563 47648 7ff761681d8f 47651 7ff76168ee30 9 API calls 47648->47651 47649->47647 47649->47648 47988 7ff76168f7f0 free free free free 47649->47988 47652 7ff761681da2 47651->47652 47985 7ff7616b1620 47652->47985 47670->47563 47671->47563 47672->47554 47674 7ff7616804a7 47673->47674 47675 7ff7616804ae 47673->47675 47723 7ff761680e60 memset 47674->47723 47677 7ff7616804d4 47675->47677 47678 7ff7616804dd 47675->47678 47682 7ff761680517 47675->47682 47727 7ff761686280 19 API calls 47677->47727 47687 7ff76169a390 47678->47687 47705 7ff761699700 47678->47705 47680 7ff761680527 47680->47682 47681 7ff761680502 47681->47682 47724 7ff7616959a0 47681->47724 47682->47568 47686->47581 47688 7ff76169a3e4 47687->47688 47693 7ff76169a3d9 47687->47693 47689 7ff761687b00 10 API calls 47688->47689 47701 7ff76169a40b 47688->47701 47691 7ff76169a3f7 47689->47691 47690 7ff76169a502 47690->47693 47851 7ff76169baf0 69 API calls 47690->47851 47694 7ff76169a4ec 47691->47694 47728 7ff76169a580 47691->47728 47692 7ff761687b00 10 API calls 47692->47701 47693->47681 47850 7ff761686280 19 API calls 47694->47850 47698 7ff76169a4e5 47698->47693 47700 7ff7616968f0 19 API calls 47700->47701 47701->47690 47701->47692 47701->47693 47701->47694 47701->47700 47702 7ff76169a4cd WSAGetLastError 47701->47702 47704 7ff76169a4bc 47701->47704 47783 7ff76169b360 47701->47783 47849 7ff761686280 19 API calls 47702->47849 47704->47693 47704->47694 47706 7ff76169a390 47705->47706 47707 7ff761687b00 10 API calls 47706->47707 47713 7ff76169a3d9 47706->47713 47719 7ff76169a40b 47706->47719 47709 7ff76169a3f7 47707->47709 47708 7ff76169a502 47708->47713 47882 7ff76169baf0 69 API calls 47708->47882 47711 7ff76169a4ec 47709->47711 47714 7ff76169a580 74 API calls 47709->47714 47710 7ff761687b00 10 API calls 47710->47719 47881 7ff761686280 19 API calls 47711->47881 47713->47681 47714->47719 47716 7ff76169a4e5 47716->47713 47717 7ff76169b360 254 API calls 47717->47719 47718 7ff7616968f0 19 API calls 47718->47719 47719->47708 47719->47710 47719->47711 47719->47713 47719->47717 47719->47718 47720 7ff76169a4cd WSAGetLastError 47719->47720 47722 7ff76169a4bc 47719->47722 47880 7ff761686280 19 API calls 47720->47880 47722->47711 47722->47713 47723->47675 47883 7ff76168e0c0 47724->47883 47726 7ff7616959ba 47726->47682 47727->47680 47729 7ff76169a5f2 47728->47729 47730 7ff761689110 14 API calls 47729->47730 47731 7ff76169a62e 47730->47731 47732 7ff76169a641 47731->47732 47733 7ff761686400 15 API calls 47731->47733 47734 7ff76169a64a GetModuleHandleA GetProcAddress 47732->47734 47737 7ff76169a688 47732->47737 47733->47732 47735 7ff76169a66c 47734->47735 47734->47737 47736 7ff761689110 14 API calls 47735->47736 47738 7ff76169a680 47736->47738 47739 7ff761689110 14 API calls 47737->47739 47744 7ff76169a6e5 47737->47744 47738->47737 47740 7ff76169a6e1 47739->47740 47741 7ff76169a6f2 47740->47741 47740->47744 47852 7ff761686280 19 API calls 47741->47852 47743 7ff76169b017 47745 7ff761698210 13 API calls 47743->47745 47744->47743 47747 7ff76169a7a8 47744->47747 47748 7ff76169b02c 47745->47748 47746 7ff7616bff10 8 API calls 47750 7ff76169b31c 47746->47750 47853 7ff761686280 19 API calls 47747->47853 47749 7ff76169b03f 47748->47749 47752 7ff761698210 13 API calls 47748->47752 47753 7ff761686400 15 API calls 47749->47753 47755 7ff76169b052 47749->47755 47750->47701 47752->47749 47753->47755 47756 7ff761686400 15 API calls 47755->47756 47759 7ff76169b09b 47755->47759 47756->47759 47757 7ff76169b0fd calloc 47760 7ff76169b170 47757->47760 47761 7ff76169b157 47757->47761 47758 7ff76169b166 47758->47746 47759->47757 47760->47758 47763 7ff76169b1d9 free 47760->47763 47764 7ff76169b27c 47760->47764 47854 7ff761686280 19 API calls 47761->47854 47765 7ff76169b256 47763->47765 47766 7ff76169b20a 47763->47766 47767 7ff761686b40 48 API calls 47764->47767 47859 7ff761672620 22 API calls 47765->47859 47770 7ff76169b230 47766->47770 47771 7ff76169b212 47766->47771 47768 7ff76169b29d 47767->47768 47768->47758 47779 7ff76169b2f9 47768->47779 47857 7ff761672620 22 API calls 47770->47857 47855 7ff761672620 22 API calls 47771->47855 47774 7ff76169b260 47860 7ff761686280 19 API calls 47774->47860 47775 7ff76169b219 47856 7ff761686280 19 API calls 47775->47856 47776 7ff76169b23a 47858 7ff761686280 19 API calls 47776->47858 47861 7ff761686280 19 API calls 47779->47861 47781 7ff76169a701 47781->47758 47785 7ff76169b3d0 47783->47785 47784 7ff76169bacf 47785->47784 47786 7ff76169b472 47785->47786 47787 7ff76169b432 malloc 47785->47787 47788 7ff76169b4c3 47786->47788 47789 7ff76169b478 malloc 47786->47789 47787->47784 47787->47786 47790 7ff76169b4d6 realloc 47788->47790 47791 7ff76169b530 47788->47791 47789->47784 47789->47788 47790->47791 47792 7ff76169b4f2 47790->47792 47795 7ff76169b575 47791->47795 47862 7ff761686600 recv 47791->47862 47865 7ff761686280 19 API calls 47792->47865 47796 7ff76169b5ba malloc 47795->47796 47800 7ff76169b7ca 47795->47800 47805 7ff76169b501 47795->47805 47796->47784 47797 7ff76169b657 memcpy 47796->47797 47798 7ff76169b677 free 47797->47798 47797->47805 47798->47805 47806 7ff76169b6e9 47798->47806 47799 7ff7616bff10 8 API calls 47801 7ff76169b51d 47799->47801 47866 7ff761686280 19 API calls 47800->47866 47801->47701 47804 7ff76169b7e5 47804->47805 47805->47799 47807 7ff76169ba5c 47806->47807 47809 7ff76169b80d 47806->47809 47815 7ff76169b708 47806->47815 47807->47805 47808 7ff76169ba6a 47807->47808 47878 7ff761672620 22 API calls 47808->47878 47812 7ff76169b854 47809->47812 47813 7ff76169b816 47809->47813 47811 7ff76169ba7f 47879 7ff761686280 19 API calls 47811->47879 47869 7ff761672620 22 API calls 47812->47869 47813->47808 47817 7ff76169b823 47813->47817 47819 7ff76169b774 47815->47819 47821 7ff761686b40 48 API calls 47815->47821 47825 7ff76169b882 47815->47825 47867 7ff761672620 22 API calls 47817->47867 47826 7ff76169b7a0 memcpy 47819->47826 47829 7ff76169b8a8 47819->47829 47820 7ff76169b86b 47870 7ff761686280 19 API calls 47820->47870 47821->47815 47822 7ff76169b838 47868 7ff761686280 19 API calls 47822->47868 47871 7ff761686280 19 API calls 47825->47871 47826->47800 47826->47829 47828 7ff76169ba30 47828->47805 47830 7ff76169ba4b 47828->47830 47829->47805 47829->47828 47832 7ff76169ba03 47829->47832 47834 7ff76169b959 47829->47834 47877 7ff7616b63e0 91 API calls 47830->47877 47875 7ff761672620 22 API calls 47832->47875 47836 7ff76169b9cb 47834->47836 47840 7ff76169b967 memset 47834->47840 47835 7ff76169ba17 47876 7ff761686280 19 API calls 47835->47876 47838 7ff76169b9e0 47836->47838 47839 7ff76169b9da CertFreeCertificateContext 47836->47839 47838->47828 47842 7ff76169b9e4 47838->47842 47839->47838 47843 7ff76169b98c 47840->47843 47841 7ff76169ba29 47841->47836 47874 7ff761686280 19 API calls 47842->47874 47843->47836 47845 7ff76169b99c 47843->47845 47848 7ff76169b9b6 47843->47848 47845->47848 47872 7ff76167f9f0 255 API calls 47845->47872 47848->47836 47873 7ff761686280 19 API calls 47848->47873 47849->47698 47850->47698 47851->47693 47852->47781 47853->47781 47854->47758 47855->47775 47856->47781 47857->47776 47858->47781 47859->47774 47860->47781 47861->47758 47863 7ff76168661b WSAGetLastError 47862->47863 47864 7ff761686642 47862->47864 47863->47795 47864->47795 47865->47805 47866->47804 47867->47822 47868->47804 47869->47820 47870->47804 47871->47804 47872->47848 47873->47836 47874->47804 47875->47835 47876->47841 47877->47804 47878->47811 47879->47804 47880->47716 47881->47716 47882->47713 47884 7ff76168e0d2 QueryPerformanceCounter 47883->47884 47885 7ff76168e10d GetTickCount 47883->47885 47884->47726 47885->47726 47916 7ff761689800 15 API calls 47886->47916 47888 7ff761692299 47889 7ff7616922a1 47888->47889 47890 7ff7616922da 47888->47890 47917 7ff761691eb0 7 API calls 47889->47917 47891 7ff7616922f9 47890->47891 47893 7ff7616922e7 free free 47890->47893 47891->47601 47893->47891 47895 7ff7616922c5 free 47895->47601 47897 7ff761692082 47896->47897 47898 7ff7616920ea 47897->47898 47899 7ff761692094 47897->47899 47919 7ff761686ad0 47898->47919 47918 7ff76168c990 malloc 47899->47918 47902 7ff7616920a9 47904 7ff7616920cf memcpy 47902->47904 47905 7ff7616920b0 47902->47905 47904->47898 47906 7ff7616920b5 free free 47905->47906 47907 7ff7616920c7 47905->47907 47906->47907 47908 7ff761691d28 47907->47908 47908->47592 47908->47596 47909 7ff761692239 free free 47909->47908 47910 7ff76169214c 47922 7ff7616861c0 fwrite fwrite 47910->47922 47912 7ff76169217e 47912->47908 47912->47909 47913 7ff76169215d 47914 7ff761692176 47913->47914 47923 7ff7616861c0 fwrite fwrite 47913->47923 47914->47912 47916->47888 47917->47895 47918->47902 47924 7ff76169c5a0 47919->47924 47922->47913 47923->47914 47925 7ff76169c5f2 47924->47925 47926 7ff76169c619 malloc 47924->47926 47925->47926 47929 7ff76169c60c 47925->47929 47927 7ff76169c659 47926->47927 47926->47929 47928 7ff76169c679 memcpy 47927->47928 47938 7ff76169c6fc 47928->47938 47930 7ff7616bff10 8 API calls 47929->47930 47931 7ff761686b00 47930->47931 47931->47910 47931->47912 47932 7ff76169c809 free 47932->47929 47933 7ff761687b00 10 API calls 47933->47938 47934 7ff76169c7d1 47945 7ff761686280 19 API calls 47934->47945 47936 7ff7616968f0 19 API calls 47936->47938 47937 7ff76169c7e3 47937->47932 47938->47932 47938->47933 47938->47934 47938->47936 47939 7ff76169c7ab WSAGetLastError 47938->47939 47942 7ff761686b40 48 API calls 47938->47942 47943 7ff76169c79d 47938->47943 47944 7ff761686280 19 API calls 47939->47944 47941 7ff76169c7c3 47941->47943 47942->47938 47943->47932 47944->47941 47945->47937 47947 7ff76167b887 47946->47947 47948 7ff76167b875 47946->47948 47950 7ff76167b998 EnterCriticalSection LeaveCriticalSection 47947->47950 47951 7ff76167ba24 free 47947->47951 47948->47947 47949 7ff76167b87b 47948->47949 47980 7ff7616996b0 WaitForSingleObjectEx CloseHandle 47949->47980 47953 7ff76167b9db 47950->47953 47954 7ff76167b9d1 CloseHandle 47950->47954 47951->47614 47957 7ff76167b9e9 47953->47957 47958 7ff76167b9e1 47953->47958 47956 7ff76167b9fc 47954->47956 47955 7ff76167b880 47955->47947 47961 7ff76167ba11 closesocket 47956->47961 47983 7ff761676410 free 47956->47983 47982 7ff76167ba40 7 API calls 47957->47982 47981 7ff7616996b0 WaitForSingleObjectEx CloseHandle 47958->47981 47961->47951 47962 7ff76167b9f2 free 47962->47956 47965 7ff761678dc7 47964->47965 47967 7ff761678e00 47964->47967 47984 7ff761676100 17 API calls 47965->47984 47967->47623 47969 7ff76168eeaa 47968->47969 47973 7ff76168ee51 47968->47973 47970 7ff7616bff10 8 API calls 47969->47970 47971 7ff76167779b free 47970->47971 47971->47627 47971->47631 47972 7ff76168ee73 _time64 47972->47969 47973->47969 47973->47972 47974->47618 47975->47622 47976->47638 47980->47955 47981->47957 47982->47962 47983->47961 47984->47967 47989 7ff7616b4ba0 8 API calls 47985->47989 47987 7ff7616b1635 47988->47648 47989->47987 47990 7ff761677d4c 47991 7ff7616959a0 2 API calls 47990->47991 47993 7ff761677d59 47991->47993 47992 7ff761677d75 47995 7ff761677d91 47992->47995 48049 7ff761676100 17 API calls 47992->48049 47993->47992 48048 7ff761676100 17 API calls 47993->48048 48017 7ff761681aa0 free free 47995->48017 47998 7ff761677da1 47999 7ff761686400 15 API calls 47998->47999 48002 7ff761677df7 47998->48002 48015 7ff761677b8b 47998->48015 48000 7ff761677deb 47999->48000 48001 7ff761678db0 17 API calls 48000->48001 48001->48002 48002->48015 48050 7ff76168be90 free 48002->48050 48004 7ff761678db0 17 API calls 48004->48015 48006 7ff761678c32 48007 7ff761678c23 48053 7ff761686280 19 API calls 48007->48053 48009 7ff761681d40 90 API calls 48009->48015 48011 7ff761687b00 10 API calls 48011->48015 48012 7ff761677c2e 48013 7ff761686280 19 API calls 48012->48013 48012->48015 48013->48012 48015->48004 48015->48006 48015->48007 48015->48009 48015->48011 48015->48012 48016 7ff761677610 292 API calls 48015->48016 48047 7ff761686280 19 API calls 48015->48047 48051 7ff761676330 15 API calls 48015->48051 48052 7ff761695af0 22 API calls 48015->48052 48016->48015 48054 7ff761681880 48017->48054 48020 7ff761681880 292 API calls 48021 7ff761681b06 memset 48020->48021 48087 7ff761683230 48021->48087 48023 7ff761681b4d 48023->47998 48025 7ff7616959a0 2 API calls 48027 7ff761681b6f 48025->48027 48026 7ff761681d40 90 API calls 48026->48023 48027->48023 48028 7ff761681b9b free 48027->48028 48029 7ff761681bc2 48027->48029 48177 7ff7616896c0 15 API calls 48028->48177 48030 7ff76168e0c0 2 API calls 48029->48030 48035 7ff761681bce 48029->48035 48032 7ff761681c10 48030->48032 48033 7ff761681c4d 48032->48033 48034 7ff761681c24 48032->48034 48037 7ff7616959a0 2 API calls 48033->48037 48178 7ff761687090 48034->48178 48035->48023 48035->48026 48039 7ff761681c5a 48037->48039 48042 7ff761681c7d 48039->48042 48043 7ff7616959a0 2 API calls 48039->48043 48040 7ff761681d07 48041 7ff76168e0c0 2 API calls 48040->48041 48041->48023 48189 7ff761687c10 48042->48189 48043->48042 48046 7ff761686400 15 API calls 48046->48040 48047->48015 48048->47992 48049->47995 48050->48015 48051->48015 48052->48015 48053->48006 48055 7ff761681a8b 48054->48055 48056 7ff76168188f 48054->48056 48055->48020 48056->48055 48219 7ff761676330 15 API calls 48056->48219 48058 7ff7616818ad 48059 7ff7616818c1 48058->48059 48220 7ff761677240 292 API calls 48058->48220 48062 7ff7616818d2 48059->48062 48221 7ff761676f30 292 API calls 48059->48221 48063 7ff7616818f6 free 48062->48063 48064 7ff761681903 48062->48064 48063->48064 48222 7ff761681ec0 292 API calls 48064->48222 48088 7ff761683275 48087->48088 48176 7ff761683299 48088->48176 48223 7ff761682a30 calloc 48088->48223 48090 7ff7616bff10 8 API calls 48092 7ff761681b35 48090->48092 48091 7ff7616832ab 48091->48176 48238 7ff761684ea0 48091->48238 48092->48023 48092->48025 48092->48035 48095 7ff7616832f4 48097 7ff761683300 _strdup 48095->48097 48098 7ff761683312 48095->48098 48096 7ff7616832e2 _strdup 48096->48095 48096->48176 48097->48098 48097->48176 48288 7ff761683c40 48098->48288 48102 7ff761689790 13 API calls 48103 7ff761683385 48102->48103 48103->48176 48347 7ff761684490 48103->48347 48104 7ff7616833d7 48105 7ff76168341c _strdup 48104->48105 48106 7ff761683432 48104->48106 48104->48176 48105->48106 48105->48176 48107 7ff76168343c _strdup 48106->48107 48108 7ff761683455 48106->48108 48107->48108 48107->48176 48363 7ff761684900 48108->48363 48113 7ff7616834a2 48115 7ff7616834c4 48113->48115 48116 7ff761681fd0 38 API calls 48113->48116 48113->48176 48114 7ff761681fd0 38 API calls 48114->48113 48117 7ff761681fd0 38 API calls 48115->48117 48118 7ff7616834e6 48115->48118 48115->48176 48116->48115 48117->48118 48119 7ff76168367f 48118->48119 48122 7ff7616835e4 48118->48122 48118->48176 48385 7ff76167f7b0 48119->48385 48121 7ff76168381a 48123 7ff76167f7b0 8 API calls 48121->48123 48121->48176 48124 7ff761683604 48122->48124 48125 7ff76168366f 48122->48125 48126 7ff761683831 48123->48126 48465 7ff76167e6f0 17 API calls 48124->48465 48127 7ff7616820a0 2 API calls 48125->48127 48126->48176 48409 7ff761685360 48126->48409 48127->48176 48130 7ff76168361a 48132 7ff761685dd0 17 API calls 48130->48132 48130->48176 48137 7ff76168362c 48132->48137 48133 7ff761683924 48174 7ff7616839d1 48133->48174 48469 7ff76167ec90 13 API calls 48133->48469 48134 7ff761683632 48134->48176 48136 7ff761683889 48136->48133 48138 7ff761683891 48136->48138 48137->48134 48466 7ff76168d2b0 17 API calls 48137->48466 48468 7ff761685a80 34 API calls 48138->48468 48139 7ff761686400 15 API calls 48143 7ff7616839e0 48139->48143 48471 7ff761682ec0 44 API calls 48143->48471 48144 7ff7616838a1 free free 48146 7ff7616838c8 48144->48146 48149 7ff761686400 15 API calls 48146->48149 48147 7ff761683976 48154 7ff7616839bb 48147->48154 48470 7ff76167ea40 QueryPerformanceCounter GetTickCount 48147->48470 48152 7ff76168391f 48149->48152 48150 7ff761683a5c 48473 7ff76167e6f0 17 API calls 48150->48473 48151 7ff76168399d 48157 7ff7616839bd 48151->48157 48158 7ff7616839b0 48151->48158 48428 7ff7616820a0 48152->48428 48154->48150 48472 7ff76167eb10 QueryPerformanceCounter GetTickCount 48154->48472 48156 7ff761683a91 48156->48152 48171 7ff761686400 15 API calls 48156->48171 48163 7ff761686400 15 API calls 48157->48163 48162 7ff761681d40 90 API calls 48158->48162 48160 7ff761683adb 48432 7ff761685dd0 48160->48432 48161 7ff761683a6b 48161->48156 48166 7ff761686400 15 API calls 48161->48166 48161->48176 48162->48154 48163->48174 48164 7ff761683a45 48167 7ff761683c2b 48164->48167 48168 7ff761683a51 48164->48168 48166->48156 48170 7ff761686400 15 API calls 48167->48170 48172 7ff761681d40 90 API calls 48168->48172 48170->48174 48175 7ff761683abf 48171->48175 48172->48150 48174->48139 48175->48152 48176->48090 48177->48029 48179 7ff76168e0c0 2 API calls 48178->48179 48180 7ff7616870b3 48179->48180 48181 7ff76168712b 48180->48181 48188 7ff761687144 48180->48188 48610 7ff761686280 19 API calls 48181->48610 48183 7ff76168713a 48184 7ff761681c3a 48183->48184 48184->48035 48184->48040 48185 7ff76168724d 48185->48184 48611 7ff761676100 17 API calls 48185->48611 48188->48185 48545 7ff7616885d0 48188->48545 48190 7ff761687c47 48189->48190 48191 7ff761687e43 48189->48191 48190->48191 48193 7ff761687c61 getpeername 48190->48193 48192 7ff7616bff10 8 API calls 48191->48192 48194 7ff761681c97 48192->48194 48195 7ff761687cbd getsockname 48193->48195 48196 7ff761687c86 WSAGetLastError 48193->48196 48194->48040 48194->48046 48198 7ff761687d47 48195->48198 48199 7ff761687d10 WSAGetLastError 48195->48199 48650 7ff761672e10 27 API calls 48196->48650 48654 7ff761686e40 19 API calls 48198->48654 48652 7ff761672e10 27 API calls 48199->48652 48201 7ff761687ca3 48651 7ff761686280 19 API calls 48201->48651 48203 7ff761687d69 48206 7ff761687dad 48203->48206 48207 7ff761687d6d _errno _errno 48203->48207 48205 7ff761687d2d 48653 7ff761686280 19 API calls 48205->48653 48657 7ff761686e40 19 API calls 48206->48657 48655 7ff761672e10 27 API calls 48207->48655 48211 7ff761687d93 48656 7ff761686280 19 API calls 48211->48656 48212 7ff761687dff 48212->48191 48214 7ff761687e03 _errno _errno 48212->48214 48658 7ff761672e10 27 API calls 48214->48658 48215 7ff761687cb8 48215->48191 48217 7ff761687e29 48659 7ff761686280 19 API calls 48217->48659 48219->48058 48220->48059 48221->48062 48224 7ff761682a55 48223->48224 48225 7ff761682a60 calloc 48223->48225 48224->48091 48226 7ff761682a8a 48225->48226 48227 7ff761682cd1 free 48225->48227 48228 7ff76168e0c0 2 API calls 48226->48228 48227->48091 48229 7ff761682b21 48228->48229 48230 7ff76168e0c0 2 API calls 48229->48230 48231 7ff761682b35 48230->48231 48232 7ff761682d0d 48231->48232 48233 7ff761682c97 _strdup 48231->48233 48234 7ff76168e0c0 2 API calls 48232->48234 48233->48232 48235 7ff761682ca9 48233->48235 48236 7ff761682d4d 48234->48236 48237 7ff761682cb7 free free 48235->48237 48236->48091 48237->48227 48474 7ff761685e80 8 API calls 48238->48474 48241 7ff761684ec7 48478 7ff7616aee10 calloc 48241->48478 48242 7ff761684ec0 48477 7ff7616aee50 23 API calls 48242->48477 48245 7ff761684ec5 48246 7ff761684ecc 48245->48246 48250 7ff761684f42 48246->48250 48283 7ff7616832cc 48246->48283 48479 7ff7616aea80 tolower 48246->48479 48249 7ff761684f0f 48249->48250 48251 7ff761684f1b free 48249->48251 48252 7ff761684f28 48249->48252 48260 7ff761685005 48250->48260 48250->48283 48481 7ff7616aef90 8 API calls 48250->48481 48251->48252 48480 7ff7616896c0 15 API calls 48252->48480 48253 7ff76168506c 48483 7ff761686280 19 API calls 48253->48483 48257 7ff761684fec 48259 7ff761684ff8 free 48257->48259 48257->48260 48257->48283 48258 7ff76168507e 48258->48283 48259->48260 48482 7ff7616aef90 8 API calls 48260->48482 48261 7ff76168502e 48261->48253 48262 7ff7616850a4 48261->48262 48261->48283 48484 7ff7616aef90 8 API calls 48262->48484 48264 7ff7616850cb 48265 7ff7616850f2 48264->48265 48266 7ff7616850d5 _strdup 48264->48266 48265->48283 48485 7ff7616aef90 8 API calls 48265->48485 48266->48265 48266->48283 48268 7ff761685115 48269 7ff761685138 48268->48269 48270 7ff76168511f _strdup 48268->48270 48269->48283 48486 7ff7616aef90 8 API calls 48269->48486 48270->48269 48270->48283 48272 7ff761685158 48273 7ff7616851ed 48272->48273 48274 7ff761685162 _strdup 48272->48274 48273->48283 48487 7ff7616aef90 8 API calls 48273->48487 48274->48273 48274->48283 48276 7ff761685208 48276->48283 48488 7ff7616aef90 8 API calls 48276->48488 48278 7ff76168523d 48278->48283 48489 7ff7616aef90 8 API calls 48278->48489 48280 7ff761685281 48281 7ff761685285 48280->48281 48282 7ff7616852a1 strtoul 48280->48282 48281->48283 48490 7ff7616aef90 8 API calls 48281->48490 48282->48281 48283->48095 48283->48096 48283->48176 48285 7ff76168531d _strdup 48285->48283 48286 7ff7616852e0 48286->48285 48286->48286 48491 7ff761685f50 20 API calls 48286->48491 48289 7ff761683d5d 48288->48289 48290 7ff761683c8d memset memset 48288->48290 48291 7ff761683d69 _strdup 48289->48291 48292 7ff761683d90 48289->48292 48293 7ff761683cd8 48290->48293 48294 7ff761683cc0 strncpy 48290->48294 48291->48292 48295 7ff761683d77 48291->48295 48296 7ff761683d9c _strdup 48292->48296 48297 7ff761683daf 48292->48297 48298 7ff761683ce4 strncpy 48293->48298 48299 7ff761683cff 48293->48299 48294->48293 48500 7ff761686280 19 API calls 48295->48500 48296->48295 48296->48297 48325 7ff761683e0e 48297->48325 48501 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48297->48501 48298->48299 48498 7ff76169c990 malloc strtoul free 48299->48498 48302 7ff761683d86 48305 7ff7616842b7 free free 48302->48305 48304 7ff761683d1f 48307 7ff761683d4c 48304->48307 48499 7ff76169c990 malloc strtoul free 48304->48499 48309 7ff7616bff10 8 API calls 48305->48309 48306 7ff761683dd0 48310 7ff761683dec 48306->48310 48502 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48306->48502 48307->48289 48307->48305 48308 7ff761684071 free 48315 7ff7616840ae 48308->48315 48316 7ff761684081 48308->48316 48314 7ff761683327 48309->48314 48312 7ff761686400 15 API calls 48310->48312 48310->48325 48312->48325 48313 7ff761683f66 48313->48308 48318 7ff761683fb9 48313->48318 48323 7ff761683fa0 tolower 48313->48323 48314->48102 48314->48103 48314->48176 48321 7ff7616840d8 48315->48321 48322 7ff7616840c8 free 48315->48322 48316->48315 48320 7ff7616840a2 free 48316->48320 48503 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48318->48503 48319 7ff7616840f4 free free free 48341 7ff7616840e7 48319->48341 48320->48315 48332 7ff7616840dd 48321->48332 48507 7ff761684b50 47 API calls 48321->48507 48322->48321 48323->48318 48323->48323 48325->48313 48325->48319 48325->48325 48328 7ff761683e7e strchr 48325->48328 48346 7ff761683e97 48325->48346 48327 7ff76168413f free 48327->48332 48327->48341 48328->48313 48328->48346 48330 7ff76168401c 48331 7ff76168404f 48330->48331 48505 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48330->48505 48335 7ff761686400 15 API calls 48331->48335 48337 7ff76168406c 48331->48337 48332->48341 48343 7ff761684191 48332->48343 48508 7ff761684b50 47 API calls 48332->48508 48333 7ff761684173 free 48333->48341 48333->48343 48335->48337 48336 7ff761684038 48336->48331 48506 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48336->48506 48337->48308 48338 7ff761683ec0 strchr 48338->48346 48339 7ff761683fe0 48339->48330 48504 7ff76169c850 realloc GetEnvironmentVariableA realloc free 48339->48504 48341->48305 48342 7ff761683ef0 strchr 48342->48346 48343->48341 48345 7ff761684207 free 48343->48345 48345->48341 48346->48313 48346->48319 48346->48338 48346->48342 48348 7ff7616844f4 48347->48348 48349 7ff7616844c1 48347->48349 48350 7ff761684509 free _strdup 48348->48350 48351 7ff76168452b 48348->48351 48349->48348 48354 7ff7616844d4 free 48349->48354 48355 7ff7616844e0 48349->48355 48350->48351 48360 7ff761684628 48350->48360 48352 7ff761684561 48351->48352 48353 7ff76168453f free _strdup 48351->48353 48356 7ff761684575 free _strdup 48352->48356 48358 7ff76168459f 48352->48358 48353->48352 48353->48360 48354->48355 48355->48348 48357 7ff7616844e8 free 48355->48357 48356->48358 48356->48360 48357->48348 48358->48360 48509 7ff7616b0d40 36 API calls 48358->48509 48360->48104 48361 7ff76168460e 48361->48360 48362 7ff761686400 15 API calls 48361->48362 48362->48360 48364 7ff761684930 48363->48364 48366 7ff761684a08 strchr 48364->48366 48368 7ff761683467 48364->48368 48370 7ff761684aaa free 48364->48370 48371 7ff761686400 15 API calls 48364->48371 48372 7ff7616849d7 free 48364->48372 48510 7ff7616896c0 15 API calls 48364->48510 48511 7ff761684700 22 API calls 48364->48511 48366->48364 48369 7ff761684a1d strtol 48366->48369 48368->48176 48373 7ff761681fd0 48368->48373 48369->48364 48370->48364 48371->48364 48372->48364 48372->48370 48375 7ff761682005 48373->48375 48379 7ff76168201f 48373->48379 48374 7ff7616bff10 8 API calls 48376 7ff761682031 48374->48376 48375->48379 48512 7ff7616b0c90 18 API calls 48375->48512 48376->48113 48376->48114 48376->48176 48378 7ff761682058 48378->48379 48380 7ff76168206b GetLastError 48378->48380 48379->48374 48513 7ff761672f50 21 API calls 48380->48513 48382 7ff761682083 48514 7ff761686280 19 API calls 48382->48514 48384 7ff761682099 48384->48379 48386 7ff76167f7f6 _strdup 48385->48386 48387 7ff76167f815 48385->48387 48386->48387 48388 7ff76167f805 48386->48388 48389 7ff76167f822 _strdup 48387->48389 48390 7ff76167f841 48387->48390 48388->48121 48389->48390 48391 7ff76167f831 48389->48391 48392 7ff76167f84e _strdup 48390->48392 48393 7ff76167f86d 48390->48393 48391->48121 48392->48393 48394 7ff76167f85d 48392->48394 48395 7ff76167f87a _strdup 48393->48395 48396 7ff76167f899 48393->48396 48394->48121 48395->48396 48397 7ff76167f889 48395->48397 48398 7ff76167f8a6 _strdup 48396->48398 48399 7ff76167f8c5 48396->48399 48397->48121 48398->48399 48400 7ff76167f8b5 48398->48400 48401 7ff76167f8d2 _strdup 48399->48401 48402 7ff76167f8f1 48399->48402 48400->48121 48401->48402 48403 7ff76167f8e1 48401->48403 48404 7ff76167f8fe _strdup 48402->48404 48405 7ff76167f91d 48402->48405 48403->48121 48404->48405 48406 7ff76167f90d 48404->48406 48407 7ff76167f92a _strdup 48405->48407 48408 7ff76167f939 48405->48408 48406->48121 48407->48408 48408->48121 48410 7ff76168e0c0 2 API calls 48409->48410 48419 7ff761685373 48410->48419 48411 7ff761683847 48411->48133 48467 7ff761680f10 15 API calls 48411->48467 48412 7ff76168ee30 9 API calls 48412->48419 48414 7ff7616b1620 8 API calls 48414->48419 48416 7ff761686400 15 API calls 48416->48419 48418 7ff761686ee0 closesocket free 48418->48419 48419->48411 48419->48412 48419->48414 48419->48416 48419->48418 48420 7ff7616854e6 30 API calls 48419->48420 48515 7ff76168f7f0 free free free free 48419->48515 48516 7ff7616b1230 48419->48516 48519 7ff76167b510 48419->48519 48533 7ff7616831b0 free free 48420->48533 48422 7ff761685746 48423 7ff761685754 free 48422->48423 48534 7ff76167f960 8 API calls 48423->48534 48425 7ff761685774 48535 7ff76167f960 8 API calls 48425->48535 48427 7ff761685780 free free free 48427->48419 48429 7ff7616820ae 48428->48429 48430 7ff76168e0c0 2 API calls 48429->48430 48431 7ff761682118 48430->48431 48431->48160 48433 7ff761685dec 48432->48433 48434 7ff761685df5 48433->48434 48435 7ff761685e0e free 48433->48435 48436 7ff761685e22 48433->48436 48435->48436 48465->48130 48466->48125 48467->48136 48468->48144 48469->48147 48470->48151 48471->48176 48472->48164 48473->48161 48492 7ff7616aee20 48474->48492 48477->48245 48479->48249 48480->48250 48481->48257 48482->48261 48483->48258 48484->48264 48485->48268 48486->48272 48487->48276 48488->48278 48489->48280 48490->48286 48491->48285 48493 7ff761684eb4 48492->48493 48494 7ff7616aee25 48492->48494 48493->48241 48493->48242 48497 7ff7616afe00 12 API calls 48494->48497 48498->48304 48499->48307 48500->48302 48501->48306 48502->48310 48503->48339 48504->48330 48505->48336 48506->48331 48507->48327 48508->48333 48509->48361 48510->48364 48511->48364 48512->48378 48513->48382 48514->48384 48515->48419 48536 7ff7616b5150 7 API calls 48516->48536 48518 7ff7616b124e 48520 7ff76167b980 48519->48520 48521 7ff76167b998 EnterCriticalSection LeaveCriticalSection 48520->48521 48522 7ff76167ba24 free 48520->48522 48523 7ff76167b9db 48521->48523 48524 7ff76167b9d1 CloseHandle 48521->48524 48522->48419 48526 7ff76167b9e9 48523->48526 48527 7ff76167b9e1 48523->48527 48525 7ff76167b9fc 48524->48525 48530 7ff76167ba11 closesocket 48525->48530 48539 7ff761676410 free 48525->48539 48538 7ff76167ba40 7 API calls 48526->48538 48537 7ff7616996b0 WaitForSingleObjectEx CloseHandle 48527->48537 48530->48522 48531 7ff76167b9f2 free 48531->48525 48533->48422 48534->48425 48535->48427 48536->48518 48537->48526 48538->48531 48539->48530 48546 7ff76168863f memcpy 48545->48546 48548 7ff7616886a8 socket 48546->48548 48549 7ff76168867b 48546->48549 48548->48549 48550 7ff761688a04 48549->48550 48554 7ff7616886e7 48549->48554 48632 7ff7616955a0 ioctlsocket 48549->48632 48551 7ff7616bff10 8 API calls 48550->48551 48553 7ff761688b7b 48551->48553 48553->48188 48555 7ff761688b0a _errno _errno _errno 48554->48555 48612 7ff7616b1ad0 48554->48612 48645 7ff761672e10 27 API calls 48555->48645 48558 7ff761688734 48558->48555 48560 7ff76168873d htons 48558->48560 48559 7ff761688b3b 48646 7ff761686280 19 API calls 48559->48646 48562 7ff761686400 15 API calls 48560->48562 48564 7ff76168875e 48562->48564 48563 7ff761688b50 48565 7ff761686ee0 2 API calls 48563->48565 48567 7ff7616887d9 48564->48567 48568 7ff76168877f setsockopt 48564->48568 48566 7ff7616889e5 48565->48566 48566->48550 48570 7ff761689110 14 API calls 48567->48570 48574 7ff761688811 48567->48574 48568->48567 48569 7ff7616887ad WSAGetLastError 48568->48569 48633 7ff761672e10 27 API calls 48569->48633 48570->48574 48571 7ff761688832 getsockopt 48575 7ff761688863 setsockopt 48571->48575 48576 7ff761688859 48571->48576 48572 7ff761688815 48579 7ff76168889a setsockopt 48572->48579 48584 7ff7616888d9 48572->48584 48574->48571 48574->48572 48575->48572 48576->48572 48576->48575 48577 7ff7616887c7 48580 7ff761686400 15 API calls 48577->48580 48578 7ff7616889a7 48581 7ff7616889b8 48578->48581 48583 7ff761688a0e 48578->48583 48582 7ff7616888c7 48579->48582 48588 7ff7616888de 48579->48588 48580->48567 48634 7ff761687f40 596 API calls 48581->48634 48585 7ff761686400 15 API calls 48582->48585 48631 7ff7616955a0 ioctlsocket 48583->48631 48584->48578 48600 7ff7616889f9 48584->48600 48585->48584 48587 7ff761688a1b 48590 7ff76168e0c0 2 API calls 48587->48590 48591 7ff76168890c WSAIoctl 48588->48591 48593 7ff761688a25 48590->48593 48591->48584 48594 7ff761688954 WSAGetLastError 48591->48594 48592 7ff7616889d4 48592->48583 48595 7ff7616889da 48592->48595 48596 7ff761688a4f 48593->48596 48643 7ff761676100 17 API calls 48593->48643 48597 7ff761686400 15 API calls 48594->48597 48635 7ff761686ee0 48595->48635 48596->48550 48602 7ff761688a6f connect 48596->48602 48603 7ff761688a98 WSAGetLastError 48596->48603 48597->48584 48601 7ff761686ee0 2 API calls 48600->48601 48601->48550 48602->48550 48602->48603 48603->48550 48604 7ff761688aa5 48603->48604 48604->48550 48644 7ff761672e10 27 API calls 48604->48644 48606 7ff761688ac1 48607 7ff761686400 15 API calls 48606->48607 48608 7ff761688ad7 48607->48608 48609 7ff761686ee0 2 API calls 48608->48609 48609->48550 48610->48183 48611->48184 48613 7ff7616b1adf 48612->48613 48614 7ff7616b1b09 48612->48614 48615 7ff7616b1ae4 _errno 48613->48615 48623 7ff7616b1af7 48613->48623 48616 7ff761689790 13 API calls 48614->48616 48615->48558 48617 7ff7616b1b78 48616->48617 48618 7ff7616b1bc4 _errno 48617->48618 48619 7ff7616b1b97 48617->48619 48618->48619 48620 7ff7616bff10 8 API calls 48619->48620 48621 7ff7616b1bdf 48620->48621 48621->48558 48622 7ff761689790 13 API calls 48622->48623 48623->48622 48624 7ff7616b1e6a 48623->48624 48628 7ff7616b1df0 48623->48628 48647 7ff7616b1b20 14 API calls 48624->48647 48626 7ff7616b1e83 _errno 48627 7ff7616b1e19 48626->48627 48629 7ff7616bff10 8 API calls 48627->48629 48628->48626 48628->48627 48630 7ff7616b1e57 48629->48630 48630->48558 48631->48587 48632->48554 48633->48577 48634->48592 48636 7ff761686ef5 48635->48636 48637 7ff761686f20 closesocket 48635->48637 48639 7ff761686f36 48636->48639 48641 7ff761686f11 48636->48641 48637->48566 48649 7ff761676410 free 48639->48649 48648 7ff761676410 free 48641->48648 48642 7ff761686f3e 48642->48566 48643->48596 48644->48606 48645->48559 48646->48563 48647->48628 48648->48637 48649->48642 48650->48201 48651->48215 48652->48205 48653->48215 48654->48203 48655->48211 48656->48215 48657->48212 48658->48217 48659->48215 48660 7ff761678708 48661 7ff761678721 48660->48661 48662 7ff7616787af 48661->48662 48665 7ff761678984 48661->48665 48701 7ff76168ce20 48662->48701 48745 7ff761676100 17 API calls 48665->48745 48668 7ff7616787d4 48669 7ff761678870 48668->48669 48671 7ff7616787de 48668->48671 48676 7ff761678805 48668->48676 48670 7ff761678921 48669->48670 48675 7ff761678878 48669->48675 48698 7ff761677b8b 48670->48698 48744 7ff761676100 17 API calls 48670->48744 48674 7ff761677610 292 API calls 48671->48674 48673 7ff761678db0 17 API calls 48673->48698 48674->48698 48675->48676 48679 7ff76167888e 48675->48679 48680 7ff7616788fb free 48675->48680 48681 7ff761677610 292 API calls 48676->48681 48678 7ff761678c32 48684 7ff76167889b free 48679->48684 48679->48698 48680->48676 48682 7ff761678823 48681->48682 48742 7ff76168c6e0 28 API calls 48682->48742 48683 7ff761678c23 48748 7ff761686280 19 API calls 48683->48748 48743 7ff76168c6e0 28 API calls 48684->48743 48688 7ff7616788c3 free 48689 7ff7616788d9 48688->48689 48688->48698 48693 7ff761677610 292 API calls 48689->48693 48690 7ff761678854 free 48690->48698 48691 7ff761681d40 90 API calls 48691->48698 48693->48698 48694 7ff761687b00 10 API calls 48694->48698 48695 7ff761678832 48695->48690 48696 7ff761686280 19 API calls 48697 7ff761677c2e 48696->48697 48697->48696 48697->48698 48698->48673 48698->48678 48698->48683 48698->48691 48698->48694 48698->48697 48700 7ff761677610 292 API calls 48698->48700 48740 7ff761686280 19 API calls 48698->48740 48746 7ff761676330 15 API calls 48698->48746 48747 7ff761695af0 22 API calls 48698->48747 48700->48698 48702 7ff76168ce71 48701->48702 48703 7ff76168cebf 48702->48703 48704 7ff7616968f0 19 API calls 48702->48704 48705 7ff76168cec6 48703->48705 48706 7ff76168cedd 48703->48706 48704->48703 48782 7ff761686280 19 API calls 48705->48782 48707 7ff76168cf09 48706->48707 48749 7ff76168d530 48706->48749 48709 7ff76168cf26 48707->48709 48710 7ff76168cf3e 48707->48710 48712 7ff7616787c3 48707->48712 48783 7ff76168dc80 90 API calls 48709->48783 48715 7ff76168e0c0 2 API calls 48710->48715 48711 7ff76168ced5 48711->48712 48712->48668 48741 7ff76168d120 24 API calls 48712->48741 48721 7ff76168cf48 48715->48721 48716 7ff76168cf36 48716->48710 48716->48712 48717 7ff76168cfb8 48784 7ff761695af0 22 API calls 48717->48784 48719 7ff76168cfc0 48719->48712 48785 7ff761696c60 23 API calls 48719->48785 48721->48717 48723 7ff761686400 15 API calls 48721->48723 48722 7ff76168cfde 48722->48712 48724 7ff76168cff2 48722->48724 48730 7ff76168d072 48722->48730 48723->48717 48726 7ff761687b00 10 API calls 48724->48726 48725 7ff76168d0d9 48790 7ff761695af0 22 API calls 48725->48790 48729 7ff76168d001 48726->48729 48728 7ff76168d0b0 48728->48725 48732 7ff76168d0c3 48728->48732 48729->48712 48731 7ff76168d00a 48729->48731 48730->48725 48730->48728 48733 7ff76168d097 48730->48733 48736 7ff76168d041 48731->48736 48737 7ff76168d05c 48731->48737 48789 7ff761686280 19 API calls 48732->48789 48788 7ff761686280 19 API calls 48733->48788 48786 7ff761686280 19 API calls 48736->48786 48787 7ff761686280 19 API calls 48737->48787 48740->48698 48741->48668 48742->48695 48743->48688 48744->48698 48745->48698 48746->48698 48747->48698 48748->48678 48753 7ff76168d580 48749->48753 48751 7ff7616959a0 2 API calls 48751->48753 48752 7ff76168daba 48756 7ff761686400 15 API calls 48752->48756 48781 7ff76168dad3 48752->48781 48753->48751 48753->48752 48754 7ff76168e0c0 2 API calls 48753->48754 48757 7ff76168da97 48753->48757 48758 7ff76168d810 48753->48758 48763 7ff76168db51 48753->48763 48767 7ff76168dabf 48753->48767 48769 7ff761686400 15 API calls 48753->48769 48775 7ff76168d7ec 48753->48775 48780 7ff7616861a0 23 API calls 48753->48780 48753->48781 48791 7ff761686570 48753->48791 48794 7ff7616931a0 192 API calls 48753->48794 48797 7ff7616b2ea0 23 API calls 48753->48797 48798 7ff76169f9c0 23 API calls 48753->48798 48754->48753 48756->48781 48757->48752 48759 7ff761686400 15 API calls 48757->48759 48758->48753 48795 7ff7616861c0 fwrite fwrite 48758->48795 48796 7ff7616861c0 fwrite fwrite 48758->48796 48759->48752 48764 7ff76168db56 48763->48764 48765 7ff76168db6d 48763->48765 48800 7ff761686280 19 API calls 48764->48800 48801 7ff761686280 19 API calls 48765->48801 48770 7ff76168daf3 48767->48770 48771 7ff76168dac7 48767->48771 48768 7ff76168daff 48768->48781 48769->48753 48799 7ff761686280 19 API calls 48770->48799 48774 7ff761686400 15 API calls 48771->48774 48774->48781 48776 7ff761686400 15 API calls 48775->48776 48777 7ff76168db18 48776->48777 48779 7ff761686400 15 API calls 48777->48779 48779->48781 48780->48753 48781->48707 48782->48711 48783->48716 48784->48719 48785->48722 48786->48711 48787->48711 48788->48711 48789->48711 48790->48712 48802 7ff76169bed0 48791->48802 48794->48753 48795->48758 48796->48753 48797->48753 48798->48753 48799->48768 48800->48768 48801->48768 48803 7ff76169bf4f 48802->48803 48804 7ff76169bf6e 48802->48804 48803->48804 48805 7ff76169bf55 48803->48805 48806 7ff76169bf92 48804->48806 48807 7ff76169bf75 48804->48807 48808 7ff761686400 15 API calls 48805->48808 48810 7ff76169bf98 48806->48810 48813 7ff76169bfb1 48806->48813 48809 7ff761686400 15 API calls 48807->48809 48820 7ff76169bf64 48808->48820 48809->48820 48811 7ff761686400 15 API calls 48810->48811 48811->48820 48812 7ff76169bfe0 realloc 48815 7ff76169c02e 48812->48815 48816 7ff76169c00d 48812->48816 48813->48812 48813->48815 48835 7ff76169c0a9 48813->48835 48814 7ff76169c406 48817 7ff76169c505 memcpy memcpy 48814->48817 48821 7ff76169c54b 48814->48821 48819 7ff761686600 2 API calls 48815->48819 48848 7ff761686280 19 API calls 48816->48848 48817->48821 48823 7ff76169c077 48819->48823 48820->48814 48824 7ff761689110 14 API calls 48820->48824 48825 7ff7616bff10 8 API calls 48821->48825 48822 7ff76169c024 48822->48820 48829 7ff76169c26e 48823->48829 48830 7ff76169c09d 48823->48830 48823->48835 48826 7ff76169c3f6 48824->48826 48827 7ff7616865cb 48825->48827 48826->48814 48828 7ff761686400 15 API calls 48826->48828 48827->48753 48828->48814 48831 7ff761686400 15 API calls 48829->48831 48832 7ff761686400 15 API calls 48830->48832 48831->48835 48832->48835 48833 7ff761686400 15 API calls 48833->48820 48834 7ff76169a390 255 API calls 48834->48835 48835->48820 48835->48834 48836 7ff761686400 15 API calls 48835->48836 48837 7ff76169c417 48835->48837 48838 7ff76169c1b0 realloc 48835->48838 48840 7ff76169c38e 48835->48840 48842 7ff76169c1fb memcpy 48835->48842 48844 7ff76169c24b memcpy 48835->48844 48836->48835 48837->48840 48841 7ff76169c446 48837->48841 48838->48835 48839 7ff76169c476 48838->48839 48850 7ff761686280 19 API calls 48839->48850 48840->48820 48840->48833 48849 7ff761672620 22 API calls 48841->48849 48842->48835 48844->48835 48846 7ff76169c45f 48847 7ff761686400 15 API calls 48846->48847 48847->48820 48848->48822 48849->48846 48850->48822 48851 7ff76169a915 48887 7ff76169a919 48851->48887 48852 7ff76169a9e7 48853 7ff76169aa06 strchr 48852->48853 48854 7ff76169aea5 calloc 48852->48854 48855 7ff76169aa1f strncmp 48853->48855 48856 7ff76169ab6b 48853->48856 48857 7ff76169af48 48854->48857 48858 7ff76169aecc 48854->48858 48859 7ff76169aa60 strncmp 48855->48859 48860 7ff76169aa3c 48855->48860 48862 7ff76169af2b 48856->48862 48863 7ff76169ac7e fopen 48856->48863 48867 7ff76169afa4 CertFreeCertificateContext 48857->48867 48868 7ff76169afaa 48857->48868 48964 7ff761686280 19 API calls 48858->48964 48859->48860 48866 7ff76169aa82 strncmp 48859->48866 48864 7ff76169ab39 strchr 48860->48864 48966 7ff761686280 19 API calls 48862->48966 48863->48862 48869 7ff76169ac97 fseek 48863->48869 48864->48856 48870 7ff76169ab53 _strdup 48864->48870 48865 7ff76169aedb 48871 7ff76169aee9 CertFreeCertificateContext 48865->48871 48919 7ff76169b166 48865->48919 48866->48860 48873 7ff76169aaa4 strncmp 48866->48873 48867->48868 48874 7ff76169b013 48868->48874 48875 7ff76169afae 48868->48875 48876 7ff76169acc1 ftell 48869->48876 48877 7ff76169accd 48869->48877 48870->48856 48878 7ff76169ab73 48870->48878 48871->48919 48873->48860 48880 7ff76169aac3 strncmp 48873->48880 48890 7ff761698210 13 API calls 48874->48890 48967 7ff761672620 22 API calls 48875->48967 48876->48877 48883 7ff76169aef9 fclose 48877->48883 48884 7ff76169acde fseek 48877->48884 48878->48856 48900 7ff76169ab94 CertOpenStore 48878->48900 48879 7ff76169a9a0 strtol 48886 7ff76169a9c2 strchr 48879->48886 48879->48887 48880->48864 48881 7ff76169aada strncmp 48880->48881 48881->48860 48888 7ff76169aaf9 strncmp 48881->48888 48965 7ff761686280 19 API calls 48883->48965 48884->48883 48892 7ff76169acfb malloc 48884->48892 48885 7ff7616bff10 8 API calls 48893 7ff76169b31c 48885->48893 48886->48852 48886->48887 48887->48852 48887->48879 48887->48886 48905 7ff76169aa47 48887->48905 48958 7ff761699d40 62 API calls 48887->48958 48888->48860 48895 7ff76169ab18 strncmp 48888->48895 48889 7ff76169afc2 48968 7ff761686280 19 API calls 48889->48968 48897 7ff76169b02c 48890->48897 48892->48883 48899 7ff76169ad14 fread 48892->48899 48895->48856 48895->48860 48910 7ff761698210 13 API calls 48897->48910 48920 7ff76169b03f 48897->48920 48898 7ff76169af18 free 48898->48919 48899->48883 48902 7ff76169ad32 fclose 48899->48902 48903 7ff76169abe7 free CryptStringToBinaryA 48900->48903 48904 7ff76169abb7 GetLastError 48900->48904 48901 7ff76169afd4 free 48909 7ff76169aa56 48901->48909 48901->48919 48912 7ff76169ad5f malloc 48902->48912 48913 7ff76169ad4f 48902->48913 48906 7ff76169ac32 CertFindCertificateInStore 48903->48906 48907 7ff76169ae71 CertCloseStore 48903->48907 48960 7ff761686280 19 API calls 48904->48960 48959 7ff761686280 19 API calls 48905->48959 48917 7ff76169ac64 48906->48917 48918 7ff76169ae8a CertCloseStore 48906->48918 48907->48919 48909->48919 48910->48920 48911 7ff761686400 15 API calls 48921 7ff76169b052 48911->48921 48915 7ff76169ad79 MultiByteToWideChar 48912->48915 48916 7ff76169ada3 PFXImportCertStore free free 48912->48916 48913->48912 48915->48916 48927 7ff76169add4 GetLastError 48916->48927 48928 7ff76169ae2a CertFindCertificateInStore 48916->48928 48917->48907 48918->48854 48919->48885 48920->48911 48920->48921 48923 7ff761686400 15 API calls 48921->48923 48926 7ff76169b09b 48921->48926 48922 7ff76169abd6 free 48922->48919 48923->48926 48925 7ff76169b0fd calloc 48929 7ff76169b170 48925->48929 48930 7ff76169b157 48925->48930 48926->48925 48931 7ff76169ae11 48927->48931 48932 7ff76169ade9 48927->48932 48934 7ff76169ae52 GetLastError 48928->48934 48935 7ff76169ae86 48928->48935 48929->48919 48939 7ff76169b1d9 free 48929->48939 48940 7ff76169b27c 48929->48940 48969 7ff761686280 19 API calls 48930->48969 48962 7ff761686280 19 API calls 48931->48962 48961 7ff761686280 19 API calls 48932->48961 48963 7ff761686280 19 API calls 48934->48963 48935->48918 48941 7ff76169b256 48939->48941 48942 7ff76169b20a 48939->48942 48943 7ff761686b40 48 API calls 48940->48943 48974 7ff761672620 22 API calls 48941->48974 48946 7ff76169b230 48942->48946 48947 7ff76169b212 48942->48947 48944 7ff76169b29d 48943->48944 48944->48919 48955 7ff76169b2f9 48944->48955 48972 7ff761672620 22 API calls 48946->48972 48970 7ff761672620 22 API calls 48947->48970 48950 7ff76169b260 48975 7ff761686280 19 API calls 48950->48975 48951 7ff76169b219 48971 7ff761686280 19 API calls 48951->48971 48952 7ff76169b23a 48973 7ff761686280 19 API calls 48952->48973 48976 7ff761686280 19 API calls 48955->48976 48958->48887 48959->48909 48960->48922 48961->48909 48962->48909 48963->48907 48964->48865 48965->48898 48966->48909 48967->48889 48968->48901 48969->48919 48970->48951 48971->48909 48972->48952 48973->48909 48974->48950 48975->48909 48976->48919 48977 7ff7616c01ec 48978 7ff7616c0205 48977->48978 48979 7ff7616c0343 48978->48979 48980 7ff7616c020d __scrt_acquire_startup_lock 48978->48980 49059 7ff7616c067c 9 API calls 48979->49059 48982 7ff7616c034d 48980->48982 48988 7ff7616c022b __scrt_release_startup_lock 48980->48988 49060 7ff7616c067c 9 API calls 48982->49060 48984 7ff7616c0358 48986 7ff7616c0360 _exit 48984->48986 48985 7ff7616c0250 48987 7ff7616c02d6 _get_initial_narrow_environment __p___argv __p___argc 48997 7ff761671e40 48987->48997 48988->48985 48988->48987 48991 7ff7616c02ce _register_thread_local_exe_atexit_callback 48988->48991 48991->48987 49061 7ff7616bfb18 48997->49061 49001 7ff761672369 ?_Throw_Cpp_error@std@@YAXH 49002 7ff761671eb8 49003 7ff76167235e ?_Throw_Cpp_error@std@@YAXH 49002->49003 49004 7ff761671ec3 _Thrd_detach 49002->49004 49003->49001 49004->49003 49005 7ff761671ee0 16 API calls 49004->49005 49070 7ff761662ab0 49005->49070 49059->48982 49060->48984 49062 7ff7616bfb32 malloc 49061->49062 49063 7ff7616bfb23 49062->49063 49064 7ff761671e6f _beginthreadex 49062->49064 49063->49062 49065 7ff7616bfb42 49063->49065 49064->49001 49064->49002 49066 7ff7616bfb4d 49065->49066 49159 7ff7616c0640 _CxxThrowException std::bad_alloc::bad_alloc 49065->49159 49160 7ff761661a00 49066->49160 49069 7ff7616bfb53 49163 7ff761662850 49070->49163 49072 7ff761662afa 49073 7ff7616630b8 49072->49073 49176 7ff761663170 49072->49176 49292 7ff761663130 7 API calls 49073->49292 49075 7ff761663114 Sleep exit 49077 7ff761663128 49075->49077 49079 7ff761661a00 Concurrency::cancel_current_task __std_exception_copy 49077->49079 49078 7ff761662b7f 49188 7ff761663c40 49078->49188 49081 7ff76166312d 49079->49081 49082 7ff761662b8c 49195 7ff7616632e0 49082->49195 49084 7ff761662bbc 49085 7ff761663c40 10 API calls 49084->49085 49086 7ff761662bc8 49085->49086 49203 7ff7616633e0 49086->49203 49088 7ff761662bfb 49089 7ff761663c40 10 API calls 49088->49089 49090 7ff761662c08 49089->49090 49091 7ff761662c5f 49090->49091 49093 7ff761662c58 _invalid_parameter_noinfo_noreturn 49090->49093 49092 7ff761662caf 49091->49092 49096 7ff761662ca8 _invalid_parameter_noinfo_noreturn 49091->49096 49094 7ff761662cee 49092->49094 49097 7ff761662ce7 _invalid_parameter_noinfo_noreturn 49092->49097 49093->49091 49095 7ff761662d3c 49094->49095 49099 7ff761662d35 _invalid_parameter_noinfo_noreturn 49094->49099 49101 7ff761662d74 _invalid_parameter_noinfo_noreturn 49095->49101 49103 7ff761662d7b 49095->49103 49096->49092 49097->49094 49098 7ff761662dc9 49211 7ff761663560 49098->49211 49099->49095 49100 7ff761662e2f 49104 7ff761662e1a memcpy 49100->49104 49107 7ff7616bfb18 3 API calls 49100->49107 49101->49103 49103->49077 49103->49098 49103->49100 49106 7ff7616bfb18 3 API calls 49103->49106 49104->49098 49110 7ff761662e12 49106->49110 49107->49104 49110->49104 49112 7ff761662e28 _invalid_parameter_noinfo_noreturn 49110->49112 49112->49100 49161 7ff761661a0e Concurrency::cancel_current_task 49160->49161 49162 7ff761661a1f __std_exception_copy 49161->49162 49162->49069 49164 7ff7616628a0 49163->49164 49164->49164 49165 7ff7616628b0 system 49164->49165 49166 7ff761662910 49165->49166 49166->49166 49167 7ff761662920 system 49166->49167 49168 7ff761662970 49167->49168 49168->49168 49169 7ff761662980 system 49168->49169 49170 7ff7616629c0 49169->49170 49170->49170 49171 7ff7616629d0 system 49170->49171 49172 7ff761662a10 49171->49172 49172->49172 49173 7ff761662a20 system 49172->49173 49174 7ff761662a80 49173->49174 49174->49174 49175 7ff761662a90 system 49174->49175 49175->49072 49178 7ff76166318e 49176->49178 49177 7ff7616631d8 49180 7ff761664320 7 API calls 49177->49180 49182 7ff761663237 49177->49182 49178->49177 49179 7ff761664320 7 API calls 49178->49179 49179->49177 49180->49182 49293 7ff761665de0 49182->49293 49184 7ff761663286 49185 7ff7616632c7 49184->49185 49187 7ff7616632c0 _invalid_parameter_noinfo_noreturn 49184->49187 49185->49078 49186 7ff76166327f _invalid_parameter_noinfo_noreturn 49186->49184 49187->49185 49189 7ff761663c5d 49188->49189 49190 7ff761663cb8 49189->49190 49191 7ff761663c73 memcpy 49189->49191 49319 7ff761664ec0 9 API calls Concurrency::cancel_current_task 49190->49319 49191->49082 49194 7ff761663ccb 49194->49082 49197 7ff7616632fe 49195->49197 49196 7ff761663348 49320 7ff761666de0 49196->49320 49197->49196 49198 7ff761664320 7 API calls 49197->49198 49198->49196 49200 7ff761663364 49201 7ff7616633c7 49200->49201 49202 7ff7616633c0 _invalid_parameter_noinfo_noreturn 49200->49202 49201->49084 49202->49201 49205 7ff7616633fe 49203->49205 49204 7ff761663448 49207 7ff761666de0 12 API calls 49204->49207 49205->49204 49206 7ff761664320 7 API calls 49205->49206 49206->49204 49208 7ff761663464 49207->49208 49209 7ff7616634c0 _invalid_parameter_noinfo_noreturn 49208->49209 49210 7ff7616634c7 49208->49210 49209->49210 49210->49088 49212 7ff761662850 6 API calls 49211->49212 49213 7ff76166359c 49212->49213 49327 7ff7616723e0 49213->49327 49215 7ff7616635a1 49216 7ff7616635ad 49215->49216 49221 7ff761663642 49215->49221 49217 7ff761664320 7 API calls 49216->49217 49224 7ff7616635d1 49217->49224 49218 7ff7616bff10 8 API calls 49219 7ff76166379a _invalid_parameter_noinfo_noreturn 49336 7ff7616724a0 49221->49336 49223 7ff76166371e 49223->49224 49225 7ff761663729 MessageBoxA 49223->49225 49224->49219 49226 7ff761663604 49224->49226 49225->49224 49226->49218 49292->49075 49294 7ff761665e2a 49293->49294 49295 7ff761665e7f 49293->49295 49294->49295 49296 7ff761665e2f memcpy 49294->49296 49297 7ff761665e87 memcpy 49295->49297 49305 7ff761665edb 49295->49305 49303 7ff76166324a 49296->49303 49298 7ff761665ec4 memcpy 49297->49298 49299 7ff761665ec1 49297->49299 49298->49303 49299->49298 49300 7ff761665fc1 49318 7ff761661aa0 ?_Xlength_error@std@@YAXPEBD 49300->49318 49303->49184 49303->49186 49305->49300 49306 7ff761665f59 49305->49306 49308 7ff761665fbc 49305->49308 49309 7ff761665f37 49305->49309 49307 7ff761665f44 memcpy 49306->49307 49310 7ff7616bfb18 3 API calls 49306->49310 49315 7ff761665f93 memcpy 49307->49315 49316 7ff761665f90 49307->49316 49312 7ff761661a00 Concurrency::cancel_current_task __std_exception_copy 49308->49312 49313 7ff7616bfb18 3 API calls 49309->49313 49310->49307 49312->49300 49314 7ff761665f3f 49313->49314 49314->49307 49317 7ff761665f52 _invalid_parameter_noinfo_noreturn 49314->49317 49315->49303 49316->49315 49317->49306 49319->49194 49321 7ff761666ea5 49320->49321 49324 7ff761666e10 memcpy memcpy memcpy 49320->49324 49326 7ff76166c610 9 API calls Concurrency::cancel_current_task 49321->49326 49323 7ff761666eba 49323->49200 49324->49200 49326->49323 49328 7ff7616723ed calloc 49327->49328 49329 7ff76167245d 49327->49329 49331 7ff761672442 49328->49331 49388 7ff7616821c0 25 API calls 49329->49388 49333 7ff76167247c 49331->49333 49357 7ff761689290 49331->49357 49332 7ff761672471 49332->49215 49333->49215 49335 7ff761672450 49335->49329 49335->49333 49337 7ff7616724b9 49336->49337 49338 7ff7616724af 49336->49338 49339 7ff7616724ea 49337->49339 49340 7ff7616724d2 49337->49340 49338->49223 49345 7ff761672506 49339->49345 49358 7ff7616892f6 49357->49358 49359 7ff7616892ae WSAStartup 49357->49359 49360 7ff7616b2d90 26 API calls 49358->49360 49361 7ff7616892c2 49359->49361 49362 7ff7616892d9 49359->49362 49363 7ff7616892fb 49360->49363 49361->49358 49364 7ff7616892d3 WSACleanup 49361->49364 49365 7ff7616bff10 8 API calls 49362->49365 49367 7ff7616895bf 49363->49367 49368 7ff761689303 GetModuleHandleA 49363->49368 49364->49362 49366 7ff7616892ee 49365->49366 49366->49335 49369 7ff7616bff10 8 API calls 49367->49369 49370 7ff761689332 49368->49370 49371 7ff76168933e GetProcAddress strpbrk 49368->49371 49372 7ff7616895cf 49369->49372 49373 7ff7616894c3 7 API calls 49370->49373 49374 7ff761689375 49371->49374 49375 7ff76168939b 49371->49375 49372->49335 49373->49367 49388->49332 49683 7ff76167bab0 49684 7ff761689790 13 API calls 49683->49684 49685 7ff76167baef 49684->49685 49702 7ff761698fe0 getaddrinfo 49685->49702 49688 7ff76167bb2d EnterCriticalSection 49692 7ff76167bb3c LeaveCriticalSection 49688->49692 49693 7ff76167bb58 49688->49693 49689 7ff76167bb0b WSAGetLastError 49690 7ff76167bb2a 49689->49690 49691 7ff76167bb15 WSAGetLastError 49689->49691 49690->49688 49691->49688 49720 7ff76167ba40 7 API calls 49692->49720 49694 7ff76167bb86 LeaveCriticalSection 49693->49694 49695 7ff76167bb62 send 49693->49695 49698 7ff76167bb96 49694->49698 49695->49694 49697 7ff76167bb7d WSAGetLastError 49695->49697 49697->49694 49700 7ff7616bff10 8 API calls 49698->49700 49699 7ff76167bb4d free 49699->49698 49701 7ff76167bba5 49700->49701 49703 7ff76167bb05 49702->49703 49706 7ff761699013 49702->49706 49703->49688 49703->49689 49704 7ff761699184 WSASetLastError 49704->49703 49705 7ff7616990fe 49708 7ff761699141 freeaddrinfo 49705->49708 49709 7ff761699147 49705->49709 49706->49704 49706->49705 49707 7ff761699069 malloc 49706->49707 49712 7ff761699080 malloc 49707->49712 49713 7ff76169912c 49707->49713 49708->49709 49710 7ff76169917f 49709->49710 49711 7ff76169914c 49709->49711 49710->49703 49710->49704 49711->49703 49714 7ff761699151 free free free 49711->49714 49715 7ff7616990b7 memcpy 49712->49715 49716 7ff76169911b free 49712->49716 49713->49705 49714->49703 49714->49714 49717 7ff7616990cf _strdup 49715->49717 49719 7ff7616990de 49715->49719 49716->49705 49718 7ff761699100 free free 49717->49718 49717->49719 49718->49705 49719->49706 49720->49699 49721 7ff7616a29c0 49722 7ff7616a2a50 49721->49722 49723 7ff7616a29e9 49721->49723 49724 7ff76168bfe0 407 API calls 49722->49724 49725 7ff7616a2a10 49723->49725 49726 7ff7616a29fa 49723->49726 49729 7ff7616a2a5d 49724->49729 49756 7ff761687290 49725->49756 49794 7ff76168bee0 405 API calls 49726->49794 49739 7ff7616a2ac1 49729->49739 49741 7ff7616a2b3a 49729->49741 49796 7ff7616bb390 35 API calls 49729->49796 49730 7ff7616a2a05 49732 7ff7616a2a21 49732->49741 49795 7ff7616a3640 65 API calls 49732->49795 49734 7ff7616a2af2 49736 7ff7616a2b4e 49734->49736 49737 7ff7616a2afe 49734->49737 49735 7ff7616a2bee 49804 7ff76168d2b0 17 API calls 49735->49804 49751 7ff7616a2b57 49736->49751 49800 7ff7616bd420 _errno strtoll _errno 49736->49800 49797 7ff7616a3350 271 API calls 49737->49797 49739->49734 49739->49735 49739->49741 49743 7ff7616a2b08 49743->49741 49798 7ff7616a2ea0 26 API calls 49743->49798 49744 7ff7616a2a45 49747 7ff7616a2bae 49747->49741 49803 7ff7616bb390 35 API calls 49747->49803 49750 7ff7616a2b73 49750->49747 49750->49751 49753 7ff7616a2b99 49750->49753 49751->49747 49802 7ff7616a36e0 72 API calls 49751->49802 49752 7ff7616a2b23 49752->49741 49799 7ff7616a3290 32 API calls 49752->49799 49801 7ff7616a36e0 72 API calls 49753->49801 49757 7ff7616872e8 49756->49757 49769 7ff7616872df 49756->49769 49758 7ff76168e0c0 2 API calls 49757->49758 49761 7ff761687302 49758->49761 49759 7ff7616bff10 8 API calls 49760 7ff761687815 49759->49760 49760->49722 49760->49732 49762 7ff761687379 49761->49762 49763 7ff761687392 49761->49763 49826 7ff761686280 19 API calls 49762->49826 49765 7ff76168739c 49763->49765 49777 7ff7616873c9 49763->49777 49766 7ff761688460 611 API calls 49765->49766 49767 7ff7616873aa 49766->49767 49767->49769 49771 7ff761688570 51 API calls 49767->49771 49768 7ff7616968f0 19 API calls 49768->49777 49769->49759 49770 7ff7616876a5 49770->49769 49828 7ff761688b90 616 API calls 49770->49828 49771->49769 49772 7ff761687614 SleepEx getsockopt 49774 7ff76168765c WSAGetLastError 49772->49774 49772->49777 49774->49777 49775 7ff7616875b6 SleepEx getsockopt 49775->49777 49780 7ff7616875fe WSAGetLastError 49775->49780 49776 7ff7616876be 49776->49769 49781 7ff7616876d7 49776->49781 49777->49768 49777->49770 49777->49772 49777->49775 49778 7ff7616874c7 WSASetLastError 49777->49778 49779 7ff761686400 15 API calls 49777->49779 49782 7ff7616876e3 49777->49782 49793 7ff761688b90 616 API calls 49777->49793 49827 7ff761672e10 27 API calls 49777->49827 49778->49777 49779->49777 49780->49777 49829 7ff761672e10 27 API calls 49781->49829 49783 7ff76168773b 49782->49783 49785 7ff761686ee0 2 API calls 49782->49785 49805 7ff761688460 49783->49805 49785->49783 49787 7ff761687759 49787->49769 49818 7ff761688570 49787->49818 49788 7ff7616877b7 49830 7ff761686280 19 API calls 49788->49830 49791 7ff761687388 49791->49769 49793->49777 49794->49730 49795->49744 49796->49739 49797->49743 49798->49752 49799->49741 49800->49750 49801->49747 49802->49747 49803->49741 49804->49741 49806 7ff761688565 49805->49806 49809 7ff761688477 49805->49809 49806->49787 49807 7ff761688547 49833 7ff761696d50 583 API calls 49807->49833 49809->49807 49810 7ff76168851a 49809->49810 49812 7ff7616884fc 49809->49812 49832 7ff7616973a0 610 API calls 49810->49832 49811 7ff761688560 49811->49787 49812->49810 49815 7ff761688501 49812->49815 49814 7ff761688542 49814->49787 49831 7ff761686280 19 API calls 49815->49831 49817 7ff761688510 49817->49787 49819 7ff761688590 49818->49819 49820 7ff76168859d 49818->49820 49821 7ff7616959a0 2 API calls 49819->49821 49822 7ff761687c10 47 API calls 49820->49822 49821->49820 49823 7ff7616885ad 49822->49823 49834 7ff7616829b0 15 API calls 49823->49834 49825 7ff7616885b5 49825->49769 49826->49791 49827->49777 49828->49776 49829->49788 49830->49791 49831->49817 49832->49814 49833->49811 49834->49825 49835 7ff761691da0 49836 7ff761680480 255 API calls 49835->49836 49837 7ff761691db7 49836->49837 49838 7ff76167823b 49839 7ff761678282 49838->49839 49840 7ff761678251 49838->49840 49841 7ff76167832a 49839->49841 49846 7ff761678280 49839->49846 49875 7ff76168fea0 49840->49875 49843 7ff761678344 49841->49843 49848 7ff7616783e4 49841->49848 50122 7ff76168d120 24 API calls 49843->50122 49844 7ff76167826a 49849 7ff7616959a0 2 API calls 49844->49849 49847 7ff761677610 292 API calls 49846->49847 49871 7ff761677b8b 49846->49871 49847->49871 49850 7ff761677610 292 API calls 49848->49850 49848->49871 49849->49846 49850->49871 49851 7ff761678351 49852 7ff761677610 292 API calls 49851->49852 49855 7ff761678371 49852->49855 49854 7ff761678c32 49856 7ff76167837a 49855->49856 49857 7ff7616783d6 free 49855->49857 49859 7ff761678391 49856->49859 49862 7ff761678383 free 49856->49862 49857->49871 49858 7ff761678c23 50126 7ff761686280 19 API calls 49858->50126 50123 7ff76168c6e0 28 API calls 49859->50123 49861 7ff761678db0 17 API calls 49861->49871 49862->49871 49864 7ff761681d40 90 API calls 49864->49871 49866 7ff761687b00 10 API calls 49866->49871 49867 7ff7616783c7 free 49867->49871 49868 7ff7616783a2 49868->49867 49869 7ff761677c2e 49870 7ff761686280 19 API calls 49869->49870 49869->49871 49870->49869 49871->49854 49871->49858 49871->49861 49871->49864 49871->49866 49871->49869 49873 7ff761677610 292 API calls 49871->49873 50121 7ff761686280 19 API calls 49871->50121 50124 7ff761676330 15 API calls 49871->50124 50125 7ff761695af0 22 API calls 49871->50125 49873->49871 49876 7ff76168ff38 49875->49876 49877 7ff76168ff71 free _strdup 49876->49877 49880 7ff76168ff9b 49876->49880 50111 7ff76168ff4e 49876->50111 49877->49880 49877->50111 49878 7ff7616bff10 8 API calls 49879 7ff76167825b 49878->49879 49879->49839 49879->49844 49881 7ff761690051 free 49880->49881 49882 7ff761690065 49880->49882 49881->49882 49883 7ff761690084 49882->49883 50137 7ff7616896c0 15 API calls 49882->50137 49885 7ff7616900cf free 49883->49885 49886 7ff76169012d 49883->49886 49883->50111 49888 7ff7616900e2 free 49885->49888 49895 7ff761690191 49886->49895 50138 7ff761694d90 337 API calls 49886->50138 49896 7ff761690233 49888->49896 49897 7ff76169025a 49888->49897 49889 7ff761690179 49893 7ff761690180 free 49889->49893 49889->49895 49892 7ff7616901ce free 49892->49888 49892->50111 49893->50111 49895->49892 50139 7ff761694d90 337 API calls 49895->50139 49896->49897 50140 7ff7616896c0 15 API calls 49896->50140 49899 7ff761690316 free 49897->49899 49900 7ff7616902de free 49897->49900 49897->50111 49901 7ff761690305 49899->49901 50141 7ff7616896c0 15 API calls 49900->50141 49902 7ff76169034d 49901->49902 49909 7ff761690336 49901->49909 49901->50111 50142 7ff76167c510 6 API calls 49902->50142 49905 7ff761690359 50143 7ff7616b4830 59 API calls 49905->50143 49907 7ff761690372 49907->49909 49907->50111 49908 7ff7616905bc free 49922 7ff7616905df 49908->49922 49909->49909 49939 7ff76169033b 49909->49939 50144 7ff76167d480 free free 49909->50144 49911 7ff761690448 49913 7ff76169048f strchr 49911->49913 49929 7ff761690461 49911->49929 49912 7ff7616903e0 50145 7ff76167c710 26 API calls 49912->50145 49915 7ff7616904a4 strchr 49913->49915 49913->49929 49920 7ff7616904b7 strchr 49915->49920 49915->49929 49916 7ff7616906e7 49926 7ff761690710 49916->49926 49928 7ff76169074b 49916->49928 49917 7ff76169059c 50147 7ff761686280 19 API calls 49917->50147 49918 7ff7616903f5 50146 7ff76167d480 free free 49918->50146 49920->49929 49921 7ff761690615 50148 7ff7616929a0 strchr strchr strchr malloc memcpy 49921->50148 49922->49916 49922->49921 49923 7ff761690515 49923->49917 49923->49929 50150 7ff7616896c0 15 API calls 49926->50150 49927 7ff7616905ab 49927->50111 50151 7ff7616896c0 15 API calls 49928->50151 49929->49908 49930 7ff76169061d 49933 7ff761690630 free 49930->49933 49934 7ff76169063b 49930->49934 49930->50111 49935 7ff76169068f 49933->49935 49936 7ff761690666 49934->49936 49941 7ff761690650 memcpy 49934->49941 49940 7ff7616906b3 49935->49940 50149 7ff7616896c0 15 API calls 49935->50149 49938 7ff76169066b strchr 49936->49938 49937 7ff761690749 49937->49940 49966 7ff76169096f 49937->49966 49937->50111 49942 7ff761690678 49938->49942 49943 7ff76169067b free 49938->49943 49939->49911 49939->49923 49939->50111 49940->49927 49940->49937 50152 7ff7616aee50 23 API calls 49940->50152 49941->49938 49942->49943 49943->49935 49946 7ff761690c00 calloc 49949 7ff761690c2f 49946->49949 49946->50111 49947 7ff761690962 49951 7ff7616aee20 13 API calls 49947->49951 49948 7ff7616909ae 49955 7ff7616909ea free 49948->49955 49956 7ff761690b3e 49948->49956 49957 7ff761690a0a 49948->49957 49952 7ff761692270 25 API calls 49949->49952 49950 7ff761690a68 50155 7ff761686280 19 API calls 49950->50155 49951->49927 49958 7ff761690c43 49952->49958 49954 7ff7616907c7 49954->49947 49954->50111 50153 7ff7616aef90 8 API calls 49954->50153 50154 7ff7616896c0 15 API calls 49955->50154 49956->49957 49962 7ff761690b62 free 49956->49962 49957->49946 49957->50111 49967 7ff761690cb0 49958->49967 49973 7ff761690c77 49958->49973 49958->50111 49960 7ff761690a81 49970 7ff761690b22 49960->49970 49977 7ff761690adf 49960->49977 49964 7ff761690b80 49962->49964 49965 7ff761690b8d 49962->49965 49963 7ff761690872 49963->49947 49971 7ff76169087a 49963->49971 50159 7ff7616896c0 15 API calls 49964->50159 49965->49964 49972 7ff761690ba0 49965->49972 49966->49948 49966->49950 49966->49960 49966->49977 49968 7ff761690cb5 49967->49968 49969 7ff761690cde 49967->49969 49974 7ff761692270 25 API calls 49968->49974 50161 7ff761691eb0 7 API calls 49969->50161 50157 7ff761686280 19 API calls 49970->50157 49975 7ff7616aee20 13 API calls 49971->49975 50158 7ff7616896c0 15 API calls 49972->50158 50160 7ff761691eb0 7 API calls 49973->50160 49994 7ff761690cdc 49974->49994 49988 7ff761690882 49975->49988 49977->49948 49984 7ff761690b09 49977->49984 50156 7ff761686280 19 API calls 49984->50156 49985 7ff761690c98 free 49985->49994 49986 7ff761690cfb 49991 7ff761692270 25 API calls 49986->49991 49986->49994 49986->50111 49988->49966 49989 7ff76169093f 49988->49989 49990 7ff7616908aa strstr 49988->49990 49989->49966 49993 7ff7616908c2 49990->49993 49991->49994 49992 7ff761689790 13 API calls 49992->49989 49993->49989 49993->49992 49995 7ff761692270 25 API calls 49994->49995 49994->50111 49996 7ff761690ef0 free free free 49995->49996 49998 7ff761690f2e 49996->49998 49996->50111 49997 7ff7616910eb 49999 7ff761691231 49997->49999 49997->50111 50165 7ff761698580 _gmtime64 49997->50165 49998->49997 50001 7ff761690f91 49998->50001 50006 7ff761691075 49998->50006 49998->50111 50127 7ff761692310 49999->50127 50000 7ff7616910c0 50000->49997 50007 7ff7616910d4 50000->50007 50000->50111 50162 7ff76167a330 62 API calls 50001->50162 50004 7ff76169111d 50008 7ff761691123 50004->50008 50026 7ff761691139 50004->50026 50005 7ff761691094 50010 7ff761692270 25 API calls 50005->50010 50005->50111 50006->50000 50006->50005 50009 7ff761692270 25 API calls 50006->50009 50164 7ff761691eb0 7 API calls 50007->50164 50166 7ff761686280 19 API calls 50008->50166 50009->50005 50010->50000 50014 7ff7616910e8 50014->49997 50015 7ff76169123f 50016 7ff761691270 50015->50016 50024 7ff76169165c 50015->50024 50015->50111 50018 7ff761691603 50016->50018 50020 7ff761691280 50016->50020 50021 7ff761691367 50016->50021 50017 7ff761691066 50017->50006 50176 7ff761691eb0 7 API calls 50018->50176 50020->50018 50040 7ff76169128a 50020->50040 50022 7ff761691370 50021->50022 50041 7ff7616913e1 50021->50041 50025 7ff761692270 25 API calls 50022->50025 50023 7ff761691619 50030 7ff761692020 62 API calls 50023->50030 50023->50111 50034 7ff761692270 25 API calls 50024->50034 50037 7ff7616916b5 50024->50037 50029 7ff761691380 50025->50029 50026->49999 50035 7ff761689790 13 API calls 50026->50035 50026->50111 50027 7ff761690fd8 50027->50017 50028 7ff76169105e 50027->50028 50032 7ff761692270 25 API calls 50027->50032 50163 7ff76167a2a0 9 API calls 50028->50163 50045 7ff761692020 62 API calls 50029->50045 50029->50111 50039 7ff76169163c 50030->50039 50031 7ff7616912db 50042 7ff7616912ff 50031->50042 50031->50111 50168 7ff7616948a0 28 API calls 50031->50168 50032->50027 50034->50037 50043 7ff761691205 50035->50043 50036 7ff761691474 50059 7ff761691551 50036->50059 50067 7ff76169148f 50036->50067 50038 7ff7616916e1 50037->50038 50044 7ff761692270 25 API calls 50037->50044 50037->50111 50060 7ff7616917d1 50038->50060 50081 7ff761691704 50038->50081 50038->50111 50046 7ff7616913bf 50039->50046 50047 7ff761691646 50039->50047 50040->50031 50055 7ff761692270 25 API calls 50040->50055 50049 7ff761692270 25 API calls 50041->50049 50058 7ff761691430 50041->50058 50169 7ff761691eb0 7 API calls 50042->50169 50167 7ff761691eb0 7 API calls 50043->50167 50044->50038 50052 7ff7616913a3 50045->50052 50172 7ff76168d2b0 17 API calls 50046->50172 50177 7ff761686280 19 API calls 50047->50177 50049->50058 50051 7ff761692270 25 API calls 50051->50058 50052->50046 50061 7ff7616913a9 50052->50061 50055->50031 50056 7ff7616912f7 50056->50042 50056->50111 50058->50036 50058->50051 50058->50111 50083 7ff761691535 50059->50083 50173 7ff7616948a0 28 API calls 50059->50173 50095 7ff76169177c 50060->50095 50178 7ff7616948a0 28 API calls 50060->50178 50171 7ff761686280 19 API calls 50061->50171 50066 7ff761691227 50066->49999 50066->50111 50072 7ff7616914cf strchr 50067->50072 50067->50083 50069 7ff761691315 50076 7ff761692020 62 API calls 50069->50076 50069->50111 50070 7ff761691991 50186 7ff761691eb0 7 API calls 50070->50186 50071 7ff761691807 50080 7ff761691821 50071->50080 50089 7ff7616918f8 50071->50089 50077 7ff7616914e4 strchr 50072->50077 50094 7ff761691504 50072->50094 50073 7ff761691747 strchr 50078 7ff76169175c strchr 50073->50078 50073->50095 50075 7ff7616913d8 50075->50111 50188 7ff761695af0 22 API calls 50075->50188 50079 7ff761691343 50076->50079 50082 7ff7616914f7 strchr 50077->50082 50077->50094 50084 7ff76169176f strchr 50078->50084 50078->50095 50085 7ff76169135f 50079->50085 50086 7ff761691349 50079->50086 50087 7ff76169182e 50080->50087 50080->50089 50081->50073 50081->50095 50082->50094 50174 7ff761691eb0 7 API calls 50083->50174 50084->50095 50187 7ff76168d2b0 17 API calls 50085->50187 50170 7ff761686280 19 API calls 50086->50170 50179 7ff761691eb0 7 API calls 50087->50179 50104 7ff761691868 50089->50104 50089->50111 50184 7ff761691eb0 7 API calls 50089->50184 50090 7ff761691590 50099 7ff761692020 62 API calls 50090->50099 50090->50111 50093 7ff761691953 50106 7ff761692020 62 API calls 50093->50106 50094->50083 50094->50111 50095->50070 50095->50071 50095->50111 50097 7ff761691a65 50105 7ff761686400 15 API calls 50097->50105 50097->50111 50101 7ff7616915e3 50099->50101 50100 7ff761691844 50102 7ff761691855 50100->50102 50103 7ff76169186d 50100->50103 50100->50111 50101->50085 50107 7ff7616915ed 50101->50107 50180 7ff761691eb0 7 API calls 50102->50180 50110 7ff7616918b4 50103->50110 50114 7ff761692270 25 API calls 50103->50114 50104->50093 50104->50111 50105->50111 50112 7ff761691971 50106->50112 50175 7ff761686280 19 API calls 50107->50175 50110->50104 50183 7ff761691eb0 7 API calls 50110->50183 50111->49878 50112->50085 50113 7ff76169197b 50112->50113 50185 7ff761686280 19 API calls 50113->50185 50117 7ff761691885 50114->50117 50117->50104 50181 7ff761691eb0 7 API calls 50117->50181 50119 7ff76169189c 50119->50110 50182 7ff761691eb0 7 API calls 50119->50182 50121->49871 50122->49851 50123->49868 50124->49871 50125->49871 50126->49854 50131 7ff76169233b 50127->50131 50128 7ff7616923c0 strchr 50130 7ff7616923d9 strchr 50128->50130 50128->50131 50129 7ff76169261a 50129->50015 50130->50131 50131->50128 50131->50129 50132 7ff761692428 _strdup 50131->50132 50135 7ff7616925f4 free 50131->50135 50136 7ff761692270 25 API calls 50131->50136 50132->50131 50133 7ff761692639 50132->50133 50133->50129 50134 7ff761692643 free free 50133->50134 50134->50129 50135->50131 50136->50131 50137->49883 50138->49889 50139->49892 50140->49897 50141->49901 50142->49905 50143->49907 50144->49912 50145->49918 50146->49939 50147->49927 50148->49930 50149->49940 50150->49937 50151->49937 50152->49954 50153->49963 50154->49957 50155->49927 50156->49927 50157->49927 50158->49957 50159->49957 50160->49985 50161->49986 50162->50027 50163->50017 50164->50014 50165->50004 50166->49927 50167->50066 50168->50056 50169->50069 50170->50111 50171->49927 50172->50075 50173->50094 50174->50090 50175->49927 50176->50023 50177->49927 50178->50095 50179->50100 50180->50104 50181->50119 50182->50110 50183->50104 50184->50104 50185->49927 50186->50089 50187->50075 50188->50097 50189 7ff7616789c5 50190 7ff7616789d4 50189->50190 50194 7ff7616789f3 50189->50194 50191 7ff7616789e5 50190->50191 50192 7ff761678db0 17 API calls 50190->50192 50193 7ff761677610 292 API calls 50191->50193 50192->50191 50193->50194 50207 7ff761677b8b 50194->50207 50210 7ff761676330 15 API calls 50194->50210 50197 7ff761678c32 50198 7ff761678c23 50213 7ff761686280 19 API calls 50198->50213 50200 7ff761678db0 17 API calls 50200->50207 50201 7ff761681d40 90 API calls 50201->50207 50203 7ff761687b00 10 API calls 50203->50207 50204 7ff761686280 19 API calls 50205 7ff761677c2e 50204->50205 50205->50204 50205->50207 50207->50197 50207->50198 50207->50200 50207->50201 50207->50203 50207->50205 50208 7ff761677610 292 API calls 50207->50208 50209 7ff761686280 19 API calls 50207->50209 50211 7ff761676330 15 API calls 50207->50211 50212 7ff761695af0 22 API calls 50207->50212 50208->50207 50209->50207 50210->50207 50211->50207 50212->50207 50213->50197 50214 7ff76167b520 50215 7ff76167b564 50214->50215 50216 7ff76167b574 50214->50216 50217 7ff76168ea00 3 API calls 50215->50217 50218 7ff76168e0c0 2 API calls 50216->50218 50217->50216 50219 7ff76167b5b6 50218->50219 50225 7ff76167bbc0 calloc 50219->50225 50222 7ff76167b5de 50259 7ff761686280 19 API calls 50222->50259 50223 7ff76167b5d5 50226 7ff76167bd4e _errno 50225->50226 50227 7ff76167bc11 malloc 50225->50227 50228 7ff76167b5d1 50226->50228 50229 7ff76167bc9c InitializeCriticalSectionEx 50227->50229 50230 7ff76167bcc7 50227->50230 50228->50222 50228->50223 50231 7ff761695370 29 API calls 50229->50231 50232 7ff76167bcf0 free 50230->50232 50233 7ff76167bce0 DeleteCriticalSection free 50230->50233 50234 7ff76167bcbf 50231->50234 50235 7ff76167bd08 50232->50235 50236 7ff76167bd03 50232->50236 50233->50232 50234->50230 50240 7ff76167bd76 _strdup 50234->50240 50238 7ff76167bd18 free 50235->50238 50239 7ff76167bd12 closesocket 50235->50239 50261 7ff761698f90 free free free 50236->50261 50238->50226 50239->50238 50240->50230 50241 7ff76167bd90 free _strdup 50240->50241 50242 7ff76167bdde 50241->50242 50243 7ff76167bdb2 50241->50243 50245 7ff76167bdea EnterCriticalSection LeaveCriticalSection 50242->50245 50246 7ff76167be61 free 50242->50246 50260 7ff761699660 _beginthreadex 50243->50260 50248 7ff76167be25 50245->50248 50249 7ff76167be14 CloseHandle 50245->50249 50246->50226 50247 7ff76167bdc6 50247->50228 50252 7ff76167bdce _errno 50247->50252 50250 7ff76167be2a 50248->50250 50251 7ff76167be32 50248->50251 50255 7ff76167be48 50249->50255 50262 7ff7616996b0 WaitForSingleObjectEx CloseHandle 50250->50262 50263 7ff76167ba40 7 API calls 50251->50263 50252->50242 50256 7ff76167be58 closesocket 50255->50256 50264 7ff761676410 free 50255->50264 50256->50246 50257 7ff76167be3b free 50257->50255 50259->50223 50260->50247 50261->50235 50262->50251 50263->50257 50264->50256 50265 7ff761677e80 50266 7ff761677e91 50265->50266 50293 7ff76168ed30 50266->50293 50268 7ff761677ec5 50269 7ff761677ef7 50268->50269 50271 7ff761686400 15 API calls 50268->50271 50321 7ff76168f780 314 API calls 50269->50321 50273 7ff761677ef1 50271->50273 50272 7ff761677f04 50274 7ff761677f07 50272->50274 50273->50269 50273->50274 50297 7ff761678e30 50274->50297 50279 7ff761678db0 17 API calls 50290 7ff761677b8b 50279->50290 50282 7ff761678c32 50283 7ff761678c23 50324 7ff761686280 19 API calls 50283->50324 50285 7ff761681d40 90 API calls 50285->50290 50287 7ff761687b00 10 API calls 50287->50290 50288 7ff761677c2e 50289 7ff761686280 19 API calls 50288->50289 50288->50290 50289->50288 50290->50279 50290->50282 50290->50283 50290->50285 50290->50287 50290->50288 50292 7ff761677610 292 API calls 50290->50292 50319 7ff761686280 19 API calls 50290->50319 50322 7ff761676330 15 API calls 50290->50322 50323 7ff761695af0 22 API calls 50290->50323 50292->50290 50294 7ff76168ed5a 50293->50294 50295 7ff76168f860 18 API calls 50294->50295 50296 7ff76168ed79 50295->50296 50296->50268 50307 7ff761678e96 50297->50307 50298 7ff761679218 memcpy memcpy 50299 7ff761679100 50298->50299 50300 7ff7616bff10 8 API calls 50299->50300 50301 7ff761677f12 50300->50301 50301->50290 50313 7ff76168f450 50301->50313 50302 7ff761678fde calloc 50302->50299 50302->50307 50303 7ff761679214 50303->50298 50304 7ff76168e750 malloc 50304->50307 50305 7ff761679027 50305->50299 50305->50307 50308 7ff76168e410 malloc memcpy 50305->50308 50309 7ff7616790ef 50305->50309 50306 7ff7616790f7 free 50306->50299 50307->50302 50307->50304 50307->50305 50307->50306 50310 7ff76167910a 50307->50310 50308->50305 50325 7ff76168e6e0 free 50309->50325 50310->50298 50310->50303 50326 7ff76168e6e0 free 50310->50326 50314 7ff76168f469 50313->50314 50327 7ff7616827a0 50314->50327 50316 7ff76168f480 50317 7ff761677e1c 50316->50317 50318 7ff761681d40 90 API calls 50316->50318 50317->50290 50320 7ff76168be90 free 50317->50320 50318->50317 50319->50290 50320->50290 50321->50272 50322->50290 50323->50290 50324->50282 50325->50306 50326->50310 50328 7ff7616959a0 2 API calls 50327->50328 50329 7ff7616827c5 50328->50329 50330 7ff7616827d5 50329->50330 50331 7ff7616827fe free 50329->50331 50332 7ff761682829 50329->50332 50330->50316 50351 7ff7616896c0 15 API calls 50331->50351 50334 7ff76168e0c0 2 API calls 50332->50334 50336 7ff761682835 50332->50336 50335 7ff76168285f 50334->50335 50337 7ff761682873 50335->50337 50338 7ff7616828a1 50335->50338 50336->50316 50340 7ff761687090 616 API calls 50337->50340 50339 7ff7616959a0 2 API calls 50338->50339 50341 7ff7616828ae 50339->50341 50342 7ff761682889 50340->50342 50345 7ff7616828d1 50341->50345 50346 7ff7616959a0 2 API calls 50341->50346 50343 7ff761682891 50342->50343 50344 7ff76168e0c0 2 API calls 50342->50344 50343->50316 50347 7ff761682964 50344->50347 50348 7ff761687c10 47 API calls 50345->50348 50346->50345 50347->50316 50349 7ff7616828ea 50348->50349 50349->50342 50350 7ff761686400 15 API calls 50349->50350 50350->50342 50351->50332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup$callocmemcpystrstr
                                        • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                        • API String ID: 2045874074-4264080130
                                        • Opcode ID: 7e8127e7a02895129b677bbc6e0c7dd064ef2c4a8580cb0e4b3f39011db1f550
                                        • Instruction ID: d843f00b621e634b67af18595d11149e29e8ed71de342d2cc26c1f08be5aeced
                                        • Opcode Fuzzy Hash: 7e8127e7a02895129b677bbc6e0c7dd064ef2c4a8580cb0e4b3f39011db1f550
                                        • Instruction Fuzzy Hash: 1103D439A09683C2FB54AB2194083B9A7A7AF45F98FC444B5CE1D97795DFBCE841C320

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 689 7ff761671e40-7ff761671e72 call 7ff7616bfb18 692 7ff761671e74-7ff761671e7e 689->692 693 7ff761671e80 689->693 694 7ff761671e83-7ff761671eb2 _beginthreadex 692->694 693->694 695 7ff761672369-7ff761672377 ?_Throw_Cpp_error@std@@YAXH@Z 694->695 696 7ff761671eb8-7ff761671ebd 694->696 697 7ff76167235e-7ff761672368 ?_Throw_Cpp_error@std@@YAXH@Z 696->697 698 7ff761671ec3-7ff761671eda _Thrd_detach 696->698 697->695 698->697 699 7ff761671ee0-7ff761672230 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff761662ab0 GetStdHandle SetConsoleTextAttribute call 7ff761672380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 GetStdHandle SetConsoleTextAttribute call 7ff761672380 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff7616722ad-7ff7616722b0 699->734 735 7ff761672232-7ff7616722ac call 7ff761663d40 * 2 call 7ff761663b20 * 2 URLDownloadToFileA system * 2 Sleep exit 699->735 736 7ff76167232d-7ff761672332 734->736 737 7ff7616722b2-7ff76167232c call 7ff761663d40 * 2 call 7ff761663b20 * 2 URLDownloadToFileA system * 2 Sleep exit 734->737 735->734 739 7ff76167233b-7ff76167235d call 7ff7616bff10 736->739 740 7ff761672334-7ff76167233a terminate 736->740 737->736 740->739
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                        • String ID: Iniciar Valorant ESP (HVCI DESLIGADO): $ Iniciar Valorant ESP (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SeieHuSttinstialog.exe$C:\Windows\System32\config\SeuetingsHostialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/esphvcioffbronkzatualizadoh96.exe$http://167.114.85.75/esphvcionattprivatestore655.exe$start C:\Windows\System32\config\SeieHuSttinstialog.exe$start C:\Windows\System32\config\SeuetingsHostialog.exe
                                        • API String ID: 3379756739-2736027526
                                        • Opcode ID: 9abfdb24af27c364c05fce46bb45a461b28bc0d03db9979f1f9b716173312d08
                                        • Instruction ID: bc6779b6be51cd6e9f776d340b0ce282fe52e79c4a202a08c80c38e4c2aaf495
                                        • Opcode Fuzzy Hash: 9abfdb24af27c364c05fce46bb45a461b28bc0d03db9979f1f9b716173312d08
                                        • Instruction Fuzzy Hash: 8FD13C29A08A43C2EB04BB70E8581B9B363FF84F55F805239D91E476A5DFBCE545CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupstrncmpstrtol
                                        • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                        • API String ID: 707411602-3372543188
                                        • Opcode ID: 09f11b705b111533f350ffdec44febe4a985be7e643573be8f285361bd15042f
                                        • Instruction ID: 9c50638306d46857d0268cb400b1d2407856257386ec343420010d8b2621f79f
                                        • Opcode Fuzzy Hash: 09f11b705b111533f350ffdec44febe4a985be7e643573be8f285361bd15042f
                                        • Instruction Fuzzy Hash: CD42B229A08743C2EB54AF25E8586B9A3A2FF44F98F805535CE4D477A4DFBCE944C720

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 939 7ff761689290-7ff7616892ac 940 7ff7616892f6-7ff7616892fd call 7ff7616b2d90 939->940 941 7ff7616892ae-7ff7616892c0 WSAStartup 939->941 950 7ff7616895bf-7ff7616895d6 call 7ff7616bff10 940->950 951 7ff761689303-7ff761689330 GetModuleHandleA 940->951 943 7ff7616892c2-7ff7616892c9 941->943 944 7ff7616892d9-7ff7616892f5 call 7ff7616bff10 941->944 946 7ff7616892d3 WSACleanup 943->946 947 7ff7616892cb-7ff7616892d1 943->947 946->944 947->940 947->946 953 7ff761689332-7ff761689339 951->953 954 7ff76168933e-7ff761689373 GetProcAddress strpbrk 951->954 956 7ff7616894c3-7ff7616895b7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 953->956 957 7ff761689375-7ff76168937b 954->957 958 7ff76168939b-7ff76168939e 954->958 956->950 959 7ff76168938d-7ff761689396 LoadLibraryA 957->959 960 7ff76168937d-7ff761689388 957->960 961 7ff7616893a0-7ff7616893b3 GetProcAddress 958->961 962 7ff7616893ca-7ff7616893e1 GetSystemDirectoryA 958->962 965 7ff76168948a-7ff76168949c 959->965 960->965 961->962 966 7ff7616893b5-7ff7616893c5 LoadLibraryExA 961->966 963 7ff761689482 962->963 964 7ff7616893e7-7ff7616893fa malloc 962->964 963->965 967 7ff761689479-7ff76168947c free 964->967 968 7ff7616893fc-7ff76168940a GetSystemDirectoryA 964->968 965->956 969 7ff76168949e-7ff7616894bc GetProcAddress 965->969 966->965 967->963 968->967 971 7ff76168940c-7ff761689416 968->971 969->956 972 7ff761689420-7ff761689429 971->972 972->972 973 7ff76168942b-7ff761689430 972->973 974 7ff761689434-7ff76168943b 973->974 974->974 975 7ff76168943d-7ff761689446 974->975 976 7ff761689450-7ff76168945c 975->976 976->976 977 7ff76168945e-7ff761689464 976->977 978 7ff761689470 LoadLibraryA 977->978 979 7ff761689466-7ff76168946e 977->979 980 7ff761689476 978->980 979->980 980->967
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                        • API String ID: 2612373469-2794540096
                                        • Opcode ID: d5f8afb19f8e867eb35e557aec29fe9135a7589b51aca80395dda82625a2e322
                                        • Instruction ID: d6e52887fbac55937f54ddcf70cbec235c45a6864366db99e0ab2e6938c02c3a
                                        • Opcode Fuzzy Hash: d5f8afb19f8e867eb35e557aec29fe9135a7589b51aca80395dda82625a2e322
                                        • Instruction Fuzzy Hash: 62919529E09782C6E760AB25A4183B9B3A2FFC9F84F845135DD4E06B54DFBCE445C720

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1236 7ff7616885d0-7ff76168863d 1237 7ff76168863f 1236->1237 1238 7ff761688642-7ff761688652 1236->1238 1237->1238 1239 7ff761688661-7ff761688679 memcpy 1238->1239 1240 7ff761688654-7ff76168865c 1238->1240 1241 7ff7616886a8-7ff7616886bb socket 1239->1241 1242 7ff76168867b-7ff7616886a6 call 7ff761676ba0 * 2 1239->1242 1240->1239 1244 7ff7616886be-7ff7616886ca 1241->1244 1242->1244 1246 7ff761688b5f 1244->1246 1247 7ff7616886d0-7ff7616886d8 1244->1247 1248 7ff761688b64-7ff761688b8d call 7ff7616bff10 1246->1248 1249 7ff7616886e7-7ff7616886f0 1247->1249 1250 7ff7616886da-7ff7616886e2 call 7ff7616955a0 1247->1250 1254 7ff761688700-7ff761688709 1249->1254 1255 7ff7616886f2-7ff7616886fd 1249->1255 1250->1249 1258 7ff76168870b-7ff76168870e 1254->1258 1259 7ff76168871c-7ff761688720 1254->1259 1255->1254 1262 7ff761688714-7ff76168871a 1258->1262 1263 7ff761688b0a-7ff761688b5d _errno * 3 call 7ff761672e10 call 7ff761686280 call 7ff761686ee0 1258->1263 1260 7ff761688725-7ff761688737 call 7ff7616b1ad0 1259->1260 1260->1263 1268 7ff76168873d-7ff761688765 htons call 7ff761686400 1260->1268 1262->1260 1263->1248 1274 7ff761688767-7ff76168876a 1268->1274 1275 7ff76168876c-7ff761688771 1268->1275 1274->1275 1277 7ff7616887de 1274->1277 1275->1277 1278 7ff761688773-7ff76168877d 1275->1278 1279 7ff7616887e1-7ff7616887fd 1277->1279 1278->1279 1280 7ff76168877f-7ff7616887ab setsockopt 1278->1280 1281 7ff7616887ff-7ff761688813 call 7ff761689110 1279->1281 1282 7ff76168882d-7ff761688830 1279->1282 1283 7ff7616887d9-7ff7616887dc 1280->1283 1284 7ff7616887ad-7ff7616887d4 WSAGetLastError call 7ff761672e10 call 7ff761686400 1280->1284 1295 7ff761688821-7ff76168882b 1281->1295 1296 7ff761688815-7ff76168881f 1281->1296 1286 7ff761688832-7ff761688857 getsockopt 1282->1286 1287 7ff761688884-7ff761688887 1282->1287 1283->1279 1284->1283 1290 7ff761688863-7ff76168887e setsockopt 1286->1290 1291 7ff761688859-7ff761688861 1286->1291 1292 7ff76168896f-7ff761688976 1287->1292 1293 7ff76168888d-7ff761688894 1287->1293 1290->1287 1291->1287 1291->1290 1297 7ff761688978-7ff7616889a5 call 7ff761676ba0 * 2 1292->1297 1298 7ff7616889aa-7ff7616889b1 1292->1298 1293->1292 1299 7ff76168889a-7ff7616888c5 setsockopt 1293->1299 1295->1286 1296->1287 1327 7ff7616889f5-7ff7616889f7 1297->1327 1328 7ff7616889a7 1297->1328 1301 7ff7616889b3-7ff7616889b6 1298->1301 1302 7ff7616889b8-7ff7616889d8 call 7ff7616b1a40 call 7ff761687f40 1298->1302 1304 7ff7616888c7-7ff7616888d9 call 7ff761686400 1299->1304 1305 7ff7616888de-7ff761688952 call 7ff761688c80 * 2 WSAIoctl 1299->1305 1301->1302 1307 7ff761688a0e-7ff761688a38 call 7ff7616955a0 call 7ff76168e0c0 1301->1307 1302->1307 1325 7ff7616889da-7ff7616889e8 call 7ff761686ee0 1302->1325 1304->1292 1305->1292 1324 7ff761688954-7ff76168896a WSAGetLastError call 7ff761686400 1305->1324 1329 7ff761688a4f-7ff761688a52 1307->1329 1330 7ff761688a3a-7ff761688a4a call 7ff761676100 1307->1330 1324->1292 1325->1246 1339 7ff7616889ee-7ff7616889f0 1325->1339 1327->1298 1337 7ff7616889f9-7ff761688a09 call 7ff761686ee0 1327->1337 1328->1298 1334 7ff761688aff-7ff761688b08 1329->1334 1335 7ff761688a58-7ff761688a60 1329->1335 1330->1329 1334->1248 1335->1334 1338 7ff761688a66-7ff761688a6d 1335->1338 1337->1248 1341 7ff761688a6f-7ff761688a84 connect 1338->1341 1342 7ff761688a98-7ff761688aa3 WSAGetLastError 1338->1342 1339->1248 1341->1342 1344 7ff761688a86-7ff761688a88 1341->1344 1345 7ff761688af2-7ff761688af4 1342->1345 1346 7ff761688aa5-7ff761688aae 1342->1346 1347 7ff761688afb-7ff761688afd 1344->1347 1348 7ff761688a8a-7ff761688a93 1344->1348 1345->1347 1346->1345 1349 7ff761688ab0-7ff761688af0 call 7ff761672e10 call 7ff761686400 call 7ff761686ee0 1346->1349 1347->1248 1348->1248 1349->1248
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                        • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                        • API String ID: 3453287622-3868455274
                                        • Opcode ID: de3b46a8bcf3fcc4f767d070f4b593ecd4b5ea27a084392ca60be2966fd7f509
                                        • Instruction ID: e83eb01eb975ef337939b8d125f592fb951a2d89219c7e225c3c8b174c2f75c1
                                        • Opcode Fuzzy Hash: de3b46a8bcf3fcc4f767d070f4b593ecd4b5ea27a084392ca60be2966fd7f509
                                        • Instruction Fuzzy Hash: E7F1E479A08282C6E790EB25D4582BDA3A6FB84F58FC04035DE4D47BA4DFBCE545DB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1872 7ff761695370-7ff7616953be socket 1873 7ff7616953c0 1872->1873 1874 7ff7616953c5-7ff76169541e htonl setsockopt 1872->1874 1875 7ff761695574-7ff761695592 call 7ff7616bff10 1873->1875 1876 7ff761695424-7ff761695439 bind 1874->1876 1877 7ff76169554b-7ff761695567 closesocket * 3 1874->1877 1876->1877 1880 7ff76169543f-7ff761695455 getsockname 1876->1880 1878 7ff76169556c 1877->1878 1878->1875 1880->1877 1882 7ff76169545b-7ff76169546a listen 1880->1882 1882->1877 1883 7ff761695470-7ff761695485 socket 1882->1883 1883->1877 1884 7ff76169548b-7ff7616954a0 connect 1883->1884 1884->1877 1885 7ff7616954a6-7ff7616954bc accept 1884->1885 1885->1877 1886 7ff7616954c2-7ff7616954de call 7ff761689790 1885->1886 1889 7ff7616954e5-7ff7616954ec 1886->1889 1889->1889 1890 7ff7616954ee-7ff761695508 send 1889->1890 1890->1877 1891 7ff76169550a-7ff761695526 recv 1890->1891 1891->1877 1892 7ff761695528-7ff76169553c memcmp 1891->1892 1892->1877 1893 7ff76169553e-7ff761695549 closesocket 1892->1893 1893->1878
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                        • String ID:
                                        • API String ID: 3699910901-0
                                        • Opcode ID: bd23299a83aadd02f23714b29ccd78fc92ed2d7b1aeddd9ecbc35c72079cd919
                                        • Instruction ID: 888d1e9666edddaf82229d9f4a894102ee64fb5b4b2b60100f9a0df3d66633d7
                                        • Opcode Fuzzy Hash: bd23299a83aadd02f23714b29ccd78fc92ed2d7b1aeddd9ecbc35c72079cd919
                                        • Instruction Fuzzy Hash: E0518F35608A42C2DB10AF25E458169B362EB85FB4FD05735EA7A43AE4DFBCD849CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1894 7ff761687290-7ff7616872dd 1895 7ff7616872e8-7ff761687323 call 7ff76168e0c0 1894->1895 1896 7ff7616872df-7ff7616872e3 1894->1896 1902 7ff761687328-7ff76168732b 1895->1902 1903 7ff761687325 1895->1903 1897 7ff761687806-7ff761687824 call 7ff7616bff10 1896->1897 1904 7ff76168732d-7ff761687330 1902->1904 1905 7ff761687348 1902->1905 1903->1902 1907 7ff761687343-7ff761687346 1904->1907 1908 7ff761687332-7ff761687335 1904->1908 1906 7ff76168734b-7ff761687377 call 7ff76168e150 1905->1906 1912 7ff761687379-7ff76168738d call 7ff761686280 1906->1912 1913 7ff761687392-7ff76168739a 1906->1913 1907->1906 1908->1906 1910 7ff761687337-7ff761687341 1908->1910 1910->1906 1922 7ff7616877f6-7ff7616877fe 1912->1922 1915 7ff76168739c-7ff7616873ae call 7ff761688460 1913->1915 1916 7ff7616873c9-7ff7616873e7 1913->1916 1926 7ff7616873c2-7ff7616873c4 1915->1926 1927 7ff7616873b0-7ff7616873b2 1915->1927 1919 7ff7616873f0-7ff761687405 1916->1919 1920 7ff76168740b-7ff76168741f call 7ff7616968f0 1919->1920 1921 7ff76168768a 1919->1921 1931 7ff761687425-7ff761687450 call 7ff76168e150 1920->1931 1932 7ff7616875a0-7ff7616875a3 1920->1932 1925 7ff76168768e-7ff76168769f 1921->1925 1922->1897 1925->1919 1929 7ff7616876a5-7ff7616876a7 1925->1929 1926->1922 1927->1926 1930 7ff7616873b4-7ff7616873bd call 7ff761688570 1927->1930 1933 7ff7616876ad-7ff7616876c4 call 7ff761688b90 1929->1933 1934 7ff7616877ec 1929->1934 1930->1926 1946 7ff761687469-7ff76168746c 1931->1946 1947 7ff761687452-7ff761687464 call 7ff761686400 1931->1947 1938 7ff7616875a5-7ff7616875ac 1932->1938 1939 7ff761687614-7ff76168765a SleepEx getsockopt 1932->1939 1950 7ff7616876ca-7ff7616876d1 1933->1950 1951 7ff761687777-7ff761687779 1933->1951 1936 7ff7616877ee 1934->1936 1936->1922 1938->1939 1942 7ff7616875ae-7ff7616875b0 1938->1942 1944 7ff76168765c-7ff761687664 WSAGetLastError 1939->1944 1945 7ff761687666 1939->1945 1948 7ff7616875b6-7ff7616875fc SleepEx getsockopt 1942->1948 1949 7ff7616874bf-7ff7616874c1 1942->1949 1952 7ff76168766a-7ff76168766c 1944->1952 1945->1952 1959 7ff76168746e-7ff761687475 1946->1959 1960 7ff7616874bb 1946->1960 1947->1946 1955 7ff7616875fe-7ff761687606 WSAGetLastError 1948->1955 1956 7ff76168760b-7ff76168760f 1948->1956 1949->1921 1953 7ff7616874c7-7ff7616874dc WSASetLastError 1949->1953 1957 7ff76168777b-7ff761687782 1950->1957 1958 7ff7616876d7-7ff7616876de 1950->1958 1951->1936 1961 7ff76168766e-7ff761687674 1952->1961 1962 7ff7616876e3-7ff761687731 1952->1962 1953->1921 1963 7ff7616874e2-7ff76168754c call 7ff76168f4b0 call 7ff761672e10 call 7ff761686400 1953->1963 1955->1949 1956->1949 1964 7ff76168778d-7ff761687794 1957->1964 1965 7ff761687784-7ff76168778b 1957->1965 1967 7ff7616877a6-7ff7616877e9 call 7ff761672e10 call 7ff761686280 1958->1967 1959->1960 1968 7ff761687477-7ff7616874a3 call 7ff76168e150 1959->1968 1960->1949 1961->1962 1971 7ff761687676-7ff761687685 call 7ff761686400 1961->1971 1969 7ff761687746-7ff76168775b call 7ff761688460 1962->1969 1970 7ff761687733-7ff76168773b call 7ff761686ee0 1962->1970 1997 7ff76168756e-7ff761687584 call 7ff761688b90 1963->1997 1998 7ff76168754e-7ff761687555 1963->1998 1973 7ff761687796-7ff76168779d 1964->1973 1974 7ff76168779f 1964->1974 1965->1967 1967->1934 1968->1960 1989 7ff7616874a5-7ff7616874b6 call 7ff761688b90 1968->1989 1969->1936 1986 7ff761687761-7ff761687763 1969->1986 1970->1969 1971->1921 1973->1967 1974->1967 1986->1936 1990 7ff761687769-7ff761687772 call 7ff761688570 1986->1990 1989->1960 1990->1951 2003 7ff761687597-7ff76168759b 1997->2003 2004 7ff761687586-7ff761687591 1997->2004 1998->1997 1999 7ff761687557-7ff76168755e 1998->1999 2002 7ff761687560-7ff761687563 1999->2002 2002->1997 2005 7ff761687565-7ff76168756c 2002->2005 2003->1925 2004->1921 2004->2003 2005->1997 2005->2002
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                        • API String ID: 0-3307081561
                                        • Opcode ID: 6ca6dc91ff338b192881d778bbf1bc3204aefb4b879638f902b09656aff86762
                                        • Instruction ID: f57e240b79dc6263e1bd07bfdf97039424884bc1da09a08a7a73e104bbaab9c1
                                        • Opcode Fuzzy Hash: 6ca6dc91ff338b192881d778bbf1bc3204aefb4b879638f902b09656aff86762
                                        • Instruction Fuzzy Hash: 58E1E22AB086C2C2EB94AB2594482BDA762FB85F94F804235DF5D07BD5DFBCE541C720
                                        APIs
                                          • Part of subcall function 00007FF7616708F0: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7616611FA), ref: 00007FF761670928
                                        • SleepEx.KERNELBASE ref: 00007FF761671C5F
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761671CD3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761671D14
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761671D4C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                        • API String ID: 18138616-2486835083
                                        • Opcode ID: 8aa7920c36d96e8ea77809a8d8df4f49feeafd954a798cd6ce7502069d1b875f
                                        • Instruction ID: c79d8872a67a2b173db9d697fa3e5f546769af52e260991d61ab861dc3373227
                                        • Opcode Fuzzy Hash: 8aa7920c36d96e8ea77809a8d8df4f49feeafd954a798cd6ce7502069d1b875f
                                        • Instruction Fuzzy Hash: EC81F636B28681C6EB10EB25E4542BDA363FB85B94F905336EA5D43AD5DFBCD081CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 982 7ff761662ab0-7ff761662aff call 7ff761662850 985 7ff7616630b8-7ff761663127 call 7ff761663130 Sleep exit 982->985 986 7ff761662b05-7ff761662b0a 982->986 991 7ff761663128-7ff76166312f call 7ff761661a00 985->991 986->985 987 7ff761662b10-7ff761662c2e call 7ff761663170 call 7ff761663c40 call 7ff7616632e0 call 7ff761663c40 call 7ff7616633e0 call 7ff761663c40 986->987 1005 7ff761662c64-7ff761662c7d 987->1005 1006 7ff761662c30-7ff761662c41 987->1006 1009 7ff761662cb5-7ff761662cbd 1005->1009 1010 7ff761662c7f-7ff761662c91 1005->1010 1007 7ff761662c43-7ff761662c56 1006->1007 1008 7ff761662c5f call 7ff7616bfb54 1006->1008 1007->1008 1011 7ff761662c58-7ff761662c5e _invalid_parameter_noinfo_noreturn 1007->1011 1008->1005 1015 7ff761662cf3-7ff761662d0b 1009->1015 1016 7ff761662cbf-7ff761662cd0 1009->1016 1013 7ff761662c93-7ff761662ca6 1010->1013 1014 7ff761662caf-7ff761662cb4 call 7ff7616bfb54 1010->1014 1011->1008 1013->1014 1021 7ff761662ca8-7ff761662cae _invalid_parameter_noinfo_noreturn 1013->1021 1014->1009 1019 7ff761662d0d-7ff761662d1e 1015->1019 1020 7ff761662d42-7ff761662d4a 1015->1020 1017 7ff761662cee call 7ff7616bfb54 1016->1017 1018 7ff761662cd2-7ff761662ce5 1016->1018 1017->1015 1018->1017 1023 7ff761662ce7-7ff761662ced _invalid_parameter_noinfo_noreturn 1018->1023 1025 7ff761662d3c-7ff761662d41 call 7ff7616bfb54 1019->1025 1026 7ff761662d20-7ff761662d33 1019->1026 1027 7ff761662d4c-7ff761662d5d 1020->1027 1028 7ff761662d80-7ff761662dc7 1020->1028 1021->1014 1023->1017 1025->1020 1026->1025 1032 7ff761662d35-7ff761662d3b _invalid_parameter_noinfo_noreturn 1026->1032 1034 7ff761662d7b call 7ff7616bfb54 1027->1034 1035 7ff761662d5f-7ff761662d72 1027->1035 1030 7ff761662dd8-7ff761662dfb 1028->1030 1031 7ff761662dc9-7ff761662dd6 1028->1031 1038 7ff761662dfd-7ff761662e04 1030->1038 1039 7ff761662e2f-7ff761662e32 1030->1039 1037 7ff761662e52-7ff761662ea8 call 7ff761663560 call 7ff761662850 call 7ff761664be0 call 7ff7616648d0 1031->1037 1032->1025 1034->1028 1035->1034 1041 7ff761662d74-7ff761662d7a _invalid_parameter_noinfo_noreturn 1035->1041 1060 7ff761662eae-7ff761662ebd call 7ff7616648d0 1037->1060 1061 7ff761662fb3-7ff761663023 call 7ff7616648d0 call 7ff7616bfb18 call 7ff761664320 call 7ff761665a10 call 7ff761663e60 1037->1061 1038->991 1043 7ff761662e0a-7ff761662e18 call 7ff7616bfb18 1038->1043 1044 7ff761662e3b 1039->1044 1045 7ff761662e34-7ff761662e39 call 7ff7616bfb18 1039->1045 1041->1034 1054 7ff761662e28-7ff761662e2e _invalid_parameter_noinfo_noreturn 1043->1054 1055 7ff761662e1a-7ff761662e26 1043->1055 1049 7ff761662e3e-7ff761662e4d memcpy 1044->1049 1045->1049 1049->1037 1054->1039 1055->1049 1067 7ff761662ec5 1060->1067 1068 7ff761662ebf-7ff761662ec3 1060->1068 1089 7ff761663025-7ff761663070 call 7ff7616648d0 call 7ff7616649b0 call 7ff761663b20 ShellExecuteA exit 1061->1089 1090 7ff761663071-7ff7616630b7 call 7ff7616648d0 call 7ff761664d10 call 7ff761663b20 MessageBoxA call 7ff761663ce0 exit 1061->1090 1070 7ff761662ec8-7ff761662ed1 1067->1070 1068->1070 1072 7ff761662ed3 1070->1072 1073 7ff761662ed6-7ff761662ef9 call 7ff761664320 call 7ff761663e60 1070->1073 1072->1073 1082 7ff761662efb-7ff761662f0c 1073->1082 1083 7ff761662f2f-7ff761662f43 1073->1083 1085 7ff761662f0e-7ff761662f21 1082->1085 1086 7ff761662f2a call 7ff7616bfb54 1082->1086 1087 7ff761662f79-7ff761662fb2 call 7ff7616bff10 1083->1087 1088 7ff761662f45-7ff761662f53 1083->1088 1085->1086 1093 7ff761662f23-7ff761662f29 _invalid_parameter_noinfo_noreturn 1085->1093 1086->1083 1095 7ff761662f55-7ff761662f68 1088->1095 1096 7ff761662f71-7ff761662f74 call 7ff7616bfb54 1088->1096 1089->1090 1090->985 1093->1086 1095->1096 1101 7ff761662f6a-7ff761662f70 _invalid_parameter_noinfo_noreturn 1095->1101 1096->1087 1101->1096
                                        APIs
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616628B7
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662927
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662987
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616629D7
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662A27
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662C58
                                          • Part of subcall function 00007FF7616648D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761664990
                                          • Part of subcall function 00007FF7616BFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7616643FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF7616BFB32
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662CA8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662CE7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662D35
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662D74
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662E28
                                        • memcpy.VCRUNTIME140 ref: 00007FF761662E4D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662F23
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662F6A
                                        • ShellExecuteA.SHELL32 ref: 00007FF761663062
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166306A
                                        • MessageBoxA.USER32 ref: 00007FF7616630A0
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616630B1
                                        • Sleep.KERNEL32 ref: 00007FF761663119
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761663121
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF761663128
                                          • Part of subcall function 00007FF761663170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166327F
                                          • Part of subcall function 00007FF761663170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616632C0
                                          • Part of subcall function 00007FF761663C40: memcpy.VCRUNTIME140 ref: 00007FF761663C93
                                          • Part of subcall function 00007FF7616632E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616633C0
                                          • Part of subcall function 00007FF7616633E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616634C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                        • String ID: Failure$download$invalidver$message$open$sessionid$success
                                        • API String ID: 3283070336-3881042241
                                        • Opcode ID: 5f9bf25ff3b757e267bd3f1163830185a6916ff23d5462c6ab610eb15cca5687
                                        • Instruction ID: 223ff00c58558ad8dd1f96630579c680f0bb9cff31f785d3374434e40413ec90
                                        • Opcode Fuzzy Hash: 5f9bf25ff3b757e267bd3f1163830185a6916ff23d5462c6ab610eb15cca5687
                                        • Instruction Fuzzy Hash: 3E02E566A08782C5EB00EB34E4583ADB772FB45B94F805235DA5D13ADADFBCD484C391

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1113 7ff76169bed0-7ff76169bf4d 1114 7ff76169bf4f-7ff76169bf53 1113->1114 1115 7ff76169bf6e-7ff76169bf73 1113->1115 1114->1115 1116 7ff76169bf55-7ff76169bf69 call 7ff761686400 1114->1116 1117 7ff76169bf92-7ff76169bf96 1115->1117 1118 7ff76169bf75-7ff76169bf8d call 7ff761686400 1115->1118 1129 7ff76169c3bc-7ff76169c3c9 1116->1129 1121 7ff76169bfb1-7ff76169bfb4 1117->1121 1122 7ff76169bf98-7ff76169bfac call 7ff761686400 1117->1122 1130 7ff76169c3b3-7ff76169c3b6 1118->1130 1123 7ff76169c2ca 1121->1123 1124 7ff76169bfba-7ff76169bfbe 1121->1124 1122->1130 1132 7ff76169c2d2-7ff76169c2da 1123->1132 1124->1123 1128 7ff76169bfc4-7ff76169bfd9 1124->1128 1133 7ff76169bfe0-7ff76169c00b realloc 1128->1133 1134 7ff76169bfdb-7ff76169bfde 1128->1134 1135 7ff76169c4d5-7ff76169c4db 1129->1135 1136 7ff76169c3cf-7ff76169c3d3 1129->1136 1130->1129 1130->1135 1137 7ff76169c2de 1132->1137 1141 7ff76169c02e-7ff76169c05b 1133->1141 1142 7ff76169c00d-7ff76169c029 call 7ff761686280 1133->1142 1134->1133 1140 7ff76169c05d-7ff76169c072 call 7ff761686600 1134->1140 1138 7ff76169c4ed-7ff76169c503 1135->1138 1139 7ff76169c4dd-7ff76169c4e0 1135->1139 1136->1135 1143 7ff76169c3d9-7ff76169c3dd 1136->1143 1144 7ff76169c2e6-7ff76169c2ec 1137->1144 1146 7ff76169c505-7ff76169c549 memcpy * 2 1138->1146 1147 7ff76169c54b-7ff76169c551 1138->1147 1139->1138 1145 7ff76169c4e2-7ff76169c4ea 1139->1145 1157 7ff76169c077-7ff76169c07d 1140->1157 1141->1140 1142->1129 1143->1135 1150 7ff76169c3e3-7ff76169c3f8 call 7ff761689110 1143->1150 1151 7ff76169c382-7ff76169c388 1144->1151 1152 7ff76169c2f2-7ff76169c307 call 7ff761686400 1144->1152 1145->1138 1153 7ff76169c575-7ff76169c597 call 7ff7616bff10 1146->1153 1155 7ff76169c553-7ff76169c556 1147->1155 1156 7ff76169c565-7ff76169c568 1147->1156 1177 7ff76169c4be-7ff76169c4d0 call 7ff761686400 1150->1177 1178 7ff76169c3fe-7ff76169c400 1150->1178 1159 7ff76169c0b0-7ff76169c0bf 1151->1159 1160 7ff76169c38e-7ff76169c39e 1151->1160 1182 7ff76169c312-7ff76169c322 1152->1182 1183 7ff76169c309-7ff76169c30c 1152->1183 1155->1156 1162 7ff76169c558-7ff76169c560 1155->1162 1163 7ff76169c570-7ff76169c572 1156->1163 1164 7ff76169c56a-7ff76169c56e 1156->1164 1165 7ff76169c282-7ff76169c28a 1157->1165 1166 7ff76169c083-7ff76169c08f 1157->1166 1159->1130 1169 7ff76169c0c5-7ff76169c0c7 1159->1169 1160->1130 1170 7ff76169c3a0-7ff76169c3a4 1160->1170 1162->1156 1163->1153 1164->1163 1172 7ff76169c2a2 1165->1172 1173 7ff76169c28c-7ff76169c29d 1165->1173 1174 7ff76169c091-7ff76169c097 1166->1174 1175 7ff76169c0a9-7ff76169c0ae 1166->1175 1169->1130 1180 7ff76169c0cd-7ff76169c0d0 1169->1180 1181 7ff76169c3ab 1170->1181 1172->1175 1186 7ff76169c2a8-7ff76169c2c5 1172->1186 1173->1159 1184 7ff76169c26e-7ff76169c27d call 7ff761686400 1174->1184 1185 7ff76169c09d-7ff76169c0a4 call 7ff761686400 1174->1185 1175->1159 1177->1135 1178->1177 1187 7ff76169c406-7ff76169c412 1178->1187 1188 7ff76169c0e2-7ff76169c160 call 7ff761688cd0 1180->1188 1189 7ff76169c0d2-7ff76169c0d6 1180->1189 1190 7ff76169c3ae call 7ff761686400 1181->1190 1192 7ff76169c328-7ff76169c369 call 7ff761686400 call 7ff76169a390 1182->1192 1193 7ff76169c4aa-7ff76169c4b9 1182->1193 1183->1182 1191 7ff76169c492-7ff76169c499 1183->1191 1184->1175 1185->1175 1186->1159 1187->1135 1206 7ff76169c162-7ff76169c167 1188->1206 1207 7ff76169c174-7ff76169c179 1188->1207 1189->1188 1196 7ff76169c0d8-7ff76169c0dc 1189->1196 1190->1130 1191->1181 1208 7ff76169c36f-7ff76169c37d call 7ff761686400 1192->1208 1209 7ff76169c49e-7ff76169c4a5 1192->1209 1193->1190 1196->1130 1196->1188 1206->1207 1210 7ff76169c169-7ff76169c16e 1206->1210 1211 7ff76169c17f-7ff76169c1a9 1207->1211 1212 7ff76169c21e-7ff76169c222 1207->1212 1208->1159 1209->1190 1210->1207 1216 7ff76169c417-7ff76169c41d 1210->1216 1217 7ff76169c1b0-7ff76169c1cb realloc 1211->1217 1218 7ff76169c1ab-7ff76169c1ae 1211->1218 1212->1132 1215 7ff76169c228-7ff76169c22d 1212->1215 1215->1132 1223 7ff76169c233-7ff76169c245 1215->1223 1221 7ff76169c41f-7ff76169c430 1216->1221 1222 7ff76169c446-7ff76169c471 call 7ff761672620 call 7ff761686400 1216->1222 1219 7ff76169c1d1-7ff76169c1f1 1217->1219 1220 7ff76169c476-7ff76169c48d call 7ff761686280 1217->1220 1218->1217 1224 7ff76169c1f5-7ff76169c1f9 1218->1224 1219->1224 1220->1130 1225 7ff76169c432 1221->1225 1226 7ff76169c43a-7ff76169c441 1221->1226 1222->1130 1223->1144 1230 7ff76169c24b-7ff76169c26c memcpy 1223->1230 1227 7ff76169c21c 1224->1227 1228 7ff76169c1fb-7ff76169c218 memcpy 1224->1228 1225->1226 1226->1181 1227->1212 1228->1227 1230->1137
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                        • API String ID: 3510742995-857957974
                                        • Opcode ID: 506055b4939d1d26318f95a523fa89b46b0c6926f7bc8d932d50e9497e368427
                                        • Instruction ID: 56fb50fe9b11d0d98674989a6d14e4a284e94a09ada37bbab652fae73d870c34
                                        • Opcode Fuzzy Hash: 506055b4939d1d26318f95a523fa89b46b0c6926f7bc8d932d50e9497e368427
                                        • Instruction Fuzzy Hash: 9B02F476A08A86C6EB50EB09D4483BDB7A6FB44F98F904576CE4E47790CFB8D841CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1356 7ff76169b360-7ff76169b3ce 1357 7ff76169b3f0 1356->1357 1358 7ff76169b3d0-7ff76169b3e5 1356->1358 1360 7ff76169b3f7-7ff76169b411 1357->1360 1358->1357 1359 7ff76169b3e7-7ff76169b3ee 1358->1359 1359->1360 1361 7ff76169b417-7ff76169b41c 1360->1361 1362 7ff76169badb 1360->1362 1361->1362 1363 7ff76169b422-7ff76169b430 1361->1363 1364 7ff76169b472-7ff76169b476 1363->1364 1365 7ff76169b432-7ff76169b46c malloc 1363->1365 1367 7ff76169b4c3-7ff76169b4d4 1364->1367 1368 7ff76169b478-7ff76169b4bd malloc 1364->1368 1365->1364 1366 7ff76169bacf 1365->1366 1366->1362 1369 7ff76169b4d6-7ff76169b4f0 realloc 1367->1369 1370 7ff76169b548-7ff76169b54a 1367->1370 1368->1366 1368->1367 1373 7ff76169b530-7ff76169b546 1369->1373 1374 7ff76169b4f2-7ff76169b4fc call 7ff761686280 1369->1374 1371 7ff76169b5aa-7ff76169b651 call 7ff761688cd0 malloc 1370->1371 1372 7ff76169b54c-7ff76169b570 call 7ff761686600 1370->1372 1371->1366 1381 7ff76169b657-7ff76169b671 memcpy 1371->1381 1379 7ff76169b575-7ff76169b578 1372->1379 1373->1370 1378 7ff76169b501 1374->1378 1382 7ff76169b506-7ff76169b52f call 7ff7616bff10 1378->1382 1383 7ff76169b7ef-7ff76169b7f6 1379->1383 1384 7ff76169b57e-7ff76169b580 1379->1384 1381->1378 1385 7ff76169b677-7ff76169b6e3 free 1381->1385 1389 7ff76169bac8-7ff76169baca 1383->1389 1390 7ff76169b7fc-7ff76169b808 1383->1390 1387 7ff76169b7d6-7ff76169b7ea call 7ff761686280 1384->1387 1388 7ff76169b586-7ff76169b58e 1384->1388 1396 7ff76169bab3-7ff76169baba 1385->1396 1397 7ff76169b6e9-7ff76169b6f0 1385->1397 1387->1382 1388->1387 1393 7ff76169b594-7ff76169b5a6 1388->1393 1389->1382 1390->1382 1393->1371 1398 7ff76169babe 1396->1398 1399 7ff76169b6f6-7ff76169b6fd 1397->1399 1400 7ff76169ba5c-7ff76169ba68 1397->1400 1398->1389 1401 7ff76169b6ff-7ff76169b702 1399->1401 1402 7ff76169b708-7ff76169b70f 1399->1402 1403 7ff76169ba6a-7ff76169ba96 call 7ff761672620 call 7ff761686280 1400->1403 1404 7ff76169ba9b-7ff76169baae 1400->1404 1401->1402 1405 7ff76169b80d-7ff76169b814 1401->1405 1406 7ff76169b710-7ff76169b714 1402->1406 1403->1382 1404->1382 1411 7ff76169b854-7ff76169b87d call 7ff761672620 call 7ff761686280 1405->1411 1412 7ff76169b816-7ff76169b81d 1405->1412 1408 7ff76169b753-7ff76169b75a 1406->1408 1409 7ff76169b716-7ff76169b71a 1406->1409 1416 7ff76169b769-7ff76169b772 1408->1416 1417 7ff76169b75c 1408->1417 1409->1408 1414 7ff76169b71c-7ff76169b737 call 7ff761686b40 1409->1414 1411->1378 1412->1403 1418 7ff76169b823-7ff76169b84f call 7ff761672620 call 7ff761686280 1412->1418 1428 7ff76169b73c-7ff76169b742 1414->1428 1416->1406 1420 7ff76169b774-7ff76169b778 1416->1420 1417->1416 1418->1382 1425 7ff76169b8a8-7ff76169b8af 1420->1425 1426 7ff76169b77e-7ff76169b783 1420->1426 1432 7ff76169b8b7-7ff76169b8be 1425->1432 1426->1425 1430 7ff76169b789-7ff76169b79a 1426->1430 1433 7ff76169b882-7ff76169b8a3 call 7ff761686280 1428->1433 1434 7ff76169b748-7ff76169b74d 1428->1434 1430->1432 1436 7ff76169b7a0-7ff76169b7c4 memcpy 1430->1436 1432->1398 1438 7ff76169b8c4-7ff76169b8c7 1432->1438 1433->1382 1434->1408 1434->1433 1436->1438 1439 7ff76169b7ca-7ff76169b7cf 1436->1439 1441 7ff76169b8d3-7ff76169b8db 1438->1441 1442 7ff76169b8c9 1438->1442 1439->1387 1443 7ff76169b903 1441->1443 1444 7ff76169b8dd-7ff76169b8f7 1441->1444 1442->1441 1446 7ff76169b90b-7ff76169b90e 1443->1446 1444->1443 1445 7ff76169b8f9-7ff76169b901 1444->1445 1445->1446 1447 7ff76169ba30-7ff76169ba38 1446->1447 1448 7ff76169b914-7ff76169b945 1446->1448 1447->1389 1449 7ff76169ba3e-7ff76169ba49 1447->1449 1453 7ff76169ba03-7ff76169ba2e call 7ff761672620 call 7ff761686280 1448->1453 1454 7ff76169b94b-7ff76169b953 1448->1454 1449->1389 1450 7ff76169ba4b-7ff76169ba57 call 7ff7616b63e0 1449->1450 1450->1382 1459 7ff76169b9d5-7ff76169b9d8 1453->1459 1454->1453 1457 7ff76169b959-7ff76169b95c 1454->1457 1457->1459 1460 7ff76169b95e-7ff76169b965 1457->1460 1462 7ff76169b9e0-7ff76169b9e2 1459->1462 1463 7ff76169b9da CertFreeCertificateContext 1459->1463 1464 7ff76169b9d0 1460->1464 1465 7ff76169b967-7ff76169b98e memset call 7ff7616b8dc0 1460->1465 1462->1447 1467 7ff76169b9e4-7ff76169b9f5 call 7ff761686280 1462->1467 1463->1462 1464->1459 1472 7ff76169b990-7ff76169b99a 1465->1472 1473 7ff76169b9cb 1465->1473 1467->1382 1474 7ff76169b9fa-7ff76169ba01 1472->1474 1475 7ff76169b99c-7ff76169b9a6 1472->1475 1473->1464 1477 7ff76169b9c3-7ff76169b9c6 call 7ff761686280 1474->1477 1475->1474 1476 7ff76169b9a8-7ff76169b9ba call 7ff76167f9f0 1475->1476 1476->1473 1481 7ff76169b9bc 1476->1481 1477->1473 1481->1477
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                        • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                        • API String ID: 860210379-3059304359
                                        • Opcode ID: 2c59ebb9b7ce04f204d0f2e7e6934fe0e351c55ed42fde726f7516aa0871ad94
                                        • Instruction ID: a277da9c358bcbbc401f40b9cf7e18f58b5c7d0404fe95f59c08abb048b66178
                                        • Opcode Fuzzy Hash: 2c59ebb9b7ce04f204d0f2e7e6934fe0e351c55ed42fde726f7516aa0871ad94
                                        • Instruction Fuzzy Hash: 3612713AA08A82C6EB60DF19D8587ADB3A2FB44F98F904536CA4D47794DFB8D845C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1482 7ff76169a580-7ff76169a5f0 1483 7ff76169a60f 1482->1483 1484 7ff76169a5f2-7ff76169a604 1482->1484 1485 7ff76169a616-7ff76169a630 call 7ff761689110 1483->1485 1484->1483 1486 7ff76169a606-7ff76169a60d 1484->1486 1489 7ff76169a632-7ff76169a63c call 7ff761686400 1485->1489 1490 7ff76169a641-7ff76169a648 1485->1490 1486->1485 1489->1490 1492 7ff76169a688 1490->1492 1493 7ff76169a64a-7ff76169a66a GetModuleHandleA GetProcAddress 1490->1493 1495 7ff76169a68a-7ff76169a69b 1492->1495 1493->1492 1494 7ff76169a66c-7ff76169a682 call 7ff761689110 1493->1494 1494->1492 1504 7ff76169a684-7ff76169a686 1494->1504 1497 7ff76169a6c0 1495->1497 1498 7ff76169a69d-7ff76169a6b5 1495->1498 1499 7ff76169a6c7-7ff76169a6ca 1497->1499 1498->1497 1501 7ff76169a6b7-7ff76169a6be 1498->1501 1502 7ff76169a6cc-7ff76169a6e3 call 7ff761689110 1499->1502 1503 7ff76169a70b-7ff76169a712 1499->1503 1501->1499 1510 7ff76169a6f2-7ff76169a706 call 7ff761686280 1502->1510 1511 7ff76169a6e5-7ff76169a6f0 1502->1511 1506 7ff76169a716-7ff76169a727 1503->1506 1504->1495 1508 7ff76169a729-7ff76169a741 1506->1508 1509 7ff76169a74c 1506->1509 1508->1509 1512 7ff76169a743-7ff76169a74a 1508->1512 1513 7ff76169a753-7ff76169a755 1509->1513 1523 7ff76169b30d-7ff76169b336 call 7ff7616bff10 1510->1523 1511->1506 1512->1513 1515 7ff76169a798-7ff76169a7a2 1513->1515 1516 7ff76169a757-7ff76169a773 call 7ff761680c70 call 7ff761680690 1513->1516 1518 7ff76169a7a8-7ff76169a7d3 1515->1518 1519 7ff76169b017-7ff76169b02e call 7ff761698210 1515->1519 1542 7ff76169a790-7ff76169a793 call 7ff761680ca0 1516->1542 1543 7ff76169a775-7ff76169a78d 1516->1543 1524 7ff76169a7d5-7ff76169a7ec 1518->1524 1525 7ff76169a80b 1518->1525 1533 7ff76169b030-7ff76169b041 call 7ff761698210 1519->1533 1534 7ff76169b043-7ff76169b04d call 7ff761686400 1519->1534 1529 7ff76169a7f5-7ff76169a7fc 1524->1529 1530 7ff76169a7ee-7ff76169a7f3 1524->1530 1531 7ff76169a810-7ff76169a81a 1525->1531 1536 7ff76169a805-7ff76169a809 1529->1536 1537 7ff76169a7fe-7ff76169a803 1529->1537 1530->1531 1538 7ff76169a822-7ff76169a82d 1531->1538 1539 7ff76169a81c-7ff76169a81f 1531->1539 1533->1534 1549 7ff76169b052-7ff76169b05d 1533->1549 1534->1549 1536->1531 1537->1531 1540 7ff76169afff-7ff76169b00e call 7ff761686280 1538->1540 1541 7ff76169a833-7ff76169a848 1538->1541 1539->1538 1555 7ff76169b308 1540->1555 1541->1540 1542->1515 1543->1542 1551 7ff76169b063-7ff76169b0e4 call 7ff761686400 call 7ff761688c90 1549->1551 1552 7ff76169b0e6-7ff76169b0f8 1549->1552 1554 7ff76169b0fd-7ff76169b155 calloc 1551->1554 1552->1554 1557 7ff76169b170-7ff76169b173 1554->1557 1558 7ff76169b157-7ff76169b161 call 7ff761686280 1554->1558 1555->1523 1561 7ff76169b166-7ff76169b16b 1557->1561 1562 7ff76169b175-7ff76169b1d3 1557->1562 1558->1561 1561->1523 1565 7ff76169b1d9-7ff76169b208 free 1562->1565 1566 7ff76169b27c-7ff76169b298 call 7ff761686b40 1562->1566 1567 7ff76169b256-7ff76169b277 call 7ff761672620 call 7ff761686280 1565->1567 1568 7ff76169b20a-7ff76169b210 1565->1568 1570 7ff76169b29d-7ff76169b2ba 1566->1570 1567->1523 1572 7ff76169b230-7ff76169b251 call 7ff761672620 call 7ff761686280 1568->1572 1573 7ff76169b212-7ff76169b22b call 7ff761672620 call 7ff761686280 1568->1573 1582 7ff76169b2f9-7ff76169b303 call 7ff761686280 1570->1582 1583 7ff76169b2bc-7ff76169b2bf 1570->1583 1572->1523 1573->1555 1582->1555 1583->1582 1587 7ff76169b2c1-7ff76169b2f7 1583->1587 1587->1523
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                        • API String ID: 1646373207-2477831187
                                        • Opcode ID: 5cf0ed48395b8395c8a13ee8555a2877c0ae128489894efa4f1ca97764d42106
                                        • Instruction ID: 9ea2a50c2c1269c37429e3117f1d48a5aed2139470a14e23ced205cd349c8ab1
                                        • Opcode Fuzzy Hash: 5cf0ed48395b8395c8a13ee8555a2877c0ae128489894efa4f1ca97764d42106
                                        • Instruction Fuzzy Hash: AC02D23AA08B82C6EB50AF25D8582FEB7A6FB44B88F804535DA5D47790DFB8D944C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1590 7ff76167bbc0-7ff76167bc0b calloc 1591 7ff76167bd4e-7ff76167bd57 _errno 1590->1591 1592 7ff76167bc11-7ff76167bc9a malloc 1590->1592 1593 7ff76167bd59-7ff76167bd75 1591->1593 1594 7ff76167bc9c-7ff76167bcc1 InitializeCriticalSectionEx call 7ff761695370 1592->1594 1595 7ff76167bcd7-7ff76167bcde 1592->1595 1605 7ff76167bcc7-7ff76167bccf 1594->1605 1606 7ff76167bd76-7ff76167bd8a _strdup 1594->1606 1597 7ff76167bcf0-7ff76167bd01 free 1595->1597 1598 7ff76167bce0-7ff76167bcea DeleteCriticalSection free 1595->1598 1600 7ff76167bd08-7ff76167bd10 1597->1600 1601 7ff76167bd03 call 7ff761698f90 1597->1601 1598->1597 1603 7ff76167bd18-7ff76167bd48 free 1600->1603 1604 7ff76167bd12 closesocket 1600->1604 1601->1600 1603->1591 1604->1603 1605->1595 1606->1595 1607 7ff76167bd90-7ff76167bdb0 free _strdup 1606->1607 1608 7ff76167bdde-7ff76167bde8 1607->1608 1609 7ff76167bdb2-7ff76167bdc1 call 7ff761699660 1607->1609 1611 7ff76167bdea-7ff76167be12 EnterCriticalSection LeaveCriticalSection 1608->1611 1612 7ff76167be61-7ff76167be7c free 1608->1612 1613 7ff76167bdc6-7ff76167bdcc 1609->1613 1614 7ff76167be25-7ff76167be28 1611->1614 1615 7ff76167be14-7ff76167be1c CloseHandle 1611->1615 1612->1591 1618 7ff76167be1e-7ff76167be20 1613->1618 1619 7ff76167bdce-7ff76167bddb _errno 1613->1619 1616 7ff76167be2a-7ff76167be2d call 7ff7616996b0 1614->1616 1617 7ff76167be32-7ff76167be42 call 7ff76167ba40 free 1614->1617 1620 7ff76167be48-7ff76167be4b 1615->1620 1616->1617 1617->1620 1618->1593 1619->1608 1623 7ff76167be4d-7ff76167be53 call 7ff761676410 1620->1623 1624 7ff76167be58-7ff76167be5b closesocket 1620->1624 1623->1624 1624->1612
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                        • String ID:
                                        • API String ID: 259767416-0
                                        • Opcode ID: 98ff7efcc35b3caf98631185ed50eeb00e79665cefe7d7535eea2b1d5459b9c6
                                        • Instruction ID: ceb67a2c9759efebc77e854bda16457e288ca99d15bc9ed411b726dd63f8afa2
                                        • Opcode Fuzzy Hash: 98ff7efcc35b3caf98631185ed50eeb00e79665cefe7d7535eea2b1d5459b9c6
                                        • Instruction Fuzzy Hash: 5D815C2AD05B81C6E724EF21E458269B361FB99B54F449235DF9E037A2DFB8E4E4C310
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                        • API String ID: 0-760484938
                                        • Opcode ID: 333162b9d2a570b1709d695479fe2e93abb5950393d2aa8a7880023664a13f02
                                        • Instruction ID: a03c76c2aaa396ab059a4ded56d397d1c57ade1aacc75461c293472f9c5cbfd7
                                        • Opcode Fuzzy Hash: 333162b9d2a570b1709d695479fe2e93abb5950393d2aa8a7880023664a13f02
                                        • Instruction Fuzzy Hash: 9042C46AA09BC2D1EB99EB2595483B8A392FB45F84F844135CE5D47B85DFBCE060C330

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,00007FF7616B2DCA,?,?,?,?,00007FF7616892FB), ref: 00007FF761688F84
                                        • GetProcAddress.KERNEL32(?,?,00007FF7616B2DCA,?,?,?,?,00007FF7616892FB), ref: 00007FF761688FA9
                                        • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF7616B2DCA,?,?,?,?,00007FF7616892FB), ref: 00007FF761688FBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                        • API String ID: 27745253-3327535076
                                        • Opcode ID: a3bf490c5095baffb162cfe67ac90165bb99800fd7677d2cde9ff42bc9170434
                                        • Instruction ID: f79fe7367ee19b5df4763aebaada426e6deab90397de02b4a4b94633f0f57fc0
                                        • Opcode Fuzzy Hash: a3bf490c5095baffb162cfe67ac90165bb99800fd7677d2cde9ff42bc9170434
                                        • Instruction Fuzzy Hash: 6C41E51AB09642C6FB55AF26A518138A792EF86FD5F888138CF0D07B90DE7DD486C730

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnogetpeernamegetsockname
                                        • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                        • API String ID: 2911674258-670633250
                                        • Opcode ID: 4e6bea4614707d1fdfe342ad5f7c7d8b18d1e85eb23cc2e6cd7b7f77dbf280fa
                                        • Instruction ID: 1515addb6a9f6107f23d339719a13d973a876c6789b1ad2ab62e581c02da527b
                                        • Opcode Fuzzy Hash: 4e6bea4614707d1fdfe342ad5f7c7d8b18d1e85eb23cc2e6cd7b7f77dbf280fa
                                        • Instruction Fuzzy Hash: AA919E2AA18BC1C2D750DF25D4582E9B3A1FB98F88F849236DE4C47755DF78E185CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2041 7ff761698fe0-7ff76169900d getaddrinfo 2042 7ff7616991a4-7ff7616991b1 2041->2042 2043 7ff761699013-7ff761699025 2041->2043 2044 7ff761699184-7ff76169918d WSASetLastError 2043->2044 2045 7ff76169902b 2043->2045 2046 7ff761699193-7ff7616991a0 2044->2046 2047 7ff761699030-7ff761699036 2045->2047 2046->2042 2048 7ff761699038-7ff76169903b 2047->2048 2049 7ff76169903d-7ff761699040 2047->2049 2050 7ff761699049-7ff76169904d 2048->2050 2051 7ff7616990f1-7ff7616990f8 2049->2051 2052 7ff761699046 2049->2052 2050->2051 2053 7ff761699053-7ff76169905a 2050->2053 2051->2047 2054 7ff7616990fe 2051->2054 2052->2050 2053->2051 2055 7ff761699060-7ff761699063 2053->2055 2056 7ff761699132-7ff76169913f 2054->2056 2055->2051 2057 7ff761699069-7ff76169907a malloc 2055->2057 2058 7ff761699141 freeaddrinfo 2056->2058 2059 7ff761699147-7ff76169914a 2056->2059 2062 7ff761699080-7ff7616990b5 malloc 2057->2062 2063 7ff76169912c 2057->2063 2058->2059 2060 7ff76169917f-7ff761699182 2059->2060 2061 7ff76169914c-7ff76169914f 2059->2061 2060->2044 2060->2046 2064 7ff761699151-7ff761699178 free * 3 2061->2064 2065 7ff76169917a-7ff76169917d 2061->2065 2066 7ff7616990b7-7ff7616990cd memcpy 2062->2066 2067 7ff76169911b-7ff76169912a free 2062->2067 2063->2056 2064->2064 2064->2065 2065->2046 2068 7ff7616990cf-7ff7616990dc _strdup 2066->2068 2069 7ff7616990de-7ff7616990e8 2066->2069 2067->2056 2068->2069 2070 7ff761699100-7ff761699119 free * 2 2068->2070 2071 7ff7616990ea 2069->2071 2072 7ff7616990ee 2069->2072 2070->2056 2071->2072 2072->2051
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                        • String ID:
                                        • API String ID: 2364279375-0
                                        • Opcode ID: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction ID: 85579d8d907b5168c903385f4e93a02ac8fc3973fa9721bf865088dd9b96d8a6
                                        • Opcode Fuzzy Hash: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction Fuzzy Hash: 5E516D79A09B42C7EB64AF11A518139E7A2FB48F98F844439CE9E13750CF7CE855C720

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2073 7ff7616968f0-7ff761696935 2074 7ff761696937-7ff76169693a 2073->2074 2075 7ff76169696b-7ff761696985 2073->2075 2074->2075 2078 7ff76169693c-7ff76169693f 2074->2078 2076 7ff761696987-7ff761696997 2075->2076 2077 7ff76169699c-7ff7616969b7 2075->2077 2076->2077 2079 7ff761696a47-7ff761696a53 2077->2079 2080 7ff7616969bd-7ff7616969c2 2077->2080 2078->2075 2081 7ff761696941-7ff761696944 2078->2081 2082 7ff761696aa0-7ff761696aaa 2079->2082 2083 7ff761696a55-7ff761696a69 2079->2083 2084 7ff7616969c4-7ff7616969ce 2080->2084 2085 7ff7616969d7-7ff7616969da 2080->2085 2086 7ff761696964-7ff761696966 2081->2086 2087 7ff761696946 2081->2087 2093 7ff761696ae3-7ff761696aeb 2082->2093 2094 7ff761696aac-7ff761696aaf 2082->2094 2088 7ff761696a7f-7ff761696a81 2083->2088 2089 7ff761696a6b 2083->2089 2084->2085 2090 7ff7616969d0-7ff7616969d5 2084->2090 2091 7ff7616969dc-7ff7616969e0 2085->2091 2092 7ff7616969fd-7ff761696a02 2085->2092 2097 7ff761696c0d 2086->2097 2095 7ff761696948-7ff761696956 WSASetLastError 2087->2095 2096 7ff76169695b-7ff76169695e Sleep 2087->2096 2101 7ff761696a83-7ff761696a86 2088->2101 2102 7ff761696a99-7ff761696a9c 2088->2102 2100 7ff761696a70-7ff761696a77 2089->2100 2090->2084 2090->2085 2091->2092 2103 7ff7616969e2-7ff7616969f6 2091->2103 2104 7ff761696a14-7ff761696a1e 2092->2104 2105 7ff761696a04-7ff761696a0b 2092->2105 2098 7ff761696af2 2093->2098 2099 7ff761696aed-7ff761696af0 2093->2099 2094->2093 2107 7ff761696ab1-7ff761696ab3 2094->2107 2095->2097 2096->2086 2106 7ff761696c0f-7ff761696c2f call 7ff7616bff10 2097->2106 2109 7ff761696b20-7ff761696b23 2098->2109 2110 7ff761696af4-7ff761696b1e 2098->2110 2108 7ff761696b2a-7ff761696b5a select 2099->2108 2100->2088 2111 7ff761696a79-7ff761696a7d 2100->2111 2101->2102 2112 7ff761696a88-7ff761696a95 2101->2112 2102->2082 2103->2092 2116 7ff761696a20-7ff761696a28 2104->2116 2117 7ff761696a3b-7ff761696a43 2104->2117 2105->2104 2113 7ff761696a0d-7ff761696a12 2105->2113 2107->2093 2115 7ff761696ab5-7ff761696ab8 2107->2115 2119 7ff761696b60-7ff761696b6a 2108->2119 2109->2108 2118 7ff761696b25 2109->2118 2110->2108 2111->2088 2111->2100 2112->2102 2113->2104 2113->2105 2121 7ff761696ac1 2115->2121 2122 7ff761696aba-7ff761696abc 2115->2122 2116->2117 2123 7ff761696a2a-7ff761696a37 2116->2123 2117->2079 2118->2108 2124 7ff761696b74 2119->2124 2125 7ff761696b6c-7ff761696b6f 2119->2125 2126 7ff761696ac3-7ff761696ad1 WSASetLastError 2121->2126 2127 7ff761696ad6-7ff761696ae1 Sleep 2121->2127 2122->2119 2123->2117 2128 7ff761696b76-7ff761696b78 2124->2128 2129 7ff761696b7d-7ff761696b80 2124->2129 2125->2106 2126->2119 2127->2119 2128->2106 2130 7ff761696baf-7ff761696bb2 2129->2130 2131 7ff761696b82-7ff761696baa __WSAFDIsSet * 2 2129->2131 2133 7ff761696bb4-7ff761696bc5 __WSAFDIsSet 2130->2133 2134 7ff761696bde-7ff761696be1 2130->2134 2131->2130 2132 7ff761696bac 2131->2132 2132->2130 2135 7ff761696bc7 2133->2135 2136 7ff761696bca-7ff761696bd9 __WSAFDIsSet 2133->2136 2134->2097 2137 7ff761696be3-7ff761696bf4 __WSAFDIsSet 2134->2137 2135->2136 2136->2134 2138 7ff761696bdb 2136->2138 2139 7ff761696bf6 2137->2139 2140 7ff761696bf9-7ff761696c08 __WSAFDIsSet 2137->2140 2138->2134 2139->2140 2140->2097 2141 7ff761696c0a 2140->2141 2141->2097
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction ID: f1f10ac66bc207e584e2723e922f96e32f574cdbd2fa31c9b8d5b4d09c739ff9
                                        • Opcode Fuzzy Hash: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction Fuzzy Hash: C6911A69B0C7C3C7EB246E2998582B9E292FB44B54FD04535ED1E86BC8DFBCDD018650
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                        • API String ID: 2635317215-3812100122
                                        • Opcode ID: 94f586bf51bbcc24e5a36e66b485c0dbac251b6b1e579bd488a4af3d2ed01ea2
                                        • Instruction ID: 8098feaa23313b90b5698a207af2ecf6c62864be76518dac0ace6557a1db7d5d
                                        • Opcode Fuzzy Hash: 94f586bf51bbcc24e5a36e66b485c0dbac251b6b1e579bd488a4af3d2ed01ea2
                                        • Instruction Fuzzy Hash: 9251C42AA0CB82C2FB99AB259494379E692EB84B94F940035DF4E43B90DF7CE455C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system
                                        • String ID: .8$h%49
                                        • API String ID: 3377271179-4206735779
                                        • Opcode ID: 5e185ff44131f8ffb292aacd92914df2fb238af3a598180558577508194563da
                                        • Instruction ID: 683a6ece0f980bae4a78c92d2a372523a15b928ef5d16ef2a585747d07639118
                                        • Opcode Fuzzy Hash: 5e185ff44131f8ffb292aacd92914df2fb238af3a598180558577508194563da
                                        • Instruction Fuzzy Hash: 6A616D26E187D6C9F301DB78E8091BCB772BB99B48F805378CEC965A15EFB85148C364
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                        • String ID:
                                        • API String ID: 1133592946-0
                                        • Opcode ID: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction ID: 39ef8531b7474a0d4be813eb34413aaa47f6c39abb9bd468e3cfea371415c1e2
                                        • Opcode Fuzzy Hash: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction Fuzzy Hash: 9A311D6DA0C243C2FB54BB65D45D3BAE293AF44F84FC45035E94D8B2D3DEADA444CA60
                                        APIs
                                          • Part of subcall function 00007FF761698FE0: getaddrinfo.WS2_32 ref: 00007FF761699002
                                          • Part of subcall function 00007FF761698FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF76169906E
                                          • Part of subcall function 00007FF761698FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF7616990A8
                                          • Part of subcall function 00007FF761698FE0: memcpy.VCRUNTIME140(?,?,?,00007FF76167BB05), ref: 00007FF7616990C1
                                          • Part of subcall function 00007FF761698FE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF7616990CF
                                          • Part of subcall function 00007FF761698FE0: freeaddrinfo.WS2_32(?,?,?,00007FF76167BB05), ref: 00007FF761699141
                                          • Part of subcall function 00007FF761698FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF761699155
                                          • Part of subcall function 00007FF761698FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF76169915F
                                          • Part of subcall function 00007FF761698FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76167BB05), ref: 00007FF76169916C
                                        • WSAGetLastError.WS2_32 ref: 00007FF76167BB0B
                                        • WSAGetLastError.WS2_32 ref: 00007FF76167BB15
                                        • EnterCriticalSection.KERNEL32 ref: 00007FF76167BB30
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF76167BB3F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167BB50
                                        • send.WS2_32 ref: 00007FF76167BB73
                                        • WSAGetLastError.WS2_32 ref: 00007FF76167BB7D
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF76167BB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                        • String ID:
                                        • API String ID: 506363382-0
                                        • Opcode ID: 42967842f68ceaa853a16063dead967f6bbf823a8214e1f46a4740f52b57b5c3
                                        • Instruction ID: 9ff24136a2c2d5fe376fa34484bdf6ee417e5fb246f968359f98c11eb1e52fd3
                                        • Opcode Fuzzy Hash: 42967842f68ceaa853a16063dead967f6bbf823a8214e1f46a4740f52b57b5c3
                                        • Instruction Fuzzy Hash: 26317636A08642C1E750EF35E45827AB3A1FF84F98F805135DA5E836A8DFBCD445C750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction ID: 1fd47aa5ffc9fdb58f4485c7f8db62f613e1f599ea05449f523bc468ee48d7a1
                                        • Opcode Fuzzy Hash: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction Fuzzy Hash: 3CA14B39B187D3C3EB696A249408279A296FF44FA4F804635ED1E4A7C4DFBCDC0087A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                        • API String ID: 1294909896-116363806
                                        • Opcode ID: fcdcb546c2ff38549d5665a737929d8b34cdd20e5421ad5796662c5f6d9b2a83
                                        • Instruction ID: be9edefcff60d18fe843b3933adbb8c7266c1628f926bbef6041549ee7abf8d3
                                        • Opcode Fuzzy Hash: fcdcb546c2ff38549d5665a737929d8b34cdd20e5421ad5796662c5f6d9b2a83
                                        • Instruction Fuzzy Hash: 1691583AA08F82C6EB109F26E8586ADB7A5FB84F88F840535CE4C47764DF78D455CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                        • API String ID: 3056473165-3891197721
                                        • Opcode ID: 15afd01cc10f0f667c3f5a3174878e9689908f63161baae8e2ae478f917debe8
                                        • Instruction ID: 16cfe9fd48550e41f4bb45d990886313c1d4c413bc21b3af2ed998160f15a71c
                                        • Opcode Fuzzy Hash: 15afd01cc10f0f667c3f5a3174878e9689908f63161baae8e2ae478f917debe8
                                        • Instruction Fuzzy Hash: 7171BD7AB08B42CAEB10DB65D4146AD73A2FB48BA8F404635DE2E477C4EF78E406C350
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s$Connection #%ld to host %s left intact
                                        • API String ID: 1294909896-118628944
                                        • Opcode ID: e91a0139a46916ed625c7b167e581e5f61640a50a9e451340a2a8c6e17119c8f
                                        • Instruction ID: 6939cbd979abdaa072c135b3fd944d666c366229cf01369d4a9b679337f98d5b
                                        • Opcode Fuzzy Hash: e91a0139a46916ed625c7b167e581e5f61640a50a9e451340a2a8c6e17119c8f
                                        • Instruction Fuzzy Hash: 1F91703AB18682C2E758BB25D54C3B9A3A2FB45F84F844435DE5E07695CFB8E460C760
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761681ACB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761681AE1
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616818FD
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168191A
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168192E
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168194A
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681967
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168198A
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168199E
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819B2
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819D8
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819EC
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A00
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A4F
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A5C
                                          • Part of subcall function 00007FF761681880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A85
                                        • memset.VCRUNTIME140 ref: 00007FF761681B15
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 2717317152-3248832348
                                        • Opcode ID: cbfb84e7a1472e2dc6d1eeab6a04b2804bc59b0f2f042e7c9ebc47c7a51ee133
                                        • Instruction ID: 1f8f20b07f77147341fb80e47e01e27c0ea970dede5e69ecce233e9977904345
                                        • Opcode Fuzzy Hash: cbfb84e7a1472e2dc6d1eeab6a04b2804bc59b0f2f042e7c9ebc47c7a51ee133
                                        • Instruction Fuzzy Hash: 9871906AA0CAC2C5E791EF2590183BDA762EB81F94F884131DA6D4B685DFBCE551C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memcpy
                                        • String ID: 1.1
                                        • API String ID: 4107583993-2150719395
                                        • Opcode ID: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction ID: cc3ac096b4fac63bc3457d15a6714998966cb143ff1499db940cbd9b830eb7f8
                                        • Opcode Fuzzy Hash: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction Fuzzy Hash: BE519E7A608B82C6DB689F22E8443AAA3A1FB48F84F848475CF9E47754CF7CE455C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastmallocrecvsend
                                        • String ID: Send failure: %s
                                        • API String ID: 25851408-857917747
                                        • Opcode ID: a5ce54b1df877b377e05a55ce1a3bd729fb743bbe0ebbe527092706ffc3e8082
                                        • Instruction ID: 3539dba6bd503b5edcdb128609daa410cfadfb268bd9715ebe411f3bfcf44cff
                                        • Opcode Fuzzy Hash: a5ce54b1df877b377e05a55ce1a3bd729fb743bbe0ebbe527092706ffc3e8082
                                        • Instruction Fuzzy Hash: 9141C4BAB15781C5EBA0AF25E818779A392BB08FA8F854135CE5D47784DF7CD454C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 1294909896-3343404259
                                        • Opcode ID: 10657737ca2f4763c17a4a63984ea63c382b0e81ced8098d2d3c6f5d42afd508
                                        • Instruction ID: 329433f9daeb63caba2f52a5207c15e8cd16bc39687e693d709305304e84e617
                                        • Opcode Fuzzy Hash: 10657737ca2f4763c17a4a63984ea63c382b0e81ced8098d2d3c6f5d42afd508
                                        • Instruction Fuzzy Hash: 13D1C469A08682C5FB64AF29901C3BCA3A6FF45F88F885431CE0D57695DFB8E840D360
                                        APIs
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616628B7
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662927
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662987
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616629D7
                                          • Part of subcall function 00007FF761662850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662A27
                                        • MessageBoxA.USER32 ref: 00007FF761663737
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166379A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                        • String ID: keyauth.win$null
                                        • API String ID: 3545939226-2841560827
                                        • Opcode ID: 76f9a87719a452213c4479f1c826fb0046e9d8ca55bd5f92ce028bc9c21a3b28
                                        • Instruction ID: 937ec8179d8e627fcbb7ec2209aeb1e991ff720ea5278d470e394cb0bea3ed92
                                        • Opcode Fuzzy Hash: 76f9a87719a452213c4479f1c826fb0046e9d8ca55bd5f92ce028bc9c21a3b28
                                        • Instruction Fuzzy Hash: 6B51CD6AA1879185FB04EB75D4183AC6372AB04F88F804135DE4D27B8ACFBC9592C391
                                        APIs
                                          • Part of subcall function 00007FF761688F70: GetModuleHandleA.KERNEL32(?,?,?,00007FF7616B2DCA,?,?,?,?,00007FF7616892FB), ref: 00007FF761688F84
                                        • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF7616892FB), ref: 00007FF7616B2DE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressCallerHandleModuleProc
                                        • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                        • API String ID: 2084706301-3788156360
                                        • Opcode ID: 8c00c9138cdfd17adfae597e72f02553676a85cbf6f4c48e13838bd5606a6a78
                                        • Instruction ID: c486bb3fe2580a3267503474eb6154632ad2b0dd40ed1f35a2c346ee7edbd38e
                                        • Opcode Fuzzy Hash: 8c00c9138cdfd17adfae597e72f02553676a85cbf6f4c48e13838bd5606a6a78
                                        • Instruction Fuzzy Hash: 5DF01D6DE09602C1FF84FB15A8997B193D2AF54B44FC44438C40C42290EEBCE5A5C760
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 0-3343404259
                                        • Opcode ID: 0941e4454e05a29280e0911c3d610acfc878dd03c0a985a790bc3422c380df87
                                        • Instruction ID: 62f1158a8d1e4c285a82faf00ff0e018e4a354dfd3669beaf012062e8ad5a7de
                                        • Opcode Fuzzy Hash: 0941e4454e05a29280e0911c3d610acfc878dd03c0a985a790bc3422c380df87
                                        • Instruction Fuzzy Hash: DCB1A36AA08642C5FB64BE69905C27CA3A6EF41F48F985531CE1E472A5DFBCEC40D370
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761691CE0
                                          • Part of subcall function 00007FF761692270: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616922CA
                                          • Part of subcall function 00007FF761692020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616920B8
                                          • Part of subcall function 00007FF761692020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616920C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                        • API String ID: 3095843317-1242256665
                                        • Opcode ID: 9d4a322be4d87f538412dcdcd1c490b66af6a80acae25ef714a6566053d54fc5
                                        • Instruction ID: 427f6e5124829e11395a42e3cdb63b527a845f0c2157d9ee3f50aadf86e6ce06
                                        • Opcode Fuzzy Hash: 9d4a322be4d87f538412dcdcd1c490b66af6a80acae25ef714a6566053d54fc5
                                        • Instruction Fuzzy Hash: 8A41B62AA086C7C6E760FB25A4043B9B7A6EB85B94F944476DA4C47685DEBCD804CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket$calloc
                                        • String ID:
                                        • API String ID: 2958813939-0
                                        • Opcode ID: 28d21d9544194ec4c8a92fbe0cca9a50be666e2dc753f7074a652fd99a0cf093
                                        • Instruction ID: 46bb6aaab449f6f8a294dcbe3fec44f7df3c0d4f7cfa0df03a9f42fd5c902aa8
                                        • Opcode Fuzzy Hash: 28d21d9544194ec4c8a92fbe0cca9a50be666e2dc753f7074a652fd99a0cf093
                                        • Instruction Fuzzy Hash: 96419039A08A82C1E740FF35D4582E9A362EF88F28FC44631DE5D866D6EFB8D5058330
                                        APIs
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7616611FA), ref: 00007FF761670928
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7616611FA), ref: 00007FF7616709C9
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7616709E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 326894585-0
                                        • Opcode ID: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction ID: 71d2054a76be9988d9b3a7435d42585afc553b1c72706f4729087a713536fbff
                                        • Opcode Fuzzy Hash: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction Fuzzy Hash: 5331296AB09746C1FB14BB11A50837CA2529F05FE4F941630DE6D47BC2DFBDA492C320
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                        • API String ID: 0-3791222319
                                        • Opcode ID: 76ab87318427c543c7d98e024c2e6d2fa0a766b8a8d724eff69a9d546786b0fd
                                        • Instruction ID: 1675d7918dda9223f29973019dd3207dee9a27b576f2349a8fd493cf1a2daaab
                                        • Opcode Fuzzy Hash: 76ab87318427c543c7d98e024c2e6d2fa0a766b8a8d724eff69a9d546786b0fd
                                        • Instruction Fuzzy Hash: 41519425F09643C7EB54EB159548279A3D2EB44FA8F948A71DE1D872E1DFBCE841C320
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616790FA
                                        • memcpy.VCRUNTIME140 ref: 00007FF76167922C
                                        • memcpy.VCRUNTIME140 ref: 00007FF761679248
                                          • Part of subcall function 00007FF76168E6E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761677003,?,?,00000000,00007FF7616818D2,?,?,00000000,00007FF761681F05), ref: 00007FF76168E71C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freememcpy
                                        • String ID:
                                        • API String ID: 3223336191-0
                                        • Opcode ID: 54aff36e5212d6146394b1c18812124a5a0137bacb8697812285b3b45e936068
                                        • Instruction ID: f27b297d95e9788a1e97effd32809ac4d626964bc4b6debf59b0a6157e326b78
                                        • Opcode Fuzzy Hash: 54aff36e5212d6146394b1c18812124a5a0137bacb8697812285b3b45e936068
                                        • Instruction Fuzzy Hash: 88C18F36B14A02C6EB54AB69D4083AC73B2BB45BA8F844639CE2D177D8DF78D445C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freerecv
                                        • String ID:
                                        • API String ID: 2032557106-0
                                        • Opcode ID: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction ID: 8d63244deb1d518445674819adfeccb62133c3fc3bb0bb5cafba3a5c8ff0f191
                                        • Opcode Fuzzy Hash: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction Fuzzy Hash: 9BC1F97AA086C2C6FB65AB2590583B9A391FF44FA4F944235DE6E437C4EFBCD8418710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 1294909896-3248832348
                                        • Opcode ID: acf7e0c6a19e3e6413a3c3b3ac2091e70b7d1ead12cd6da52550afa0c6970e1d
                                        • Instruction ID: e8b872c2a9376dde132f77ed96efb097a9607158a5bed794bd850fb78ca18b6b
                                        • Opcode Fuzzy Hash: acf7e0c6a19e3e6413a3c3b3ac2091e70b7d1ead12cd6da52550afa0c6970e1d
                                        • Instruction Fuzzy Hash: E5518E66A08AC1C1EB919F35D0183EDA761EB85F98F884135DE9C0B79ACFB8D495C330
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 4275364305-0
                                        • Opcode ID: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction ID: 86a2391ae8ff6b8c1356db2fe227b37bb3e4c93c9ea96fa6098c8495c75b225b
                                        • Opcode Fuzzy Hash: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction Fuzzy Hash: D4118669E18582C1EB10FB14E469369B372FF85F98FC04236D59D026E9DFACD454C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID:
                                        • API String ID: 2514157807-0
                                        • Opcode ID: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction ID: bcc718bbf4e5873cb4703b9faac14260c87be3811c74e79d5cb965906486ae1d
                                        • Opcode Fuzzy Hash: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction Fuzzy Hash: A1E0DF21F0460982FF286770A86933922959B58B31F845738CA3B867C0DEAC44D68B10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func__stdio_common_vfprintf
                                        • String ID:
                                        • API String ID: 2168557111-0
                                        • Opcode ID: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction ID: 2dd562416676dd8c5e2c92a89bde93184ccfdd1f9b805ea69af9c4b208513109
                                        • Opcode Fuzzy Hash: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction Fuzzy Hash: 27E01C32A08B81C2D7009B50F85846AA3A5FB98BC4F804139EE8C47A24CF7CC1A5CB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction ID: 1d83dc87e79fa51eca40d5586c39dd121af50163a0df92fb53270a63fed50edf
                                        • Opcode Fuzzy Hash: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction Fuzzy Hash: 14019616B165C1C1FB54E73AD19C37DA392EF88F88F988031DB0D47695CF68D4A58720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket
                                        • String ID:
                                        • API String ID: 98920635-0
                                        • Opcode ID: f0bb34100cf0a741a16ee44f1e954a57bc67ddd83bf44124ffd341ded78523cc
                                        • Instruction ID: 3cc2468ce646a4bb12018975cb698a31d11d36e25cfbae056c70d84c1c9e3241
                                        • Opcode Fuzzy Hash: f0bb34100cf0a741a16ee44f1e954a57bc67ddd83bf44124ffd341ded78523cc
                                        • Instruction Fuzzy Hash: 52E06D2AE06641C2DF48A726C8996A96362AB50F64FC44375CA3E02BD0CE6D96569B20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _beginthreadex
                                        • String ID:
                                        • API String ID: 3014514943-0
                                        • Opcode ID: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction ID: 5e3b80dad44f0a04bbe5501c4c9cfeea91843faed5dc8be7071130ffab9cc333
                                        • Opcode Fuzzy Hash: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction Fuzzy Hash: 5BD02B63718A00839F10DF72A844029E252F788770B88473DEE7D837E0DF3CD1418A00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ioctlsocket
                                        • String ID:
                                        • API String ID: 3577187118-0
                                        • Opcode ID: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction ID: edf8df851eee0852acecd80080920cd2e82b86c4607647d6f07bb2681e4839a7
                                        • Opcode Fuzzy Hash: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction Fuzzy Hash: B6C01256E15581C283446F619489086A672AB84605F956429D50642124DD3CC2A58A40
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000001,00007FF76167901F), ref: 00007FF76168E7A8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc
                                        • String ID:
                                        • API String ID: 2803490479-0
                                        • Opcode ID: 2776bca9db8f599c86e0e75b1e27d899bf5cee7a17272ec46874e0d708622458
                                        • Instruction ID: 8a024900c0689ed82d722ad454637d39d6911e12baea1a47caa2fa7c905e5721
                                        • Opcode Fuzzy Hash: 2776bca9db8f599c86e0e75b1e27d899bf5cee7a17272ec46874e0d708622458
                                        • Instruction Fuzzy Hash: B811B476F15B41C2DBA0DF0AB144129A2A1FF48B84F995034DA9D47B48DF78D491C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                        • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                        • API String ID: 3939785054-690044944
                                        • Opcode ID: a1538a2fe93912e992e6f2d42a2ea1633298ef863c6a51220481b0b8fab12c33
                                        • Instruction ID: e6cc66a6fd8d66544088b687c671c09b6fa98136b96b3bb64d0b7a2ce382d26e
                                        • Opcode Fuzzy Hash: a1538a2fe93912e992e6f2d42a2ea1633298ef863c6a51220481b0b8fab12c33
                                        • Instruction Fuzzy Hash: 1EC2AC79A08683C6EB60EF2595083F9A792EB41F88F884475CE5D4B685DFEDE841C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                        • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                        • API String ID: 2059720140-3844637060
                                        • Opcode ID: aefc85c06da91ef1b4f678a21f8745f1fa9ed17bfba3c9c6ac9d2c0e2c9fcc93
                                        • Instruction ID: 022cb95eadebd8357458fb97afdc5d87e47940040e495fa500be5e021b4487c3
                                        • Opcode Fuzzy Hash: aefc85c06da91ef1b4f678a21f8745f1fa9ed17bfba3c9c6ac9d2c0e2c9fcc93
                                        • Instruction Fuzzy Hash: 08729229A09B86C5FB60AB25D4583B9E7E2EF45F6CF844535CA8E026D5DFBCE444C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$#211$fwrite$#217calloc
                                        • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                        • API String ID: 2742731861-78870445
                                        • Opcode ID: a497366483bd6b5936b9a45555906512a1da7f8d15384eb5b45bda77f332d582
                                        • Instruction ID: 193f43f40db2e789c42ba9999acbaa47a3f78a8317be401c4713c349d48d40c5
                                        • Opcode Fuzzy Hash: a497366483bd6b5936b9a45555906512a1da7f8d15384eb5b45bda77f332d582
                                        • Instruction Fuzzy Hash: 6E428E79B09A42C6FB10EB62D4582BDA3A2FB44F88F805435CE4E57B94DEBCE405C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 1664669839-85532522
                                        • Opcode ID: 57745755b259e84db2332ad81b64edb5a67cb0af63b873a31d00d3511d4f9ebf
                                        • Instruction ID: dacb373c17a74c09ec7986ce1c0fd65ad408a9a4f42dd7a449686cce34d4aeb0
                                        • Opcode Fuzzy Hash: 57745755b259e84db2332ad81b64edb5a67cb0af63b873a31d00d3511d4f9ebf
                                        • Instruction Fuzzy Hash: 3AA2E876A18B86C6EB00EB79D4483ADA372FB41B94F801235DA5D13AE9DFBCD085C351
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 969624648-85532522
                                        • Opcode ID: 6a2c001b71bb5fe8af0eb5e9b9917663cb907f74e938879a36589b2774ab7813
                                        • Instruction ID: f8cae52e2e1656407ad4b1309fd5df12c1426022547d44d9d0af96a5d18fade2
                                        • Opcode Fuzzy Hash: 6a2c001b71bb5fe8af0eb5e9b9917663cb907f74e938879a36589b2774ab7813
                                        • Instruction Fuzzy Hash: 4B92E666B18B85C2EB10DB78E4483ADA372FB45BA4F805231DA5D27AD9DFBCD084C351
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Cert$Certificate$Chain$ErrorFreeLast$userStore$CloseContextCreateNameOpenString
                                        • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain user: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                        • API String ID: 561913010-2037819326
                                        • Opcode ID: cd7eead237edb2df29b0f3e516ee76bf61877b4d14e84d580c823e5bfa7684d5
                                        • Instruction ID: bba9780c4db911c782d62c1be95d3d4f43b9410ac5f1b67ebc551ce1bf8d0f9a
                                        • Opcode Fuzzy Hash: cd7eead237edb2df29b0f3e516ee76bf61877b4d14e84d580c823e5bfa7684d5
                                        • Instruction Fuzzy Hash: 1042C07AA08B82C1EB60EB25E4482B9B7A2FB44F94F804135DE5D07794DFBCE555CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastcallocfreegetsockname
                                        • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                        • API String ID: 2454324209-2383553807
                                        • Opcode ID: 63061f5b76a2deed0df9e591f082b43592a29dbb5e6961dc9413e779db65148c
                                        • Instruction ID: e268e37bc1b163cd133e4cc499fe045bfa3b0432aa84dae19634df7f88b78e05
                                        • Opcode Fuzzy Hash: 63061f5b76a2deed0df9e591f082b43592a29dbb5e6961dc9413e779db65148c
                                        • Instruction Fuzzy Hash: 5C22C669A0C782C1EB50EB21E4582BEA7A3FB45F84FC05036DA4E47A95DFBCE544C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocstrncmp
                                        • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                        • API String ID: 1436789207-471711153
                                        • Opcode ID: 5445a359841f54012be177e1d28c1cb122a8af7dff79599376bd044fc9e4994f
                                        • Instruction ID: c8801b0e3cc54c2cfb6692d2227b8f40871474634a553b986616a42dab2482da
                                        • Opcode Fuzzy Hash: 5445a359841f54012be177e1d28c1cb122a8af7dff79599376bd044fc9e4994f
                                        • Instruction Fuzzy Hash: 70A19F2AB09642C1FB50AF22A82C6B9A692AF44FD4FC44475DD6E47794EFBCE401C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateFile_errnofree
                                        • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                        • API String ID: 1377488173-902404565
                                        • Opcode ID: ae19b7c693a3376d514824ed8022f99d215922fa346540a39cf7b5fbf14a00b1
                                        • Instruction ID: 813f5ba1b98664a0adeada1e5d995f19cdade94c2a7df70e48c08f4f5f015326
                                        • Opcode Fuzzy Hash: ae19b7c693a3376d514824ed8022f99d215922fa346540a39cf7b5fbf14a00b1
                                        • Instruction Fuzzy Hash: DCB19279B18752C2E710AB66E4086A9A6A3BF44F84FC05036DE4D47B94DFBCE505CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                        • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                        • API String ID: 1339443121-1021110354
                                        • Opcode ID: d49dbb8062e0f3f83e2c35fdfaf63a3a002192681677a66c2cb64c26a65ca173
                                        • Instruction ID: e77654e7aa1e50105bbdd7dd037ee8c4fb7c2e4a26e228e47653dfd153512434
                                        • Opcode Fuzzy Hash: d49dbb8062e0f3f83e2c35fdfaf63a3a002192681677a66c2cb64c26a65ca173
                                        • Instruction Fuzzy Hash: 79029429A0D782C5EB91EB15A4583BAA796EF45F88F884035DE8D47B85DFBCE404C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-4282655970
                                        • Opcode ID: f67e65bda64f7bc2ff11744649ac0d4417b9831fe5915c7b7913ff7f7f31b820
                                        • Instruction ID: 0e74e119b9b6795d4192c4f5d0491c34cc7ba83bcf98e2d288250ccd0fd88279
                                        • Opcode Fuzzy Hash: f67e65bda64f7bc2ff11744649ac0d4417b9831fe5915c7b7913ff7f7f31b820
                                        • Instruction Fuzzy Hash: 59819F29F09643C2FB55AF259858279A2D2BF05F94F844538CE1E467A0EFBCE844C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 958247072-579821726
                                        • Opcode ID: bb7f3fb9ed15c36171e49e9f8989b7fec12843ec510944212f621a99c3a71fb2
                                        • Instruction ID: 621f3d20abf976af62d937409e4dc94a90ecf7ff9fac9524a575c0e58e187c5e
                                        • Opcode Fuzzy Hash: bb7f3fb9ed15c36171e49e9f8989b7fec12843ec510944212f621a99c3a71fb2
                                        • Instruction Fuzzy Hash: D532D366A08B86C5EB10DB78D4483EDA372FB41B98F805235DA5D17AE9DFBCD084C391
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-1887299029
                                        • Opcode ID: d27a0d2bd81bbd69c5f44cbac832e1c64e7776eb9c4d4244ef604611dd81367d
                                        • Instruction ID: 13d1bd186d8a961cbf7fdca947832d37bd27cbd4b27a59089d679e92fcabc656
                                        • Opcode Fuzzy Hash: d27a0d2bd81bbd69c5f44cbac832e1c64e7776eb9c4d4244ef604611dd81367d
                                        • Instruction Fuzzy Hash: 6681AF29F09643C2FB55AF21A858279A2D2BF05F94F844538CE1E467E0EFBCE844C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno
                                        • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                        • API String ID: 3939687465-1752685260
                                        • Opcode ID: 2c2ecc4646857d6feea65fdae523bac12c2e5c780fb340e982890c109351eac7
                                        • Instruction ID: d8fb68ba984ecbba769120bfde8302bed49feb0775e925cc2751fd202cf04c0d
                                        • Opcode Fuzzy Hash: 2c2ecc4646857d6feea65fdae523bac12c2e5c780fb340e982890c109351eac7
                                        • Instruction Fuzzy Hash: 21518329A0C682C5E761EF34A4583BAA3A6FB84F44FC0453ADA4D02695DFBCE514CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno$strtol
                                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                        • API String ID: 3596500743-988243589
                                        • Opcode ID: d49d3298ae75f34013cd756147334e6d7bf0667b6907b24902a762b26ed2f88a
                                        • Instruction ID: 184ff64258ec61eb84c86e88bc321a81fa841a2bc7832b6dfeebb90b7afb58a6
                                        • Opcode Fuzzy Hash: d49d3298ae75f34013cd756147334e6d7bf0667b6907b24902a762b26ed2f88a
                                        • Instruction Fuzzy Hash: 7FF1377AF14616CBEB24EB2884081BCB3A6BB44B58F900635DE1E577E4DFBCE8119750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                        • String ID: @
                                        • API String ID: 3606780921-2766056989
                                        • Opcode ID: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction ID: 61614bed481d18af0f00da54a1079dde770128eb682e3c4b81a1c2e2f6feac1b
                                        • Opcode Fuzzy Hash: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction Fuzzy Hash: 8B215E3A618681C6E760EF25E45866AB362FBC9F84F845136EE8E03A18CF7CD545CF10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 313767242-0
                                        • Opcode ID: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction ID: a08bc62f1a2d612b2ab10086f6b6f20bba0ab88ff32a31c703ea6cc23b8ca29f
                                        • Opcode Fuzzy Hash: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction Fuzzy Hash: AD3132BA608B81CAEB609F61E8443EDB365FB84B44F84403ADB4D47B95DF78D548CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                        • String ID: @
                                        • API String ID: 3016261861-2766056989
                                        • Opcode ID: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction ID: b85b989b260731f5eb592012bc89163422c371efa810cb381a37ab78eb436901
                                        • Opcode Fuzzy Hash: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction Fuzzy Hash: 82419B26B046A08EF7109BB5E4543EE7BB2FB5A748F444066DE8817A5ACF3C811ADB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                        • API String ID: 0-2102732564
                                        • Opcode ID: d57af410e886d6ef54cd9f21839bf90c88b4b505b0b28237b1efe07e4581d7e2
                                        • Instruction ID: a675e7541998f213a4421c2eda3d5ec232c748a439f50806a620de8979e42bd6
                                        • Opcode Fuzzy Hash: d57af410e886d6ef54cd9f21839bf90c88b4b505b0b28237b1efe07e4581d7e2
                                        • Instruction Fuzzy Hash: 0821905AE1994BC3FF14EB95A41C7F482639B89F80EC04833E81E06791DFEC6956C570
                                        APIs
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7616C0A9B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 1848478996-631824599
                                        • Opcode ID: 5817aa7e7bf68f5fb58bff8602b12e9fb4311fbb383ff5e081a92594f28c09a8
                                        • Instruction ID: 6de8d0cb5555a856e9bb2023b4a2bee807cd2203ee2718012f631547bf7703bb
                                        • Opcode Fuzzy Hash: 5817aa7e7bf68f5fb58bff8602b12e9fb4311fbb383ff5e081a92594f28c09a8
                                        • Instruction Fuzzy Hash: A411943A618B42D3F744AB25D548379B2A6FF08B45F904139CA4D82950EFBCE474CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireRandom
                                        • String ID: @
                                        • API String ID: 2916321625-2766056989
                                        • Opcode ID: 0ac105aea5ba1d1cf2cff87d6f6bbec93b26db8ffee4d0c604fb4a7a731729df
                                        • Instruction ID: a57d920de749563ad9dd03e23eab893f71b30e5b32140971bf24625a44e3706f
                                        • Opcode Fuzzy Hash: 0ac105aea5ba1d1cf2cff87d6f6bbec93b26db8ffee4d0c604fb4a7a731729df
                                        • Instruction Fuzzy Hash: 96F08665B08642C2E7109B21F448327E362FF88BD8F944435DE8C46668DFBDC485CB10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 0-1379995092
                                        • Opcode ID: 1a46011813abe3df587649df29dca278059a1793d187c85371252c5ab630468f
                                        • Instruction ID: 9856ceaf018b5cc98e18c0faae2aa707b34f7971c87e39139e64e96f213763b1
                                        • Opcode Fuzzy Hash: 1a46011813abe3df587649df29dca278059a1793d187c85371252c5ab630468f
                                        • Instruction Fuzzy Hash: B842063A918982C6E7B46A189548379E793FF44F94FD44230DE9E47EE4DEBCE8418630
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                        • String ID:
                                        • API String ID: 2933794660-0
                                        • Opcode ID: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction ID: 1d573259c01b4699263f5385a4e032bee58488f5fae1411b90c8d6d4043656c2
                                        • Opcode Fuzzy Hash: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction Fuzzy Hash: E4111F2AB14B01C9EB00AB60E8582A873B4FB59B58F441D35DE6D86794DF78D154C750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                        • String ID:
                                        • API String ID: 2110207923-0
                                        • Opcode ID: 7a19cfeddf836940870f59dd0f30b0165c1a9781b8daf24688f602d4ec20c495
                                        • Instruction ID: f8aa04229fcda98f9d5b30d9e066bcdbfede18a6cac6141bfb70a6825eadb8c3
                                        • Opcode Fuzzy Hash: 7a19cfeddf836940870f59dd0f30b0165c1a9781b8daf24688f602d4ec20c495
                                        • Instruction Fuzzy Hash: 25015E7A608642C2EB109F20E45876AF332FB84F98F544536DE4D06A68CF7CC488CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$AcquireContextCreateHash
                                        • String ID: @
                                        • API String ID: 1914063823-2766056989
                                        • Opcode ID: 1b93c0d41da9f109d1acfa544d6c01e5a17770cfcf19a319a204773c3ebed238
                                        • Instruction ID: 99525ae833229ac08e81f54d4abb8b572e666c042722075563fe2526427c7d3d
                                        • Opcode Fuzzy Hash: 1b93c0d41da9f109d1acfa544d6c01e5a17770cfcf19a319a204773c3ebed238
                                        • Instruction Fuzzy Hash: 87E0D865B1455283F7305B35E405B16A352FB88B48F845035CF4C07A14DF7CC045CF14
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _getpidhtons
                                        • String ID:
                                        • API String ID: 3416910171-0
                                        • Opcode ID: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction ID: 04d45f0f2f931f3cfb177bbca32fbbdc4e4c0a061bf7ec8340eb2bee06360ab2
                                        • Opcode Fuzzy Hash: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction Fuzzy Hash: E1113C66A247D0CAD304CF35E5001AD77B0FB6CB84B44962AFB8987B19EB78D690CB44
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@
                                        • String ID:
                                        • API String ID: 1029415015-0
                                        • Opcode ID: d85b1203621929becc78f717d9455c77eb8f9cc5392cf1a45e86bbadd8f8e732
                                        • Instruction ID: 86a30ae492a913efe4fff8a594758780ed7d923cd8c728bb581dbb2d3997d6d4
                                        • Opcode Fuzzy Hash: d85b1203621929becc78f717d9455c77eb8f9cc5392cf1a45e86bbadd8f8e732
                                        • Instruction Fuzzy Hash: 0F81BE66B18B99C9EB00DB6AD8883AC6772E755F88F984422CF4D17795CFB8D041C3A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction ID: 48ab5c917bfd7214a966e5c009fbec28ee9fa4cd38c87fdbb4fd73bec8a87725
                                        • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction Fuzzy Hash: 6D611776B19B8482DB10DB19E448679A372EB59BD4F608231DF9D67B88EF7CE441C380
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction ID: 8d98ba0d72b435e6d902b0b574ef47519edffd4f7af92d64d6fa8245f4bd477d
                                        • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction Fuzzy Hash: C3417333B1555487E78CCE2AC8256AD73A3F399704F95C23AEA1A87385DE399905CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction ID: 4774e8bd2471cb961923170e93ddeffb73e4c3ed96dd8da7773c85313db1f00b
                                        • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction Fuzzy Hash: 27F08C29325767BEFE00853B4624FBD5E419BC0B40FA368B58C80420CB8A9E54A3D714
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 735474b44fecfb17f075a3ff19b93d187b15b809f496c8131696174fb3aa68e8
                                        • Instruction ID: 13cde2e6fa666a05cd3c3314394b600d101f6736dbf9a820c17b419314ab7cb7
                                        • Opcode Fuzzy Hash: 735474b44fecfb17f075a3ff19b93d187b15b809f496c8131696174fb3aa68e8
                                        • Instruction Fuzzy Hash: 84A01122B0AC0AC0A3008B20E2A0E20A222FB88B88380A022880C028208E288002C200
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction ID: 5208fb1d6ef3beaab84b2dac38610ed20afbb6b3f924ac371565e5e775ec1379
                                        • Opcode Fuzzy Hash: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction Fuzzy Hash: A2A0026D91EC02D4EB04AB10E958031A3B3FBD4B01FC66035C60D874649FBCB500CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CounterPerformanceQuery
                                        • String ID: Closing connection %ld
                                        • API String ID: 3490100708-2599090834
                                        • Opcode ID: 7fb6fdba045e85df113dbcceb1b70f4c6a01c002728a4962571206f5567d49d1
                                        • Instruction ID: b0f0fa79201e66f11b4f47ad3b348037c4ff512043d3ed11a82b11ac1d89305f
                                        • Opcode Fuzzy Hash: 7fb6fdba045e85df113dbcceb1b70f4c6a01c002728a4962571206f5567d49d1
                                        • Instruction Fuzzy Hash: 73C14C79908B81C2E750AF21E4582AC7326FB85F9CF484235DEAE4B799CF789156C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                        • API String ID: 1294909896-2200874227
                                        • Opcode ID: 630c380efc76a5ffed2834d8e06e875a5572cadbc702f6c11330fde0c288aba2
                                        • Instruction ID: 01ff80d4829218c662cbad8f29de0442ddf769e85c1c49a554ef3585e2a13b31
                                        • Opcode Fuzzy Hash: 630c380efc76a5ffed2834d8e06e875a5572cadbc702f6c11330fde0c288aba2
                                        • Instruction Fuzzy Hash: 54026129A09783C1EB61FB21A4583BAA392EF44F84F844035CE4D47B99EFBDE545C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$strpbrk
                                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 2737852498-2994854565
                                        • Opcode ID: 50beff97ebaddc7567a4d4a9652863f836772c72075f966d32c1a3f403d900ce
                                        • Instruction ID: 78d7849f2f50f916907a30ef1321daced41c342a7010bd29f12689ae66e33d16
                                        • Opcode Fuzzy Hash: 50beff97ebaddc7567a4d4a9652863f836772c72075f966d32c1a3f403d900ce
                                        • Instruction Fuzzy Hash: 4DD19E29E09B52C1FB51EB25A4182B9A3B2AF45F88FC44535DD8E17B95EFBCE405C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy$htonl
                                        • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                        • API String ID: 82385936-242323837
                                        • Opcode ID: 8613a6aaf9016ec076c90eba3747679c487425defe278e58e2270cd0f603949f
                                        • Instruction ID: 6a7f6ebb719918b0fee37d0681dac5c6f60bc78e0f716d407ed82eb749b72130
                                        • Opcode Fuzzy Hash: 8613a6aaf9016ec076c90eba3747679c487425defe278e58e2270cd0f603949f
                                        • Instruction Fuzzy Hash: 23C15D3AA08A42C6E750EB66E4582ADB7B6FB45F88F804035DE4E57B54CFBCE414C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$_strdupfreehtonsmemset
                                        • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                        • API String ID: 130798683-4053692942
                                        • Opcode ID: dd297c6df8cd8424e2bd6f979904963bf5a1dead78cd15da62e6547e348515e1
                                        • Instruction ID: 3f14f1e2aad71641341056937ffbd04af2773dae2284b40068a6c52310a01cad
                                        • Opcode Fuzzy Hash: dd297c6df8cd8424e2bd6f979904963bf5a1dead78cd15da62e6547e348515e1
                                        • Instruction Fuzzy Hash: 2FE19E3AB08A82C6E760EF15E4483B9B7A6FB44F88F844135DA4D47A44DFBCE554CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 1346393832-579821726
                                        • Opcode ID: 45795471a48e67c8abc9e4026c2df720b199cf89e055554f4f9b8d24a099660b
                                        • Instruction ID: 73ab7cea7c237483527ee7e1a45429848150005fca873a9268d82de4da282a33
                                        • Opcode Fuzzy Hash: 45795471a48e67c8abc9e4026c2df720b199cf89e055554f4f9b8d24a099660b
                                        • Instruction Fuzzy Hash: 5712D666A18B85C5FB00EB79E4483ADA332FB41BA4F805235DA5D13AE9DFBCD085C351
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE4A6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE4CC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE4DD
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE54B
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE57C
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE59C
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE5AE
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE610
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE681
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE698
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE753
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE7C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7616ADBDF), ref: 00007FF7616AE7D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$free$_strdupcalloc
                                        • String ID: LDAP$base$one$onetree$sub$subtree
                                        • API String ID: 112326314-884163498
                                        • Opcode ID: e236e2e6d817617efa494662559fcc5df441cb7a7ccf82c35be98ef86a44c401
                                        • Instruction ID: c89d3ccb6a46f2846c7947d2827772bfd5bde4b1684d3b1cada4aeecceb932e9
                                        • Opcode Fuzzy Hash: e236e2e6d817617efa494662559fcc5df441cb7a7ccf82c35be98ef86a44c401
                                        • Instruction Fuzzy Hash: 21B1C22AA09B92C2FB51EB16A458279A792FF49F84FC48535DE4D47B80EF7CE405C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrstrtol
                                        • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                        • API String ID: 1626215102-895336422
                                        • Opcode ID: 389a94f45e149e10ada5d78404fb401863fe9fe4206c8ef92805649dd6b5d67c
                                        • Instruction ID: 1d3774a6eeaed6c61b6bf068bd86a8141636a30d1a3cde43de5353223deb3546
                                        • Opcode Fuzzy Hash: 389a94f45e149e10ada5d78404fb401863fe9fe4206c8ef92805649dd6b5d67c
                                        • Instruction Fuzzy Hash: 5261B168B08646D5FB54FB16A8182B9E652BF80FE0FD14231D92E47AD1DFBCE106C760
                                        APIs
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676067
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C9A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C9AC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C9D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C9DC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167CA60
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167CA69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                        • API String ID: 1294909896-1595554923
                                        • Opcode ID: d0f9f5741b8606d7082873dd084e5b5c62746362a97b26e35185e4727763db7a
                                        • Instruction ID: 4cf792371871fb7372a4a3d799ac9e62f8164ecefef0a66e5d1ffadc30c7b801
                                        • Opcode Fuzzy Hash: d0f9f5741b8606d7082873dd084e5b5c62746362a97b26e35185e4727763db7a
                                        • Instruction Fuzzy Hash: 9FE16B2AB08683D2FB65AB1595082B9E7A6FF40F84FC84435CE4E47681DFBCE954C360
                                        APIs
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                        • memcpy.VCRUNTIME140 ref: 00007FF761666496
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF761666528
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF761666569
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616666B3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616666F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761666740
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761666781
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616667DE
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761666898
                                          • Part of subcall function 00007FF7616BFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7616643FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF7616BFB32
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616668D9
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616669A6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616669E7
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF761666A0A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                        • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                        • API String ID: 264867259-3075834232
                                        • Opcode ID: 9d7d61f4c3d02218e256affeb54d8d628810e04e4d710cc77930749f09e94d0a
                                        • Instruction ID: de9ce30c05b82254874c51f00a1501bf80504992d28a1ec7ec8fcb8872ed0648
                                        • Opcode Fuzzy Hash: 9d7d61f4c3d02218e256affeb54d8d628810e04e4d710cc77930749f09e94d0a
                                        • Instruction Fuzzy Hash: E012D666E08682C1EB14EB65F44836DA772EB44BA8F804335DA6D237D9DFBCD484C351
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                        • String ID:
                                        • API String ID: 1087521380-0
                                        • Opcode ID: 2e53ff19ecb3a8b38f1d63baef50b79b2243b4e56db0847dfde610ffbf885c05
                                        • Instruction ID: 119688f363ce31fdd9e78700db96ef9ba0aaf54d28c8e8eaf194ac082ca235bc
                                        • Opcode Fuzzy Hash: 2e53ff19ecb3a8b38f1d63baef50b79b2243b4e56db0847dfde610ffbf885c05
                                        • Instruction Fuzzy Hash: 22B1BF29A0AB52C5EF65AF259518378A7A2AF44F94F8C4534CE5D033E4DFBCE451C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchrstrrchr$_strdupstrstr
                                        • String ID: .$/$/$/$?
                                        • API String ID: 2325335452-1821401756
                                        • Opcode ID: edf84e59fab7fdd27706c0db91c8a003d70f39cd99aa0d9cec95167bff697e48
                                        • Instruction ID: bae3ae2d1d28374f8aedac3fcbeb6b7e05fb7207d3daae2a2d4f74efd7c28936
                                        • Opcode Fuzzy Hash: edf84e59fab7fdd27706c0db91c8a003d70f39cd99aa0d9cec95167bff697e48
                                        • Instruction Fuzzy Hash: F681A01AA0C286C5FB65BB269118379EA93AF55F84F884431CA5E06BC6DFBDE441C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$free
                                        • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                        • API String ID: 3578582447-31095704
                                        • Opcode ID: 74dc52b09e250dfa96fe40e8864fd700ce919b4dbfe9769e74b07d6aad3c018f
                                        • Instruction ID: 57b19f57b8d35700764f34febdaa49a8a8f606a1a114496afd5dee3653771545
                                        • Opcode Fuzzy Hash: 74dc52b09e250dfa96fe40e8864fd700ce919b4dbfe9769e74b07d6aad3c018f
                                        • Instruction Fuzzy Hash: A381A129B0DA82C1FB51BB2595182B9E293AF45FC8FD88031CD4E47B95DFAEE501C670
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 449a3cc694915db61add71a76ad10636cd6fb551218fcf97e3b1d13b969389a6
                                        • Instruction ID: 545847e5021b1af2d4770622f232aa6fcd5919bd0f17c6dc76d936c68c8ec371
                                        • Opcode Fuzzy Hash: 449a3cc694915db61add71a76ad10636cd6fb551218fcf97e3b1d13b969389a6
                                        • Instruction Fuzzy Hash: 4D91D27AA18B81D3E7499F21E9A42A8B368F749F48F444139EFAD47754CF74A271C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                        • API String ID: 3103143820-2414412286
                                        • Opcode ID: 7b9e4824925e9b7f55e927efd2cd488aa311533b9d912ce27fe012692574f343
                                        • Instruction ID: 5a23b467667e0474574dd49025d6138be3977807bfadfe7bafab36eb1fd83c32
                                        • Opcode Fuzzy Hash: 7b9e4824925e9b7f55e927efd2cd488aa311533b9d912ce27fe012692574f343
                                        • Instruction Fuzzy Hash: B1D1A829A0C682D2EB54EB25E8442B9E7A6FB45F84F984032DB4D03E55DFFCE560C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                        • API String ID: 1294909896-874090715
                                        • Opcode ID: dac52c557d6dab343f032f78f8b6557e4def98c54edf951fdd99c7becfd0baa9
                                        • Instruction ID: bc8821026e881e2b91443281333a000c8c2bf42523a31611340f85a0743a7f48
                                        • Opcode Fuzzy Hash: dac52c557d6dab343f032f78f8b6557e4def98c54edf951fdd99c7becfd0baa9
                                        • Instruction Fuzzy Hash: 0DA1A02AE08642C5FB90EF51D8586BDA7AABB44F88F844931DE0D53A95DFBCE504C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                        • API String ID: 2243338858-131330169
                                        • Opcode ID: 2efa04c74230399bd258a16cad822e2e5ead02ff0f79d9f2166992b9371edbb0
                                        • Instruction ID: 262dbce39162463f48ff6aff8f270b4d5029cb279099a9e56123e11979cb1fc4
                                        • Opcode Fuzzy Hash: 2efa04c74230399bd258a16cad822e2e5ead02ff0f79d9f2166992b9371edbb0
                                        • Instruction Fuzzy Hash: F491B02AF08782C2EB54EB25A4582B9A7A2FB45F80F844035DF8E07B95DF7CE455C721
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AD13
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AD8D
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167ADB1
                                        • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE3A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE4C
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE5F
                                        • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE7A
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE90
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7616819C9,?,?,00000000,00007FF761681F05), ref: 00007FF76167AE99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                        • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                        • API String ID: 1368378007-4087121635
                                        • Opcode ID: 4b9c01196034c60f101e9a56bca8748353508c1149ce0dda7be717e391832c11
                                        • Instruction ID: 46c42430445387dfaf194116b8850e957af36a1ab160c66de739817f4b842889
                                        • Opcode Fuzzy Hash: 4b9c01196034c60f101e9a56bca8748353508c1149ce0dda7be717e391832c11
                                        • Instruction Fuzzy Hash: B6515429A0D646C2FF65BB21A91C27AA3A3AF45F85FC84435DD4E47360EEBCE405D720
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616655DE
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166560C
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166561A
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761665654
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616656A5
                                        • memset.VCRUNTIME140 ref: 00007FF7616654D3
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                          • Part of subcall function 00007FF761666320: memcpy.VCRUNTIME140 ref: 00007FF761666496
                                          • Part of subcall function 00007FF761661FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761665812
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166583E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166584C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761665887
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616658DA
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616659C1
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7616659D9
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7616659E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                        • String ID: value
                                        • API String ID: 2102519606-494360628
                                        • Opcode ID: 0ba03602f28abc066c3fcc0a8834273002c93528edaf180a920beb04a508591a
                                        • Instruction ID: ca9d761f1cd1a78ea9be8b4d3464f87c2c8ecde9654d2a44726b4427993e2472
                                        • Opcode Fuzzy Hash: 0ba03602f28abc066c3fcc0a8834273002c93528edaf180a920beb04a508591a
                                        • Instruction Fuzzy Hash: 2FF10B26A087C1C5EB10DB75E4483ADA772EB45BA4F405331EAAD13AEADFBCD085C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                        • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                        • API String ID: 2572311694-3353508759
                                        • Opcode ID: 1f8db8496d7dfd341e118b6003e4d791754c8f8896ec6c0848a44e1d99fd1b2b
                                        • Instruction ID: 04762355aaa59d4da7063c2d9c50e811d272dd622416ce9c85f58f1240ecacd6
                                        • Opcode Fuzzy Hash: 1f8db8496d7dfd341e118b6003e4d791754c8f8896ec6c0848a44e1d99fd1b2b
                                        • Instruction Fuzzy Hash: 98B1B66AA08A83C2EB60AB15D8587B9A393FF84F98FC48471D94D47795CFBCD805C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup
                                        • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                        • API String ID: 1922034842-2519073162
                                        • Opcode ID: 15ff60a6d3c237a336e91ef1e3c4139078ef5d79dd09f5cb9ca67aec89cc51db
                                        • Instruction ID: f66f6ab1fcbe03c06caa64d182f18185a2204b4b9437c5a5a1aaa14e481828d7
                                        • Opcode Fuzzy Hash: 15ff60a6d3c237a336e91ef1e3c4139078ef5d79dd09f5cb9ca67aec89cc51db
                                        • Instruction Fuzzy Hash: 4091D729A09683C2FB61EB31D4183B9E792AF45F84FC44479CE4D87685EFADE901C720
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7616B063F), ref: 00007FF7616BD93D
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF7616B063F), ref: 00007FF7616BD95F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7616B063F), ref: 00007FF7616BD970
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7616B063F), ref: 00007FF7616BD99E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: ../$/..$/../$/./
                                        • API String ID: 111713529-456519384
                                        • Opcode ID: a08b28c9933b0941f2efcac164ecd33f5fb3166c4cd9c360851c52c316a69ecd
                                        • Instruction ID: 92634038ac27aa1353b395cfccb45ccf701820bbc7f396340dc9b97e0f5948ce
                                        • Opcode Fuzzy Hash: a08b28c9933b0941f2efcac164ecd33f5fb3166c4cd9c360851c52c316a69ecd
                                        • Instruction Fuzzy Hash: 8A71EA29E0C692C5FB22FB119518279EBA2AB15F98F844131CE9D0B6D0DFBCE461C330
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761672471,?,?,?,?,00007FF7616635A1), ref: 00007FF7616821D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761682221
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfree
                                        • String ID: <$<$<$`$v
                                        • API String ID: 306872129-2056843887
                                        • Opcode ID: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction ID: e82a87db082bdac80162341e1a4a82bf9743d91060483aa06cfb9d8f95548879
                                        • Opcode Fuzzy Hash: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction Fuzzy Hash: 3E914936908BC1C6E3509F34D4083E877A1FB59F5CF485238CE991A79ADFBAA095C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                        • API String ID: 111713529-3006446216
                                        • Opcode ID: 70e30d1e3deb7aee05ef397fcba1ec1dd57ac269af20da9b052408b51782595d
                                        • Instruction ID: 137f975073327f5a4f771ab7c447275ae3fd575e110496541c4e9b9bc2a6406d
                                        • Opcode Fuzzy Hash: 70e30d1e3deb7aee05ef397fcba1ec1dd57ac269af20da9b052408b51782595d
                                        • Instruction Fuzzy Hash: BD71EAAAD0D7C2C5EB11EB2990182B9FBA6EF46F48F984032CA4D43362DF6DD055D721
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                        • API String ID: 2190258309-1086287758
                                        • Opcode ID: 3d979c6cc7bd14e6c2ad7290a7be4d6b36be52882975864e4d86410aa6b77bbe
                                        • Instruction ID: d1cefe9ce8489680f8acf6bf506a1cd1dbb6bf5df060fadf7622398f639c5bef
                                        • Opcode Fuzzy Hash: 3d979c6cc7bd14e6c2ad7290a7be4d6b36be52882975864e4d86410aa6b77bbe
                                        • Instruction Fuzzy Hash: A9B16C7AA08B46C6EB10EF25E8582ADB7A6FB48B88F800039DE4D43B54DF7CE555C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                        • API String ID: 1294909896-1220118048
                                        • Opcode ID: 9e8e4190fbbe9dbac736ea4e8f4861b9deb4eea0a2613b1050bd1a2de14b6a8a
                                        • Instruction ID: 674fb9721d454ea21b0277c5e7ba8c3ac925bb7e25597c85bf25a4a8b24c3af3
                                        • Opcode Fuzzy Hash: 9e8e4190fbbe9dbac736ea4e8f4861b9deb4eea0a2613b1050bd1a2de14b6a8a
                                        • Instruction Fuzzy Hash: B9718FAAA09742D1EB14FB21A1481F9A352FF99F88FC44032DE4D43799EEBCE511C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloctolower
                                        • String ID: %%%02x
                                        • API String ID: 1244608590-4020994737
                                        • Opcode ID: b00e4fd80b47b58873b5033442e7745e1c8edbf3f5bc81cfb43fb87cb640654b
                                        • Instruction ID: 1422534c99013f71d2d870ac795fe11afeef311313a7284e2ce04c18617fe770
                                        • Opcode Fuzzy Hash: b00e4fd80b47b58873b5033442e7745e1c8edbf3f5bc81cfb43fb87cb640654b
                                        • Instruction Fuzzy Hash: C7A1EB19D0D692C5FB616B21951837DEBE29F05F84F8944B1DE8E46AC1DEACE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcmp
                                        • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                        • API String ID: 1475443563-555813803
                                        • Opcode ID: d740d961fa4bdd8deb1286ed72fc9618fc2868aaaa0fee692128bcc4af27af90
                                        • Instruction ID: 5031b6573b853fb0fc6dd7364b325823eca7553b6a56ea73c9fafca4d08df16e
                                        • Opcode Fuzzy Hash: d740d961fa4bdd8deb1286ed72fc9618fc2868aaaa0fee692128bcc4af27af90
                                        • Instruction Fuzzy Hash: A0D17D6AA0C243C2FB647A15C55C2B8E693AF51F94FC448B2DA0D4A5D9EFECED05C321
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID:
                                        • API String ID: 111713529-0
                                        • Opcode ID: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction ID: 6712ce61f63b060d1a4aba57583976b9be06c58b26f3677a44f398249d0da15e
                                        • Opcode Fuzzy Hash: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction Fuzzy Hash: 0C617C6AA05B42C7EB25DF12A45822DB3A2FB48F98B858475CE4D43750EF7CE894C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                        • API String ID: 1294909896-2312071747
                                        • Opcode ID: 0577d7df4036a8ec348db05af5e8fb1d9fd72d54564ee0a42281e9bfc4ed7481
                                        • Instruction ID: 163a7c5536ce292551c24ff68c4f6bae26c5e3d2ab6396134dfddfe94a5eaac4
                                        • Opcode Fuzzy Hash: 0577d7df4036a8ec348db05af5e8fb1d9fd72d54564ee0a42281e9bfc4ed7481
                                        • Instruction Fuzzy Hash: 1DD1E729A4D682C6EB74FB3295183B9E652FB45B54FC44239CAAD03AC1DFACE455C320
                                        APIs
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                          • Part of subcall function 00007FF761666320: memcpy.VCRUNTIME140 ref: 00007FF761666496
                                          • Part of subcall function 00007FF761661FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166A861
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166A88F
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166A89D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166A8D7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166A934
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166A9ED
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166AA1B
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF76166AA29
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166AA63
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166AAB4
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76166AAFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: 5326661d5e7fbd7017e2f05cc9af570629d592ff744eb586dc6c91cc8db18cda
                                        • Instruction ID: 20ab69b1ae746c2b251adef629d4e43f35d2f3b6b915b1d81e6bcbf3218e8316
                                        • Opcode Fuzzy Hash: 5326661d5e7fbd7017e2f05cc9af570629d592ff744eb586dc6c91cc8db18cda
                                        • Instruction Fuzzy Hash: 96A1BB66A18A95C1FB00EB79E4483AD6332FB41BA4F901335DA6D12AE9DFBCD085C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                        • API String ID: 4109794434-4095489131
                                        • Opcode ID: b31a089bcb1d51404a75fdc29caff769068543d3efb01ad91f06bb5c9c76cb41
                                        • Instruction ID: 87340cad48469e84914ca1f3174ab7dd1edb5d27445e4c416815dda8953486e3
                                        • Opcode Fuzzy Hash: b31a089bcb1d51404a75fdc29caff769068543d3efb01ad91f06bb5c9c76cb41
                                        • Instruction Fuzzy Hash: 7961C12AA0C782C1EB55BB2195182BAA796FF45F84FC84435DE8D077A1DFBCE405C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$malloc
                                        • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                        • API String ID: 3103867982-1477229593
                                        • Opcode ID: 0d6b655dcbdeab51feffedeff9afb7f8b29fec1c10cdc3d2b61d959f6e169dc5
                                        • Instruction ID: cd24cb7bc4080ffdcdfdc7dcf04bc67492255b4867ef4b9d018ec7520aad0609
                                        • Opcode Fuzzy Hash: 0d6b655dcbdeab51feffedeff9afb7f8b29fec1c10cdc3d2b61d959f6e169dc5
                                        • Instruction Fuzzy Hash: 1FC18D7AA05B51C6EB10EF25E4542ADB7A6FB44F88F800036DE4D87B58DFB8D850CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                        • API String ID: 2190258309-1457932261
                                        • Opcode ID: ad1976b87a44fb8d818fdb44e7480ec08fb280e608e4c6ec3807d1ae1869fbba
                                        • Instruction ID: a82c09f3b3ccae671e582bfc9c67943499e8f4fc47ca3f5f6be0f4e71cc2e284
                                        • Opcode Fuzzy Hash: ad1976b87a44fb8d818fdb44e7480ec08fb280e608e4c6ec3807d1ae1869fbba
                                        • Instruction Fuzzy Hash: CB61FF69A09782C5EB11EB25A41C3FAA3A2BB45B88FC44536CD4D077D5EFBCE114C320
                                        APIs
                                        • memset.VCRUNTIME140 ref: 00007FF7616AA69B
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616AA7C5
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676067
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676073
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616AA77F
                                          • Part of subcall function 00007FF761675FA0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF761675FB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freestrncpy$_strdupmemset
                                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                        • API String ID: 3826632026-748038847
                                        • Opcode ID: e5b4f2103c453911aedcd51cbfc018986ff4a876cf622d445cf5e43f37735157
                                        • Instruction ID: 2209d3be3925957eece9d9ea73f225cad8cd87a65bf7a593bbf1b1aedd63f84c
                                        • Opcode Fuzzy Hash: e5b4f2103c453911aedcd51cbfc018986ff4a876cf622d445cf5e43f37735157
                                        • Instruction Fuzzy Hash: 8E714D35A086C2D0FB21AF14D4496E9A362FF84B88FC54132DA4D476A9EFBCD546C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast
                                        • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                        • API String ID: 4042023021-4197595102
                                        • Opcode ID: 7bbb2639de61ab8c1464d414514da25b57dc3edd0b8e6112f819213a615a5998
                                        • Instruction ID: 2b51e04673be8b5a3b834f96f349a6061dcf08d1212bde2867a01d66acf17ff0
                                        • Opcode Fuzzy Hash: 7bbb2639de61ab8c1464d414514da25b57dc3edd0b8e6112f819213a615a5998
                                        • Instruction Fuzzy Hash: C5B1907A608682C6D761AF39D4483ADB7A2FB88F88F844136CE4D4BB58DF78D441C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                        • API String ID: 1802528911-931584821
                                        • Opcode ID: b789f81208a5b9aa444f3937666235559fc3fee082451b45fb7e3bbc3329918e
                                        • Instruction ID: 1df2f4857cc70213ddfad27061ba1870c361ed49ce6dc8143478b4a059658ec1
                                        • Opcode Fuzzy Hash: b789f81208a5b9aa444f3937666235559fc3fee082451b45fb7e3bbc3329918e
                                        • Instruction Fuzzy Hash: 2791C036A08AC5C5F721AF24E4497EAA3A2FB84B68F844231EE4D07B95DF7CD145C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: sendto$_time64
                                        • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                        • API String ID: 2327272419-1785996722
                                        • Opcode ID: 5da9b6a1b2756f2ded443be3f07f7f48c2e16873579ccd0a2f5785fbcf2abef3
                                        • Instruction ID: 3e3aead7e162e9f8f52b1a6c5975bdb114ebcb5bfb03798d98ab41dbcae5e8e7
                                        • Opcode Fuzzy Hash: 5da9b6a1b2756f2ded443be3f07f7f48c2e16873579ccd0a2f5785fbcf2abef3
                                        • Instruction Fuzzy Hash: 45919D3A608781C6D751DF29D4483A9BBA2FB88F88F848136CE4D8B758DF79D506C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$freestrchrstrncmpstrtol
                                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                        • API String ID: 2070079882-2404041592
                                        • Opcode ID: 87368c59f9fe8063e5992f5de28ffce5ae937202ea33b7f2a591c5681f9ad303
                                        • Instruction ID: 41214161183424e00954fd88d129cb4911a635f9f3d570febb2520e3f631450f
                                        • Opcode Fuzzy Hash: 87368c59f9fe8063e5992f5de28ffce5ae937202ea33b7f2a591c5681f9ad303
                                        • Instruction Fuzzy Hash: 9851F569E187D2C5FBA1BB259468379A7D7AF01F88F884031CA4D46AC1DEECE445C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$none
                                        • API String ID: 4109794434-3629594122
                                        • Opcode ID: 17cfc58c2ff132a4fc18a63d81c33083011eece3fc44a1e24eabeae53038068d
                                        • Instruction ID: b73a90bf0df13b3da2582481e56bf6e51d49e692e46304ad35fd7d135d419e60
                                        • Opcode Fuzzy Hash: 17cfc58c2ff132a4fc18a63d81c33083011eece3fc44a1e24eabeae53038068d
                                        • Instruction Fuzzy Hash: A251C329A0D782C1FB55BB21A418279E6A2BF45F84F8D4434DE9E037A1DFBCE442C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                        • API String ID: 3510742995-1652449680
                                        • Opcode ID: d138500cbaf182bc5e16dc619f2f2d0803747c55357b2c7ce644f458475db220
                                        • Instruction ID: 753798723888e86527a5a4ecab0a4f39c21f6fd477fc916786835e6172d6a311
                                        • Opcode Fuzzy Hash: d138500cbaf182bc5e16dc619f2f2d0803747c55357b2c7ce644f458475db220
                                        • Instruction Fuzzy Hash: C7A17229A18A82C1E790EF25D8583F9A392EB45F98F845131DE4E4B785DFBCE445C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                        • API String ID: 1294909896-3146291949
                                        • Opcode ID: be4495601e09c0e77f4391925541b9df5882915bdba6fd6e21452db4e1504eff
                                        • Instruction ID: 4aebf814b8ed44d2d494f9115b7615cc836d4e035b4f1ea79e84afcb6f4d5a25
                                        • Opcode Fuzzy Hash: be4495601e09c0e77f4391925541b9df5882915bdba6fd6e21452db4e1504eff
                                        • Instruction Fuzzy Hash: 49919129B09B83D3FB64AB22D558379A292FF45F84F844875DA4D47691EFACE840C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$_time64calloctolower
                                        • String ID: :%u$Shuffling %i addresses
                                        • API String ID: 133842801-338667637
                                        • Opcode ID: b9b3a82cc03fa1a9ec4c17c3365a74312543c7d8770aac4085486b2e519becef
                                        • Instruction ID: c4a76f5a788768acf28684360925d283ab81d17b95058e5504833f6c8030f8ed
                                        • Opcode Fuzzy Hash: b9b3a82cc03fa1a9ec4c17c3365a74312543c7d8770aac4085486b2e519becef
                                        • Instruction Fuzzy Hash: 3C71D679A09A82C1EBA4AF16E5187B9A362FB48F98F844531CE5E07790DFBCD445C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                        • API String ID: 1865132094-1312055526
                                        • Opcode ID: dd9d7af58e6bbe8eb93ee73e5defa075ebf5cb275832164a3fb021438fdb4af6
                                        • Instruction ID: f168e68a4491509a6efd35b5a7bffc9318eeddedc30ca16cd6546032dfd4453f
                                        • Opcode Fuzzy Hash: dd9d7af58e6bbe8eb93ee73e5defa075ebf5cb275832164a3fb021438fdb4af6
                                        • Instruction Fuzzy Hash: 3871C66AA0C783C0EBA0AB2494483FDA7A2EB45F94F980135DE4E47A95CFBCD441C771
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616818FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168191A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168192E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168194A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681967
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168198A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF76168199E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF7616819EC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A5C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761681F05), ref: 00007FF761681A85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction ID: 7a44b8cec7efd3f3043391529af92125f2e1b750090dae3adf9bb0cb58de3742
                                        • Opcode Fuzzy Hash: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction Fuzzy Hash: 9A51FE39909A82C1EB54AF21E8682FDA3A2FF85F88F884435DE5E4B655CF789451C330
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFA0B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFA71
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFA7F
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFB7D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFBE6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFBFE
                                          • Part of subcall function 00007FF7616AEB50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616AEB60
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFC26
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFC3D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFC62
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFCAF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616AFCC4
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE0C
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE16
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE20
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE2A
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE34
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE3E
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE48
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE52
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE5C
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE66
                                          • Part of subcall function 00007FF7616AFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616AEE32,?,?,00000000,00007FF761685F3B,?,?,00000000,00007FF761681983,?,?,00000000,00007FF761681F05), ref: 00007FF7616AFE70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$_strdup
                                        • String ID: ,$:
                                        • API String ID: 2460172880-4193410690
                                        • Opcode ID: 0eb6ece5634b4d6ba9c8edbd0182869b858a6f28525a42b74bdcd66481e9c926
                                        • Instruction ID: 0adb48c42f1e28a606b0687c601fa76885a6303179a8391a11b0d2266deb90c7
                                        • Opcode Fuzzy Hash: 0eb6ece5634b4d6ba9c8edbd0182869b858a6f28525a42b74bdcd66481e9c926
                                        • Instruction Fuzzy Hash: 7E518716E0CB86C2F721AB3595282BDA362BF55F88F449174CF8E12952EFACF5D48311
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$strrchr$_access_stat64
                                        • String ID:
                                        • API String ID: 2557200964-0
                                        • Opcode ID: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction ID: 63e21bd9e03536bbf6db4c1eee34a89a1f310a869986d8602b235e5491c36dc8
                                        • Opcode Fuzzy Hash: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction Fuzzy Hash: 64418069B09B06C5FB10BB11A458379A2A2FF49FA4F844534DE5E47B90EFBCE415C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy$strchr
                                        • String ID:
                                        • API String ID: 1615377186-0
                                        • Opcode ID: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction ID: caaa131873699acb128bb705c9317aee132a88633482f32cd644b116ed3923b3
                                        • Opcode Fuzzy Hash: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction Fuzzy Hash: 0E51B529B09791C6EBA4AF25A518279E292BF44FC8F884439DE8D47B44DFBCE455C330
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF761684619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 7dce388daf7c0360c429ed901a4c1932f585a7893eb07c867ca39c62f188127c
                                        • Instruction ID: 57218de7ce3831b41a2f32ed5884d0bc975b9eeb97064a72790aeabf5f1f8672
                                        • Opcode Fuzzy Hash: 7dce388daf7c0360c429ed901a4c1932f585a7893eb07c867ca39c62f188127c
                                        • Instruction Fuzzy Hash: 4671E52AA08B92C2E7A5EB25D458369A7A6FB44F48F444035CB5D47B90DFFDE450C330
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF761684619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 730130e72ca5b2f77c77e0587357a2e092e42673f74bbb5f9fb3c086bc5617db
                                        • Instruction ID: 6370a7a963e67c9b1120843957c40fb7c4ff435bcd4633b9e17c583bcd157089
                                        • Opcode Fuzzy Hash: 730130e72ca5b2f77c77e0587357a2e092e42673f74bbb5f9fb3c086bc5617db
                                        • Instruction Fuzzy Hash: 3651D06AA08B82C2EBA5AB25E46836DA7A5FB44F48F854031CB5D47B50DFBCE450C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                        • API String ID: 600764987-3862749013
                                        • Opcode ID: 8904872445799dc1951122d08534c98c99bda82e2818c7aac7f99ee106927005
                                        • Instruction ID: b2dd1edd85660958a5f2527972f22fefdeb69075e49529267428d9f855699770
                                        • Opcode Fuzzy Hash: 8904872445799dc1951122d08534c98c99bda82e2818c7aac7f99ee106927005
                                        • Instruction Fuzzy Hash: 9D312D2AA0D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                        • API String ID: 600764987-1502336670
                                        • Opcode ID: 840bd877c669b48a6a94fe034f9355eb143cb0b64956bc24ea057a86771c70ac
                                        • Instruction ID: 47dfad16eeaa646a7d63aba7dd830c8044e7783fb5b0ad74e261369fc2bf0c19
                                        • Opcode Fuzzy Hash: 840bd877c669b48a6a94fe034f9355eb143cb0b64956bc24ea057a86771c70ac
                                        • Instruction Fuzzy Hash: 42312D2AA0D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                        • API String ID: 600764987-1965992168
                                        • Opcode ID: 660b00ea6d2708d63aff5c1d89183b731f15090953f73bcd8295e0b2a5769022
                                        • Instruction ID: 330a3fa6e13e606e6c1ad57ffa5b702725eb75eb65aa44a763cfa6da23f8424c
                                        • Opcode Fuzzy Hash: 660b00ea6d2708d63aff5c1d89183b731f15090953f73bcd8295e0b2a5769022
                                        • Instruction Fuzzy Hash: 3431212A60D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                        • API String ID: 600764987-2628789574
                                        • Opcode ID: 1bf145a435fb618fef3f911721eddb159762ac6c7d7498e0217c3f5d397e766c
                                        • Instruction ID: 5e26bde85dbb3e456133c96b2bcedd756ece224cb99f8be034c244456f081845
                                        • Opcode Fuzzy Hash: 1bf145a435fb618fef3f911721eddb159762ac6c7d7498e0217c3f5d397e766c
                                        • Instruction Fuzzy Hash: 2931212A60D6C1C5E761EF30E4593BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                        • API String ID: 600764987-1052566392
                                        • Opcode ID: c63af1cd2aabe92ea6c560fb305aaf36189a3a90deb3d1dd0a1db05c7edba30e
                                        • Instruction ID: db8f19ac1050427a099a11775041938a7f397e4a3d7cc969e8fc1efb08ffe01f
                                        • Opcode Fuzzy Hash: c63af1cd2aabe92ea6c560fb305aaf36189a3a90deb3d1dd0a1db05c7edba30e
                                        • Instruction Fuzzy Hash: 8C31212A60D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                        • API String ID: 600764987-2710416593
                                        • Opcode ID: 014b7078a5638918f36abdcc571b31f9088153de8ebe60f2355983b34161cd2c
                                        • Instruction ID: d28c62bd1c82cd5a0617a1abc67d06ed87914b50d94683322a9658ca289ccea0
                                        • Opcode Fuzzy Hash: 014b7078a5638918f36abdcc571b31f9088153de8ebe60f2355983b34161cd2c
                                        • Instruction Fuzzy Hash: 1A312F6AA0D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                        • API String ID: 600764987-1381340633
                                        • Opcode ID: 39d8055be6ec056283ed4960e21ca087c558c9f9d2422bf2f03a300a2b34b755
                                        • Instruction ID: bb47d41025afd67a783ff37f04c9b29a4cbe69d0cbefe9be81d1d06de08fee93
                                        • Opcode Fuzzy Hash: 39d8055be6ec056283ed4960e21ca087c558c9f9d2422bf2f03a300a2b34b755
                                        • Instruction Fuzzy Hash: 76312D2AA0D6C1C5E761EF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                        • API String ID: 600764987-618797061
                                        • Opcode ID: a90a319c955fa056155f22b8ab89f66d967a83091b8405e3dea220e42267a1f4
                                        • Instruction ID: 5835b52e4c59aacca6feaa93387e46bdc3dbe6bdf0942f43170a1296abe25a12
                                        • Opcode Fuzzy Hash: a90a319c955fa056155f22b8ab89f66d967a83091b8405e3dea220e42267a1f4
                                        • Instruction Fuzzy Hash: 95312D2A60D6C2C5E761AF30E4583BAB7A6FB84F44F80053ADA8D02A95DF7CD544CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_time64
                                        • String ID:
                                        • API String ID: 3087401894-0
                                        • Opcode ID: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction ID: db4da757f16a9700927b165383a9720c6011369e12cd0a11e99d0ae570db87c2
                                        • Opcode Fuzzy Hash: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction Fuzzy Hash: 18212F3AA09A41C1EB20AF22E85823DA371FB49F98F488435DE9E53754DEBCD455C360
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                        • API String ID: 0-808606891
                                        • Opcode ID: 458a01d5bfcce189351ee8b925d4386c51c3ca0d126a416866c77a1180e90565
                                        • Instruction ID: ecbedd9830e67e661f5cd3ca9b3851aa238626f9bdbd60bdf8fa9ce6fd391914
                                        • Opcode Fuzzy Hash: 458a01d5bfcce189351ee8b925d4386c51c3ca0d126a416866c77a1180e90565
                                        • Instruction Fuzzy Hash: A8B1716A908A81C5E7249F28D44823CB772F715F58FE44635CA5E132D8DFBCE985C3A2
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616BEC1A
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616BEC68
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616BECCB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616BEE09
                                          • Part of subcall function 00007FF7616B2BB0: strchr.VCRUNTIME140(00000000,?,?,00007FF7616B216F), ref: 00007FF7616B2BF6
                                          • Part of subcall function 00007FF7616B2BB0: strchr.VCRUNTIME140(00000000,?,?,00007FF7616B216F), ref: 00007FF7616B2C06
                                          • Part of subcall function 00007FF7616B2BB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF7616B216F), ref: 00007FF7616B2C30
                                          • Part of subcall function 00007FF7616B2BB0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616B2C65
                                          • Part of subcall function 00007FF7616B2BB0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616B2C8A
                                          • Part of subcall function 00007FF7616B2BB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616B2CAC
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7616BEE94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$callocmallocstrchr$freestrncpy
                                        • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                        • API String ID: 370574955-353107822
                                        • Opcode ID: 0c0948d19c927711db8b8bf866371c90e3d7f7b82c2d8019d98afbb20a8a4cda
                                        • Instruction ID: f98c2c2cb11bc920c5838af517b7da647f66389189ab878ea11a1bb1d52233f4
                                        • Opcode Fuzzy Hash: 0c0948d19c927711db8b8bf866371c90e3d7f7b82c2d8019d98afbb20a8a4cda
                                        • Instruction Fuzzy Hash: F4A14A3AA08B45CAEB50EF66E4442ADB3A6FB44F88F800035DE4D57758DFB8E465C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 1169197092-2292467869
                                        • Opcode ID: f05e9fc39bd4c4fc730cbf7ee75fb9a2225880a655b2c6a681a1218176bfac06
                                        • Instruction ID: f7f4aebbfa70006010b533c51d885df17db1f9aadda89e4161b2663e2d937811
                                        • Opcode Fuzzy Hash: f05e9fc39bd4c4fc730cbf7ee75fb9a2225880a655b2c6a681a1218176bfac06
                                        • Instruction Fuzzy Hash: 1B91856AA0D782C5FF75A7159548379E7E2EF45F68F884035CA8E02791DFACE444C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchrstrtol
                                        • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                        • API String ID: 137861075-1224060940
                                        • Opcode ID: d78e3ff692bd5202c6bbaa1cddfaf308f6c3017d1e039b30db1cab326158a513
                                        • Instruction ID: e9c35569e674210d329bb4e916f31f69178b8367892ed9f327adcb923cd80030
                                        • Opcode Fuzzy Hash: d78e3ff692bd5202c6bbaa1cddfaf308f6c3017d1e039b30db1cab326158a513
                                        • Instruction Fuzzy Hash: CD51D526608BC2C5EBB1AF15A4043A9E796FB41F98F844135DE9D0BB98DFBCD141C720
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                        • API String ID: 1294909896-1147549499
                                        • Opcode ID: 64078f5509ce6789c703cda9e5244dec7a4fd932365f29ec984a8d0e853d9342
                                        • Instruction ID: 3896d4d98df164f1b98fa9f833199e947ce1a3c664513c65dd19060cd168b362
                                        • Opcode Fuzzy Hash: 64078f5509ce6789c703cda9e5244dec7a4fd932365f29ec984a8d0e853d9342
                                        • Instruction Fuzzy Hash: 75413D19F08642C2EB54BB2595582B9D397AF84FC0FD84031DE0E47A96DEEDE412C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$callocfreestrrchr
                                        • String ID: Wildcard - Parsing started
                                        • API String ID: 2641349667-2274641867
                                        • Opcode ID: 028b54095a7822f1396337978b26ea308b95a88309c4f6e321017f34df1af4ed
                                        • Instruction ID: 9900dae18b1362b6ea072d62e940eae0c5b57962ef7d2015cc20576ba38a352e
                                        • Opcode Fuzzy Hash: 028b54095a7822f1396337978b26ea308b95a88309c4f6e321017f34df1af4ed
                                        • Instruction Fuzzy Hash: 29516E3AA09B82C1EB11EF15E4581B8B7A6FF84F84F854435CA4E4B754DFB8E455C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                        • API String ID: 2653869212-3672398475
                                        • Opcode ID: ae44b6cc25f1171be3da277d17204bf0ad59979bfeed4c3c9ad4a1016a462e04
                                        • Instruction ID: edc2fb03ad427ebfb04985bf56d3a05a49a27cd8f206cb159f5f8a49a097f48b
                                        • Opcode Fuzzy Hash: ae44b6cc25f1171be3da277d17204bf0ad59979bfeed4c3c9ad4a1016a462e04
                                        • Instruction Fuzzy Hash: 3E41A56AE09782C4EB11EB25945C2F9A766BF05F88F844435CE4D177A6DFBCE150C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocmemcpy
                                        • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                        • API String ID: 4276657696-1832275178
                                        • Opcode ID: 469a3e2e16c267789cc01c7905be1eba584b916866bd235b0b9d2c5f4a0e47db
                                        • Instruction ID: b5390a5d908ee2073fdfe2722c26694f1b65bec81b2b5e59150e10c0b4829e0d
                                        • Opcode Fuzzy Hash: 469a3e2e16c267789cc01c7905be1eba584b916866bd235b0b9d2c5f4a0e47db
                                        • Instruction Fuzzy Hash: FEA16D6AA09B82C4EB65AF11E5483A9B3A6EF44F84F844176CE8D03B58DF7CE444C751
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: 4ccdc9ab91a0535d77fa9aa8c0208e1d0a080a60d205a77c385ac69a42cf734e
                                        • Instruction ID: bc762b7c58aec8b44113bda6a9f7bf553b33be593e17d15f818ebff87f1680e9
                                        • Opcode Fuzzy Hash: 4ccdc9ab91a0535d77fa9aa8c0208e1d0a080a60d205a77c385ac69a42cf734e
                                        • Instruction Fuzzy Hash: 8F613669A09783C5EB18EB65801C1B9A7A7BB05F84F844535CE1F077E5DEBCE024D320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: e569bb298ba613fd79d8233cd29af96ef3bc2d3c48f7074fe414be77698e85c2
                                        • Instruction ID: e3f7b31485d825931a334468683d243f02ac3760bab03a30010bb83cf7b15af0
                                        • Opcode Fuzzy Hash: e569bb298ba613fd79d8233cd29af96ef3bc2d3c48f7074fe414be77698e85c2
                                        • Instruction Fuzzy Hash: 3C610459E09692C5EB18EB25841C2B9A793AF05F88F844535CE0F0B7D5DEBCA165D320
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF761694DF8), ref: 00007FF7616B1920
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF761694DF8), ref: 00007FF7616B1957
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF761694DF8), ref: 00007FF7616B197E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                        • API String ID: 1294909896-3948863929
                                        • Opcode ID: df50d3c08605608153538d01eb3d3f3672086f7079c31e4fc3a596cca71a9e3d
                                        • Instruction ID: 56e12fa86eae11d90b79e0e4a245616ba3d77bed0caa7f4db8c7e1071b5897d4
                                        • Opcode Fuzzy Hash: df50d3c08605608153538d01eb3d3f3672086f7079c31e4fc3a596cca71a9e3d
                                        • Instruction Fuzzy Hash: F661372AA08B81D1EB60EF15E4483AAB3A6FB45F88F804036DA8D47754DFBCE555C721
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                        • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                        • API String ID: 1392894463-1168109407
                                        • Opcode ID: a3a8ded29e8c24b2ee7d97979504e82674f803be7010108302ac092b5f4bb2fd
                                        • Instruction ID: f04baaea4e50c0eb2550c0b852482ef3d8f83a18d1f0dde7eedbf8f7dd34300b
                                        • Opcode Fuzzy Hash: a3a8ded29e8c24b2ee7d97979504e82674f803be7010108302ac092b5f4bb2fd
                                        • Instruction Fuzzy Hash: B2410529A086C2C1FB50AB2594082B9E792EF45FC5FC84139DE9E87AE5DF6CE401D730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$mallocrealloc
                                        • String ID: 0123456789-$<DIR>$APM0123456789:
                                        • API String ID: 359134164-4291660576
                                        • Opcode ID: 179db5e6ecdb2eedd8a35f1361e26f9261d76770616d7f3031361c8db7d08d42
                                        • Instruction ID: fb33fdb8fe23d77770ced9cc2cab38ece1b28b74059b8a37070ff349081c85db
                                        • Opcode Fuzzy Hash: 179db5e6ecdb2eedd8a35f1361e26f9261d76770616d7f3031361c8db7d08d42
                                        • Instruction Fuzzy Hash: 83B16C3AA09B42C6EB24EF25D058339A7A2FB44F9CF954035CA4E47394DFB8E561C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$Ioctlsetsockopt
                                        • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                        • API String ID: 3352517165-607151321
                                        • Opcode ID: 6693351069b30d5b7b6ec30cec5eec467f648fc5bd0d0573ec4d2490d6104c5a
                                        • Instruction ID: cda4a1390bf0d226b6f5962ff9a1e6d5fa047f594b2c3094b3838f6abdea17a2
                                        • Opcode Fuzzy Hash: 6693351069b30d5b7b6ec30cec5eec467f648fc5bd0d0573ec4d2490d6104c5a
                                        • Instruction Fuzzy Hash: 8FB15F36A09AC6C5EBA1AF25D4483F9A392EB44F58F484136CE4D0AB95DFBC9495C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: %s?%s$Failed sending Gopher request
                                        • API String ID: 111713529-132698833
                                        • Opcode ID: 483f11529e2bd2f827472fbb64514bc7533f7996d6268b5361bb568acff0b98a
                                        • Instruction ID: 8a3c0d83ac7513fbe0f170ed040ab2443e93b66455a0b51729073b98dc8c6e30
                                        • Opcode Fuzzy Hash: 483f11529e2bd2f827472fbb64514bc7533f7996d6268b5361bb568acff0b98a
                                        • Instruction Fuzzy Hash: B851962AB09B82C1F751AB66A4181BAE392FB45FE4F844231DE6D47BD5DE7CD402C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: abc4dcb4bf626f12aceca109b3ac5be41942692fc4efa9d11af6e3b39507fb0f
                                        • Instruction ID: 7936e9504c703c1494c2c21bb55d2d03069688c74e8aec46d575f451dea73386
                                        • Opcode Fuzzy Hash: abc4dcb4bf626f12aceca109b3ac5be41942692fc4efa9d11af6e3b39507fb0f
                                        • Instruction Fuzzy Hash: 4C61F926A18A85C5EB10EB78E4483EDA372FB45BA4F805331DA6D13AD9DFBCD085C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: 418e4009ded77f161f9af62bfedde694c8209946c77fb1f942d757c564764665
                                        • Instruction ID: bee7c331d57f8c3b5844946e132985e601d1e9bc610a024a2f116863b7f9fbac
                                        • Opcode Fuzzy Hash: 418e4009ded77f161f9af62bfedde694c8209946c77fb1f942d757c564764665
                                        • Instruction Fuzzy Hash: 1B61E636A18A85C5EB10DB79E4483ED6332EF45BA4F505335EA6C12AE9DFBCD081C750
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7616A7506
                                        • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7616A755B
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7616A75CC
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7616A75D9
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7616A76EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _close$_fstat64_openstrchr
                                        • String ID: Can't get the size of %s$Can't open %s for writing
                                        • API String ID: 423814720-3544860555
                                        • Opcode ID: 4646d5958fd0afe558b6e628580ec2560eed784401f815918089c05b269bd973
                                        • Instruction ID: abe4ee10b49316e6ce149324f26a0ccaf784169123952f5e566cf17e5255a43e
                                        • Opcode Fuzzy Hash: 4646d5958fd0afe558b6e628580ec2560eed784401f815918089c05b269bd973
                                        • Instruction Fuzzy Hash: FA51C625B08A86C2EB14AB25D4583B9A392FF85FD0FC49435DE4E47799DEBDE401C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdupstrtol
                                        • String ID: %%%02x
                                        • API String ID: 2999891020-4020994737
                                        • Opcode ID: 74a58f8c083852693bf64881fee03805f566497237c963ec1128527847eabe63
                                        • Instruction ID: 23c274d9cd6fafeb36c7213a40892ea1aa3c9c5000874b4de4f70b97ef149b06
                                        • Opcode Fuzzy Hash: 74a58f8c083852693bf64881fee03805f566497237c963ec1128527847eabe63
                                        • Instruction Fuzzy Hash: 5051EA19E0D692C5FB61A711A01837DABD2AF41F94F8901B5DE9E07BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1496848336-4020994737
                                        • Opcode ID: 11a0c1ad3791ab075d9d13a3d2058a3ec95cb1eb7b8996445b049866087062de
                                        • Instruction ID: 7e99b45e6ba9c07e2b60ed92623eb2b626ecd7db46f907920c5f2e9803660324
                                        • Opcode Fuzzy Hash: 11a0c1ad3791ab075d9d13a3d2058a3ec95cb1eb7b8996445b049866087062de
                                        • Instruction Fuzzy Hash: F741E519D0D692C5FB62AB1160183BDABD2AF06F54F8905B1DEDE06BC1DEADE405C331
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 111713529-517259162
                                        • Opcode ID: 848f9bd136f30b638347715e6b3aa5fb2b1dd1155d484af4729bc6df23dfb9d6
                                        • Instruction ID: 380827ca32706e37221e5076f52bed5c067a749be56493f0e7f4f9dc3515e43b
                                        • Opcode Fuzzy Hash: 848f9bd136f30b638347715e6b3aa5fb2b1dd1155d484af4729bc6df23dfb9d6
                                        • Instruction Fuzzy Hash: C531B459E09783C4EB10EB25941C1F9A7A76F05F88F844435CD4E177A6DFBCA110D320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-599393795
                                        • Opcode ID: 2f203b4647518da1f2e7f5e41acfa6be74a516219f63d053806ad01f872eec19
                                        • Instruction ID: 03b7475ca585bd7a77885517963ee0f525acebb1db6d356c7c0fcbf9dea7dc87
                                        • Opcode Fuzzy Hash: 2f203b4647518da1f2e7f5e41acfa6be74a516219f63d053806ad01f872eec19
                                        • Instruction Fuzzy Hash: 2961E36AA097D2C4EB10EB29940C1B9FBA6AB15F84FC44436CE4D17B95DFBCE161C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 901724546-1663925961
                                        • Opcode ID: 9e4491614718e25cc1eab2119404d1c2449d3d8cad68613c048e147f197bde4b
                                        • Instruction ID: 889e0251d3efd58cc2cb02d535add90d2f377ea1f86ecb4c74c5114c4b8c846b
                                        • Opcode Fuzzy Hash: 9e4491614718e25cc1eab2119404d1c2449d3d8cad68613c048e147f197bde4b
                                        • Instruction Fuzzy Hash: 1D513529A08683C6EF18EB19901C3B9A396EB45FD4F840136CA5F077A5EEBCE055D321
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID:
                                        • API String ID: 1169197092-0
                                        • Opcode ID: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction ID: 92e5293586c50a76ec5662ae59fd2a871d25aff17680f0f08c40b4f46c213409
                                        • Opcode Fuzzy Hash: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction Fuzzy Hash: FD51802AA1AB91C2EB55CF65F054628B7B4FB48F88B481175EF9D03B48EF38D4A1C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-3876350232
                                        • Opcode ID: 03dff17ac0cd915ebebac05d076bcb7c51ce859e12afd2d7d7880ca572dcb3ce
                                        • Instruction ID: d969195bd63079358ccd328c8e140bd5d268d99fd52ca148b4119a4006e08c24
                                        • Opcode Fuzzy Hash: 03dff17ac0cd915ebebac05d076bcb7c51ce859e12afd2d7d7880ca572dcb3ce
                                        • Instruction Fuzzy Hash: 2851A16AA09782C4EB10EB2594081F9A767BB05F88FC84436CE4D1B799DFBCE554C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: 9cfc241ff50fa9f1d546cf1a4f6eb5ae5dff09977d4f1df51ff9215a3f6f9d9a
                                        • Instruction ID: 224eb6e57925e248b09f561b394dec900df614f95f703cc94376d4fe2def9b0f
                                        • Opcode Fuzzy Hash: 9cfc241ff50fa9f1d546cf1a4f6eb5ae5dff09977d4f1df51ff9215a3f6f9d9a
                                        • Instruction Fuzzy Hash: A841C169A09783C4EB14EB65941C1F9A7A7BF15F88F844435CE0E577A6EFBCA114C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: f9c98c4728642ed9e1a96ad5c64d8c7b5bcb162c8dc94b6f4a0ea47b6ce93bc3
                                        • Instruction ID: 3d55a25d3e096818001bc4c00015d0f9761a5434af6f2613cfa4e352c1289c44
                                        • Opcode Fuzzy Hash: f9c98c4728642ed9e1a96ad5c64d8c7b5bcb162c8dc94b6f4a0ea47b6ce93bc3
                                        • Instruction Fuzzy Hash: 0C41823A908B43C2E761AF20E444238B3A5FB49F98F848975DE8D53754CF78D850D360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction ID: a983ab1781737581284602451c22bd3d7f169633e1a1b6d1529d7eb8ef331da7
                                        • Opcode Fuzzy Hash: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction Fuzzy Hash: B5312B3AA08A51C2E720AF11E818229B371FB89FC8F484435DE9D53B68CFBCD851D710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction ID: 477afd3012d48ffc4c73ee14024677dd16265e1de2feb7ac957e5e3f32cd87e9
                                        • Opcode Fuzzy Hash: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction Fuzzy Hash: C701E169A14A01C2DB14EF21F868138A332FF89F8DB445435CD9E93324CF6CD864D360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpymemset
                                        • String ID:
                                        • API String ID: 1579693990-0
                                        • Opcode ID: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction ID: 25037c6e4d6977977e1bb7f8eef1ebef5a353a1925da311f68be2d553e6710cb
                                        • Opcode Fuzzy Hash: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction Fuzzy Hash: 78916D69B09782C2FB65FA26945837AE292AF84FC4F844434DE5E47785DFFCE4218324
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7616898B8), ref: 00007FF761689A05
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7616898B8), ref: 00007FF761689A1F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64$Internal error removing splay node = %d
                                        • API String ID: 1114863663-13178787
                                        • Opcode ID: 4abe602e0432aed16e7e57adae7ae147e6c576377803e4fc3a9105ccc54124ad
                                        • Instruction ID: f53387597720b710835233a2a840977a73d718a629d0f0574f999f7d51f1347e
                                        • Opcode Fuzzy Hash: 4abe602e0432aed16e7e57adae7ae147e6c576377803e4fc3a9105ccc54124ad
                                        • Instruction Fuzzy Hash: FFA1C436A08682C6DB609F14D48877DBBA5FB89F4CF854135DA9E43694DF7CD208C760
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF76167B23A,?,?,?,?,?,?,?,00007FF76167B007), ref: 00007FF761698221
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7616983C3
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7616983E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                        • API String ID: 2644425738-1191287149
                                        • Opcode ID: 9224fbc54b73e1d84aa41a66293c8d90ff55d81bd2fcf765c44fad8682bdecb1
                                        • Instruction ID: 58c6e96c905094471e813f7aaacc89a9c2c61e631b8ba68d98fd92760ee4d626
                                        • Opcode Fuzzy Hash: 9224fbc54b73e1d84aa41a66293c8d90ff55d81bd2fcf765c44fad8682bdecb1
                                        • Instruction Fuzzy Hash: DF514616B0D78FC2EB60AF15900817EE296AF41F88FC44875DA4E07768DEBCE845D720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 1169197092-2292467869
                                        • Opcode ID: 98d2d3bcc1ba16a5f119fe8c426068166d2e80bf788a6bcfee71b2c1afddc434
                                        • Instruction ID: 20f6a5d9865bd5f9d755d954d761f2f680ad51dcd628abb292bceb3003c7b7c4
                                        • Opcode Fuzzy Hash: 98d2d3bcc1ba16a5f119fe8c426068166d2e80bf788a6bcfee71b2c1afddc434
                                        • Instruction Fuzzy Hash: F961686A90D782C5FF75AB159448379E7E6EF44F68F884036CE8D02691DFACE444C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$strchr
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 3404610657-2292467869
                                        • Opcode ID: a24a650fb72ad2b09065b53723891c1304722ecbf4ec04612f37557dfc567d4b
                                        • Instruction ID: 163b96a67888e9e24eae39b16ce3d2fa4f13e8e8cb8258f52566122301b067aa
                                        • Opcode Fuzzy Hash: a24a650fb72ad2b09065b53723891c1304722ecbf4ec04612f37557dfc567d4b
                                        • Instruction Fuzzy Hash: 6961786A90D782C5FF71AB159448379E7E6EF44F68F884436DE8D02691DFACE484C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strstr
                                        • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                        • API String ID: 1392478783-2096918210
                                        • Opcode ID: 6604bb869a8a57031b4299baf1fbfffbabbfb4a6203eacfed88301d08e207690
                                        • Instruction ID: 780d9cb6fc777a3571657cf4eded4ad595ad3b0a2897019c459a9af4d76435d4
                                        • Opcode Fuzzy Hash: 6604bb869a8a57031b4299baf1fbfffbabbfb4a6203eacfed88301d08e207690
                                        • Instruction Fuzzy Hash: EE51C866A08786C2EB64E759A44C2B9E392EB45F64FC44232DA5C02ED5DFFCD482C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                        • API String ID: 2190258309-3231818857
                                        • Opcode ID: cc4af213bcdcfd7440e4ed7acfa4c34d05be6f0fa52ceb2334c71298c3da4e5a
                                        • Instruction ID: 265e14db6bda9640da700c653d11d0dbd32a4a01db0ff273eba357139157d3fe
                                        • Opcode Fuzzy Hash: cc4af213bcdcfd7440e4ed7acfa4c34d05be6f0fa52ceb2334c71298c3da4e5a
                                        • Instruction Fuzzy Hash: 9751B16AA0C6C2C5EB11DB25A40C2BDF7AAEB45F88F944431CA8D03765DFBCE165D720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreememcpy
                                        • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                        • API String ID: 1248052217-2335292235
                                        • Opcode ID: 496247f600eb8e8a61c92fbf89c74c7560249ec54409c2c417aedbd0a8a9ab2f
                                        • Instruction ID: bcc7c8712529eb2c1903c722ab085b83078fca9bc94876e764c2f259f89d9451
                                        • Opcode Fuzzy Hash: 496247f600eb8e8a61c92fbf89c74c7560249ec54409c2c417aedbd0a8a9ab2f
                                        • Instruction Fuzzy Hash: 7251E629B08682D5FB64FA2698083B9D353BF45F94F848131DE4E87AD1EFACE445C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrmemcpyrecvfrom
                                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                        • API String ID: 3107918033-477593554
                                        • Opcode ID: a3e2849103a70247068220ebcdcc0a559ec76594586829a5efb8fe2af2be80d4
                                        • Instruction ID: ff762cc46792ff66e13d2d2d5ba124257f347ce944814c063b5673d56b0889f9
                                        • Opcode Fuzzy Hash: a3e2849103a70247068220ebcdcc0a559ec76594586829a5efb8fe2af2be80d4
                                        • Instruction Fuzzy Hash: 0351E379A08692C5EB64EB25D4283BAF392FB45F44F844132DE4E87B85DE7CE405CB60
                                        APIs
                                          • Part of subcall function 00007FF761666DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7616623DB), ref: 00007FF761666E5E
                                          • Part of subcall function 00007FF761666DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7616623DB), ref: 00007FF761666E6C
                                          • Part of subcall function 00007FF761666DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7616623DB), ref: 00007FF761666E82
                                          • Part of subcall function 00007FF761663BC0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF761661D9B), ref: 00007FF761663C06
                                          • Part of subcall function 00007FF761665DE0: memcpy.VCRUNTIME140(?,?,?,00007FF761661DCA), ref: 00007FF761665E71
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662479
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616624B8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662506
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662554
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                        • String ID: at line $, column
                                        • API String ID: 2665656946-191570568
                                        • Opcode ID: cd88fc2eb0c43cf2dea86ed3eb464c30a0ca442cdfdcf6784071c49820cf1abd
                                        • Instruction ID: 5bbaf011dd01692d1752ad309cdf0282d880e795a7894607d3771cc0652ad066
                                        • Opcode Fuzzy Hash: cd88fc2eb0c43cf2dea86ed3eb464c30a0ca442cdfdcf6784071c49820cf1abd
                                        • Instruction Fuzzy Hash: 3551B366B18A82C5FB04EB74D4583AC7332EB44BA8F405235DE6D23BDADEB8D485D350
                                        APIs
                                        • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664AA3
                                        • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664AF7
                                        • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664B1E
                                        • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664B46
                                        • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664B8C
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664B93
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF76166315B,?,?,?,00007FF761663114), ref: 00007FF761664BA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                        • String ID:
                                        • API String ID: 1492985063-0
                                        • Opcode ID: 8539b71a9476b0b565f630c419d2d07fcfc2176833b4c9dbc2d1a14acb684146
                                        • Instruction ID: 6c40066ef9d04a583484e6713fb50fdd1a10671ef2954ca7cd8a78ebaa2edd92
                                        • Opcode Fuzzy Hash: 8539b71a9476b0b565f630c419d2d07fcfc2176833b4c9dbc2d1a14acb684146
                                        • Instruction Fuzzy Hash: 67518E36608A41C2EB209F19E1A8238E7B2EB80F95F55C235CE5E537A4CFB9D442C395
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                        • API String ID: 1294909896-1255959952
                                        • Opcode ID: f198fbd2046383c1a6cce593e2bc3142b815703f912c50491b5b73dd462a67c1
                                        • Instruction ID: f7c401e7d8b31f1e78d1587143e3553594c49b4caf9c63f539b240cdf03a61a9
                                        • Opcode Fuzzy Hash: f198fbd2046383c1a6cce593e2bc3142b815703f912c50491b5b73dd462a67c1
                                        • Instruction Fuzzy Hash: 1251E777909642E2FB11EB61E4482BDA7A6FB41F84F884031DA4D43681DFBCE475C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 2f12533ae5c7d22c91c98250c81db4f994baa735569bf2d412694917429020a2
                                        • Instruction ID: e50c9811dabf0361453cddfed26b61457a43ec024602c4638076859fb20724af
                                        • Opcode Fuzzy Hash: 2f12533ae5c7d22c91c98250c81db4f994baa735569bf2d412694917429020a2
                                        • Instruction Fuzzy Hash: DC41D619D0D692C5EB62A71160183BDABD2AF42F54F8905B1DEDE06BC1DEADE405C331
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: a2a6ca694af6d6b6ff358b0db032f8cc45bfc6661a346e6da40368cd7cad8861
                                        • Instruction ID: d07b644a9a198be168bf1575fe0dfdc370c32680f5cf82621899bcd60c6be1df
                                        • Opcode Fuzzy Hash: a2a6ca694af6d6b6ff358b0db032f8cc45bfc6661a346e6da40368cd7cad8861
                                        • Instruction Fuzzy Hash: 2041E619D0D2D2C4FB62A71160183BDABD29F46F54F8901B1DE9E06BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: add6d49ce95373930ca12822ca5706401dd4ce203f97ecf9262891c636c1e989
                                        • Instruction ID: 178df28e6a5724e21824a62cb21ddb9f186796a5bb94283b06cb97695b4fcbbd
                                        • Opcode Fuzzy Hash: add6d49ce95373930ca12822ca5706401dd4ce203f97ecf9262891c636c1e989
                                        • Instruction Fuzzy Hash: 7E41E719D0D292C5FB62A71160183BDABD29F06F94F8905B1DE9E07BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 6ddab9e1bea1c4541d84d215edef0730235214fb9ebe75839b84cfb8c703a0c1
                                        • Instruction ID: 0ef96995af1b086cca3c98bb0e75408de2741b768c9c2e5e2b2ce1d950a5c971
                                        • Opcode Fuzzy Hash: 6ddab9e1bea1c4541d84d215edef0730235214fb9ebe75839b84cfb8c703a0c1
                                        • Instruction Fuzzy Hash: 8A41E719D0D292C5FB62A72160183BDABD29F06F94F8905B1DE9E07BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: f24707c84e03f7a66e94ac29b5f0433a77d803606814e6d8575d6aa59e1712ec
                                        • Instruction ID: 8958c89ee244a70b2bccc7c3a408e16edc22ccb4a60929b9246bd5178b26c2b9
                                        • Opcode Fuzzy Hash: f24707c84e03f7a66e94ac29b5f0433a77d803606814e6d8575d6aa59e1712ec
                                        • Instruction Fuzzy Hash: 0141D619D0D292C5FB62A71160183BDABD29F06F94F8905B1DE9E06BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: d0b26e73ffc5f99cf69ba09fbf06d48aaf8e2ad000c814df662444c5f3b2e9b2
                                        • Instruction ID: 91988ef619e461189582421931a62c2793abd77d9f78ed79ee535d722c82652c
                                        • Opcode Fuzzy Hash: d0b26e73ffc5f99cf69ba09fbf06d48aaf8e2ad000c814df662444c5f3b2e9b2
                                        • Instruction Fuzzy Hash: 5941F819D0D292C4FB62A71160183BDABD29F46F94F8905B1DE9E07BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 79a656023e6bd4345ef3070d038f4b0a04e506819340c9dc18019e0ab5006f97
                                        • Instruction ID: 7cf67a8cb17cd6e85f04cb45cc5a8ed2402b7a4335fe7010a259831b4079836b
                                        • Opcode Fuzzy Hash: 79a656023e6bd4345ef3070d038f4b0a04e506819340c9dc18019e0ab5006f97
                                        • Instruction Fuzzy Hash: DD41C519D0D692C4FB62AB1160183BDABD29F46F94F8901B5DE9E07BC1DEADE405C332
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64
                                        • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                        • API String ID: 1670930206-870032562
                                        • Opcode ID: 74e62bef8fa31f227eae4ae217bd9c3a0d0584a610b1ab6dd052daefc5e3ab35
                                        • Instruction ID: 29ca332eec4b6771061aa1b7e2d4a460f4428be72a26bb11164cf60623c2913c
                                        • Opcode Fuzzy Hash: 74e62bef8fa31f227eae4ae217bd9c3a0d0584a610b1ab6dd052daefc5e3ab35
                                        • Instruction Fuzzy Hash: 4F41277AB24616C6DB20DF2AE0046A8B7A1F798F8CF905032DE4C87B84DE7DE511CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr
                                        • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                        • API String ID: 2830005266-711804848
                                        • Opcode ID: d589d7f1a0eca895f8ffff6343643548f106be98028e10f8c7df182552c1a110
                                        • Instruction ID: dbdd1aef9c002fb007ae242e323280008ef8b34afbd92b1baafb8395985e186a
                                        • Opcode Fuzzy Hash: d589d7f1a0eca895f8ffff6343643548f106be98028e10f8c7df182552c1a110
                                        • Instruction Fuzzy Hash: 88411829B1C683C2EB54FB1AA5080B8E392AF45F84FC85474DE5D47796DEECE8418B24
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fseek
                                        • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                        • API String ID: 623662203-959247533
                                        • Opcode ID: 672089d161110b70d9a96796637fe62ce77795772ff06e397206ddfe9950c99d
                                        • Instruction ID: 1183e75020f854ed9f0c0dae69e1ac17dbc1028e729c265a38749ffdd1d4f431
                                        • Opcode Fuzzy Hash: 672089d161110b70d9a96796637fe62ce77795772ff06e397206ddfe9950c99d
                                        • Instruction Fuzzy Hash: 2741C56AA14681C1EB90AF2A94583F85393EB84F98F886031DD0E4B799DFBDD490C770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                        • API String ID: 2190258309-3662781045
                                        • Opcode ID: 81ec5cdf911039d5ac5546a4cba887d0936b7f84550cb837826ce393f7bf0ef0
                                        • Instruction ID: 0b61620f52170abf6f6393a6e37596de756a7c8b075e9cc119d0faa59b3fb67a
                                        • Opcode Fuzzy Hash: 81ec5cdf911039d5ac5546a4cba887d0936b7f84550cb837826ce393f7bf0ef0
                                        • Instruction Fuzzy Hash: DC41812AA08B82C5EB10EB25E4081EAE3A6FB45F88FC80432DA4D17765DFBCD555D720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-659367561
                                        • Opcode ID: 0727d6f78932e429ab4fbfca8d635a4f14a82bbe5beda4dd6ce3d34bcfbc9a7f
                                        • Instruction ID: 6de5e81d2ec855808a7da0f4100985777590be36497cd582be6c7b8b27398e8a
                                        • Opcode Fuzzy Hash: 0727d6f78932e429ab4fbfca8d635a4f14a82bbe5beda4dd6ce3d34bcfbc9a7f
                                        • Instruction Fuzzy Hash: 2A419359A09792C8EF10EB2594181B9ABA7AF05F88FC45835DE0E5B796DEBCE110D320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: .
                                        • API String ID: 1865132094-916926321
                                        • Opcode ID: 126cce29423b04e181cdf8db6ab3ac814217b907ae3d6256a840f172d07d0515
                                        • Instruction ID: 1dd3f5d71f4038ddc1a0af46276583b383319ecf952a0b0e731e646519afe258
                                        • Opcode Fuzzy Hash: 126cce29423b04e181cdf8db6ab3ac814217b907ae3d6256a840f172d07d0515
                                        • Instruction Fuzzy Hash: 4141832AE08B85C2EB60FB15A418379A7A2FB44F84F854035DA4D87B50DFBCE451C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: 1041f1c514f0783e2dd224254fe01bacb26eac6c194eb6be230712af05d872a0
                                        • Instruction ID: f85c0394577ca53b88bbe7a2d7db26d26af681a492d26a0536e58da76026738e
                                        • Opcode Fuzzy Hash: 1041f1c514f0783e2dd224254fe01bacb26eac6c194eb6be230712af05d872a0
                                        • Instruction Fuzzy Hash: A4418269E09792C4EB14EB2694181F9A763BF05F88F844435CE0E1B7A5EFBCA555C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 3519880569-1663925961
                                        • Opcode ID: f6c58c40ca3c7ba21690231e68ce7d023b12d9f0ab968a8b5222cd54bd54690d
                                        • Instruction ID: d2c7eafe9ad8fd517056b2f79ce2efed7024a01b3c6103d2a7d199c0c04f7b4d
                                        • Opcode Fuzzy Hash: f6c58c40ca3c7ba21690231e68ce7d023b12d9f0ab968a8b5222cd54bd54690d
                                        • Instruction Fuzzy Hash: 3E31A169A09783C5EF50EB16A4182B9A396BF85FD8F840536CE4D177A5EE7CE011C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanf_strdupfree
                                        • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                        • API String ID: 860312144-3309259123
                                        • Opcode ID: 826ba58853a3d136957f2169816f333a83ec11baa541e78f2ddb2eeea56b2deb
                                        • Instruction ID: 9cab246e1aa234a2a6f7776bf358ca13e9c6d36301ec0bcd24f7817b32d09cca
                                        • Opcode Fuzzy Hash: 826ba58853a3d136957f2169816f333a83ec11baa541e78f2ddb2eeea56b2deb
                                        • Instruction Fuzzy Hash: AB317F2EA08643C2EB60B721D04817DA262FF45F94F9148B2DA0D47665DFACEC51C3A1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                        • API String ID: 1865132094-176635895
                                        • Opcode ID: 62b85369cd27f97f539dac32cc0ef890eb95eb4242f3e514727c1d211b7498cd
                                        • Instruction ID: e3046ef165515ccf1f35d3a5f832a72fb392936cbcbec4532ccc9c0bc3b87ddd
                                        • Opcode Fuzzy Hash: 62b85369cd27f97f539dac32cc0ef890eb95eb4242f3e514727c1d211b7498cd
                                        • Instruction Fuzzy Hash: D021D36AA0C6C2C5EB21EB14A45C2B9B7A3BB05F88FC44431CA4D473A5DF7CE155C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1941130848-1663925961
                                        • Opcode ID: 2a26922783b79db217bfca0c63685440ab013e418253220c7c111f94832e3c4e
                                        • Instruction ID: 795ac4165aee0f21f6120835040fbbef1d8baf39c39245648747982406461be7
                                        • Opcode Fuzzy Hash: 2a26922783b79db217bfca0c63685440ab013e418253220c7c111f94832e3c4e
                                        • Instruction Fuzzy Hash: 5221626AA08B83C6EB50EB15E4582BAA3A6FF85F88F840431DE4D57725DF7CD111C720
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F971
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F981
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F98F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F99D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F9AB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F9B9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F9C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761683166), ref: 00007FF76167F9D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 159598ebfb569086bc716e34c96faf4a22b156ce6e7ac36b2c598c0d33f506ab
                                        • Instruction ID: 9e6ad78907b4c642edacbdc2a7986eafe293bf4fb7fdf18997fda741386e4db9
                                        • Opcode Fuzzy Hash: 159598ebfb569086bc716e34c96faf4a22b156ce6e7ac36b2c598c0d33f506ab
                                        • Instruction Fuzzy Hash: 6C01957A908B01C2D714AF21F5A823CB3B5FB89F8D7505529CE9E92718CF78D4A5D360
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7616832AB), ref: 00007FF761682A47
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7616832AB), ref: 00007FF761682A78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID:
                                        • API String ID: 2635317215-0
                                        • Opcode ID: 0fb57dad171391ca7d70d225b33378c24a799a4b54e0a408ec16e5806fda4d65
                                        • Instruction ID: d13d00f2bb10f1d53e6ac3d722400667664adf1ebf6009296e90a7fef4ac0d6a
                                        • Opcode Fuzzy Hash: 0fb57dad171391ca7d70d225b33378c24a799a4b54e0a408ec16e5806fda4d65
                                        • Instruction Fuzzy Hash: 3291BC2A609BC1C9D7559F3494543AD77A1FB95B28F48023ACFAC0B3C6CF6991A4C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3401966785-2389359183
                                        • Opcode ID: f556fee176fe82f456707ea2d7e94ec0464d0004553f07bbcd4056a846298c95
                                        • Instruction ID: b9829edacf1f3f89508d4e897fc8c0032011ed6ff5014ed5295d3d5306110c08
                                        • Opcode Fuzzy Hash: f556fee176fe82f456707ea2d7e94ec0464d0004553f07bbcd4056a846298c95
                                        • Instruction Fuzzy Hash: 94415C5AA0D2D2C5EB19EB15402C2B8AB93EF15FD4F844635CA1F077D5DEACA465C330
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction ID: f4a50e1859c21f14f60dfffd9fe9e54d99249734768af051fd48774b68a0bc2e
                                        • Opcode Fuzzy Hash: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction Fuzzy Hash: D231F069718B81C1EF10EB16A1081A8E262AB04FE0FC40A32DE6E577D5CFBCE441C3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: f06e59eeaae8cef8ada80270bc3da1753f3d925e9ea74eb361696e54cb589952
                                        • Instruction ID: 5d7cff5349f149bf048841fef542338697bb8274e84840d26e4c709c1db010c2
                                        • Opcode Fuzzy Hash: f06e59eeaae8cef8ada80270bc3da1753f3d925e9ea74eb361696e54cb589952
                                        • Instruction Fuzzy Hash: FE41E769A08782C8EB10EB6594081F9A767BF05F88F884535CE0D57795DFBCE114C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$freemalloc
                                        • String ID: PLAIN
                                        • API String ID: 3313557100-4000620671
                                        • Opcode ID: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction ID: e4d47e0b5686e97df467ede8500031009effb0adf9f9dc6740059a4147c29e7c
                                        • Opcode Fuzzy Hash: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction Fuzzy Hash: 6B31F46AA08B81C2EB10DF12E4442AAB791FB45FE8F848631DEAD477D5DE7CD055C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: eb71e361cb7bb7c5c670ba90f5c307ba5558737232c48933c27f903f0aa1aeed
                                        • Instruction ID: 90d21f956f76b058ea94041b5e67f249e7ec1d9c4af3577fa748e5789f04a09b
                                        • Opcode Fuzzy Hash: eb71e361cb7bb7c5c670ba90f5c307ba5558737232c48933c27f903f0aa1aeed
                                        • Instruction Fuzzy Hash: 4241C76AB09782C8EB14EB2594181F9A762BF05FC8F884435CE4E57799DFBCE154C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfreememcpystrchr
                                        • String ID: CAPA$Got unexpected pop3-server response
                                        • API String ID: 2887963327-1591402739
                                        • Opcode ID: b1d3e936dd382e64101da7c55902cb61b4af86ecf09ec8689194697eb391ecd8
                                        • Instruction ID: 4947f66853520d01e960d2e901363f5e15d9e0e69d556008a498b40442d67712
                                        • Opcode Fuzzy Hash: b1d3e936dd382e64101da7c55902cb61b4af86ecf09ec8689194697eb391ecd8
                                        • Instruction Fuzzy Hash: 7C31E269B09382D2EB19AB21914C2B9A292BB05F94FC44135CA5E83B91CFBCF464C361
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%s%lx$Signature
                                        • API String ID: 2190258309-1406629954
                                        • Opcode ID: 3a8dd7c126c2bb8997d435d8e9448206225087e5cb925a77442ceabf54e7fb7f
                                        • Instruction ID: 7272e13db37f16a14ed68539a2673e700d54763016cd1300f5892fd0af6be0c6
                                        • Opcode Fuzzy Hash: 3a8dd7c126c2bb8997d435d8e9448206225087e5cb925a77442ceabf54e7fb7f
                                        • Instruction Fuzzy Hash: 2731A26AB08683C5EF60EB25A4082B9A3A6FF45F88F840431DE4D47766EE6DE010D720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: 8ff51399e34fb18bdfa4065b559064d0e27037ba38114c71594b9cf6c5c9ea19
                                        • Instruction ID: 1062563b92c11940630e45acdb77eb5dc22b50001053ca4447dcd18c2f31f224
                                        • Opcode Fuzzy Hash: 8ff51399e34fb18bdfa4065b559064d0e27037ba38114c71594b9cf6c5c9ea19
                                        • Instruction Fuzzy Hash: 7D31D459E09783C4EB10FB2594181F9A767AF05F88F844835CE4E1B7A6DEBCE120D320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupcallocfree
                                        • String ID:
                                        • API String ID: 1236595397-0
                                        • Opcode ID: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction ID: 0144526dfbc72020d3f531293d9c637f6ea127626644864565aeec83f556cd71
                                        • Opcode Fuzzy Hash: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction Fuzzy Hash: 9231E43AA08B85C2EB50DB14E0143BDA7A1EB85F89F984030CE4C07BA5DF7DD4559720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: e8f8e1119d8f664448a53c165c6e65c980d9a364779f0fe52f2c216c99377cce
                                        • Instruction ID: 0d5d7bf237b5435fb726a503ed6f24faa3e79c227fa2a9821f1c734c52846136
                                        • Opcode Fuzzy Hash: e8f8e1119d8f664448a53c165c6e65c980d9a364779f0fe52f2c216c99377cce
                                        • Instruction Fuzzy Hash: D631A269E09792C4EB10EB2594181F9A766AF05F88F844835CE4E1B7AADFBCE110D320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: 5ec3e6fecba39bd3d991c3c6fb9a38e0fd5dbbeef94bd947f9992e81f5bad80f
                                        • Instruction ID: fe0a5afc9fac7e36bf553081ac5a7d3cea01e5f66b3ca8c4be89532805732126
                                        • Opcode Fuzzy Hash: 5ec3e6fecba39bd3d991c3c6fb9a38e0fd5dbbeef94bd947f9992e81f5bad80f
                                        • Instruction Fuzzy Hash: 3331A269A09782C4EB10EB2594181F9A766AF05F88F844835CE4E1B7AADFBCE110D320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: OS/400$SITE NAMEFMT 1
                                        • API String ID: 3061335427-2049154998
                                        • Opcode ID: 238c0afdacb31243b85ac3d1db810fa013d497470da026d92261a530de5efd79
                                        • Instruction ID: b08a5a84152e4f02ca8d798414cc2650e48cef29ea878d8c13c70e13ab8dc6ea
                                        • Opcode Fuzzy Hash: 238c0afdacb31243b85ac3d1db810fa013d497470da026d92261a530de5efd79
                                        • Instruction Fuzzy Hash: 2031C829A0D6C2C5F771AB19A4583B8A362BB45F48F808031CE8D57B95DEBCE556C730
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: 5f3c904f0ae646e7217e9643221857d26f1b1b0a293a541f282175a39cabd730
                                        • Instruction ID: 714e8f02d398d8131b346950033d45c36129a4f45941adff07cb36d0edf21377
                                        • Opcode Fuzzy Hash: 5f3c904f0ae646e7217e9643221857d26f1b1b0a293a541f282175a39cabd730
                                        • Instruction Fuzzy Hash: AC213B3A608A41C6E720BF12E598269B371FB89F90F448135DF8E43B54DFB8E4A5C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupstrchr
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 3727083984-2292467869
                                        • Opcode ID: b530ae3702e63b533a3cc1d87ef15f17ee6ffbd0bf7a021ba09bb2a037e9e83c
                                        • Instruction ID: 7ebf63a85dd54568bcebb560b362f94eea8054b8525f17fecee6cc7671bc46fa
                                        • Opcode Fuzzy Hash: b530ae3702e63b533a3cc1d87ef15f17ee6ffbd0bf7a021ba09bb2a037e9e83c
                                        • Instruction Fuzzy Hash: BE61786A90D782C5FF71AB259449379E7E6EF44F68F884036DE8D02691DFACE444C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                        • API String ID: 1865132094-1204028548
                                        • Opcode ID: 3556a0fb8aa02de51f5cb2de88cd450d83914b4afc376172baa3edfbfdd0a290
                                        • Instruction ID: c091c8f508ac30ae35f4d58634b9eb99a00ac9c16c0eb0f84911861ae88aadd5
                                        • Opcode Fuzzy Hash: 3556a0fb8aa02de51f5cb2de88cd450d83914b4afc376172baa3edfbfdd0a290
                                        • Instruction Fuzzy Hash: 9A51A739A086C3C2F7A4AA3495483BDA792EB51F88F8804B9DA4D47695CF6CEC508330
                                        APIs
                                          • Part of subcall function 00007FF761664320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                          • Part of subcall function 00007FF761663C40: memcpy.VCRUNTIME140 ref: 00007FF761663C93
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616626F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761662740
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF761662790
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7616627DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: out_of_range
                                        • API String ID: 2484256320-3053435996
                                        • Opcode ID: 76b5d1f39a06f829aa9331822407c70e4fe0090e782a3815653c09b6c0711f4b
                                        • Instruction ID: 2aaab39ebf858762b78bfb0dc47e1bce900d1b091238adb3bb9378dd08c09b20
                                        • Opcode Fuzzy Hash: 76b5d1f39a06f829aa9331822407c70e4fe0090e782a3815653c09b6c0711f4b
                                        • Instruction Fuzzy Hash: B8519E36A18B41D9EB00EF74D4583AC7376EB44B98F805235EA5C13AD9DFB8D1A5C350
                                        APIs
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664351
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF761664416
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF76166446A
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF761664471
                                          • Part of subcall function 00007FF7616BFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7616643FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF7616BFB32
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID: https://keyauth.win/api/1.2/
                                        • API String ID: 1155477157-3933380396
                                        • Opcode ID: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction ID: dafcbeeebb1b5c746c8d19ce6b52ac03e33b24d6b2424bde34d652e5d3c7d4a0
                                        • Opcode Fuzzy Hash: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction Fuzzy Hash: A931F766B0A69584EF18FB1695282789262DF40FE4F840630CE2D27BD5DEFCE492C391
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: tolower$_time64
                                        • String ID: :%u$Hostname in DNS cache was stale, zapped
                                        • API String ID: 4068448496-2924501231
                                        • Opcode ID: 521fe6832f3cf790d4b15facc39401459d45f648660c420e41be536990509afb
                                        • Instruction ID: 8c0f04bcb82d109fda406a32580d139d81b3e620c6c821f765b4a366a27bbc88
                                        • Opcode Fuzzy Hash: 521fe6832f3cf790d4b15facc39401459d45f648660c420e41be536990509afb
                                        • Instruction Fuzzy Hash: B841C966A186D2D5EB90EB11E4487B9A762FB84F98FC44232DE4D07B95DF7CE005C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_close_openmalloc
                                        • String ID: Couldn't open file %s
                                        • API String ID: 3412525164-447283422
                                        • Opcode ID: 2aa78f5bc71d4c5fa95e3ddca835f94173a24e12e9090b31d0f437c2ad20b55b
                                        • Instruction ID: 4ad6ea248777a8e82e4620d5bfa80999d6322a7fee95dd49a05fc204b97a08a1
                                        • Opcode Fuzzy Hash: 2aa78f5bc71d4c5fa95e3ddca835f94173a24e12e9090b31d0f437c2ad20b55b
                                        • Instruction Fuzzy Hash: 1F41A166A08B81C1EB149F25E44827DE7A2FB45F94F888131DE9D47B98CFBDE441C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnofreememcpyrecv
                                        • String ID: Recv failure: %s
                                        • API String ID: 267823591-4276829032
                                        • Opcode ID: ca46f200b82e1adf06dd143e3a4dc972eed31ba8d415bfd83557f489aaddfe68
                                        • Instruction ID: ce1a5398ce7e4637ac8909fd92c899f8b3e9b0d3d65a2e5143e1f5302f024a1d
                                        • Opcode Fuzzy Hash: ca46f200b82e1adf06dd143e3a4dc972eed31ba8d415bfd83557f489aaddfe68
                                        • Instruction Fuzzy Hash: 7531F37AB05B81C1EB50AF15E8482B9A361BB48FD8F904035CE1D47784EEBCD465C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                        • API String ID: 1865132094-195851662
                                        • Opcode ID: f16b21b77d4c81fbba74814a81fdec6d0cbefe19cea108c1aebaaf06ca801d6d
                                        • Instruction ID: 320bcd11f153e13a62e2eae5f248c78cf3864725269677f3e371d19715a793e1
                                        • Opcode Fuzzy Hash: f16b21b77d4c81fbba74814a81fdec6d0cbefe19cea108c1aebaaf06ca801d6d
                                        • Instruction Fuzzy Hash: 87418335B086C2C1E7959B25E4583ADA7A2EB84F88F888031DB5D47B95CFBCD4A1C730
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                        • API String ID: 1812939018-579818044
                                        • Opcode ID: 60c15f7d09dcad11e8e90f63e8166c11e01d1a905cc88d36ae392e94e60358de
                                        • Instruction ID: e00f5d7156d2b7094ccf8ce49c97e40f9fac3bd97ddb348f522d10f71b1dcacd
                                        • Opcode Fuzzy Hash: 60c15f7d09dcad11e8e90f63e8166c11e01d1a905cc88d36ae392e94e60358de
                                        • Instruction Fuzzy Hash: AE31C86AA1CB81C1EB01EB25E4442B9E7A2FB85F94F889231DA5D037D1DFBCD541C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %s: %s$FALSE$TRUE
                                        • API String ID: 1865132094-3430445539
                                        • Opcode ID: a0668f6f08a5207906d9e598c81a2e904b764e4c26932b466be4701ecc668148
                                        • Instruction ID: 5a80fa08d9a3c53180accdb2f12a2b73082d2cbdbce491d896048654e6ede4d3
                                        • Opcode Fuzzy Hash: a0668f6f08a5207906d9e598c81a2e904b764e4c26932b466be4701ecc668148
                                        • Instruction Fuzzy Hash: 270161AAA08782C5EF61EB55A8483B9A3A2BB55F88FC84435CE4D03351DFBCE155C320
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
                                        • API String ID: 0-3012371547
                                        • Opcode ID: 04fcf8145cb42020e372e5070ed4d572ae59c7f9f0e4049c882d18e675978fe1
                                        • Instruction ID: e2b916f28e7c75493b9cda911d1249b8524ccc6f12bc3693beb8234f698deb1c
                                        • Opcode Fuzzy Hash: 04fcf8145cb42020e372e5070ed4d572ae59c7f9f0e4049c882d18e675978fe1
                                        • Instruction Fuzzy Hash: FE61F277A0C382C7E744AB24D4493ADBB92EB91F98F848575DA4943785DF7CE841CB20
                                        APIs
                                          • Part of subcall function 00007FF761663D80: memcpy.VCRUNTIME140(?,?,?,00007FF761670BDD,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF761661744), ref: 00007FF761663E32
                                          • Part of subcall function 00007FF761663D80: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF761663E57
                                          • Part of subcall function 00007FF761663D80: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF761670BDD,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF761661744), ref: 00007FF761663E14
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761670DF0
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761670DF7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761670DFE
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761670E05
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF761670E0C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                        • String ID:
                                        • API String ID: 2318677668-0
                                        • Opcode ID: 9ee18b699d0ee2b22d0ea26408a5de4c3e2fe866b50876750de1e766a30f708b
                                        • Instruction ID: d3908e1f05d1c2ef0354e7010292daa81178db6667d478ef4b9477b30f5c75d3
                                        • Opcode Fuzzy Hash: 9ee18b699d0ee2b22d0ea26408a5de4c3e2fe866b50876750de1e766a30f708b
                                        • Instruction Fuzzy Hash: 4F61B066A05BC1D5EB20EB25E49C3ADB362EB56F84F804035DA4D07A5ADFBDE4D0C350
                                        APIs
                                          • Part of subcall function 00007FF7616B4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B1635), ref: 00007FF7616B4BC6
                                          • Part of subcall function 00007FF7616B4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B1635), ref: 00007FF7616B4BE7
                                          • Part of subcall function 00007FF7616B4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B1635), ref: 00007FF7616B4C02
                                          • Part of subcall function 00007FF7616B4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B1635), ref: 00007FF7616B4C10
                                          • Part of subcall function 00007FF7616B4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B1635), ref: 00007FF7616B4C22
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616B4CC6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: HTTP$NTLM
                                        • API String ID: 2190258309-4188377180
                                        • Opcode ID: f397fb2bcd6a45f514f182ea186c6a4e740437deccb595368f6b02b9be4744d2
                                        • Instruction ID: 923f7dc2132d29d68a666d260812adef5f5e712289fce492aec617d01e861001
                                        • Opcode Fuzzy Hash: f397fb2bcd6a45f514f182ea186c6a4e740437deccb595368f6b02b9be4744d2
                                        • Instruction Fuzzy Hash: C9615C3A608B81C2EB60DF15E45466AB3A6FB88F84F944035DE8D43B58DFBCD465CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                        • API String ID: 1294909896-1891748601
                                        • Opcode ID: 8e02b3b28b6694a18e40372e38f7d30d839d7ad488d6fb036aa5d779c68fab34
                                        • Instruction ID: 3cfab2372e9e87e968aa3169f13a835fa2fb5488e4a799916e9889b5238cafbe
                                        • Opcode Fuzzy Hash: 8e02b3b28b6694a18e40372e38f7d30d839d7ad488d6fb036aa5d779c68fab34
                                        • Instruction Fuzzy Hash: D951D86994D682C2EB64F73190183B9E252FB41B64FC44239CAAD07AC2DFBCE4858361
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3401966785-3412697401
                                        • Opcode ID: 80d142b2cfaed612c7625e82799aa2ed6ff54757b648a70adbdf1b712a748d0f
                                        • Instruction ID: ebc3967b93fb2f5eae3e6a15331032afc2c5fe6d32fefd2a3f99c1d4e016c2e9
                                        • Opcode Fuzzy Hash: 80d142b2cfaed612c7625e82799aa2ed6ff54757b648a70adbdf1b712a748d0f
                                        • Instruction Fuzzy Hash: DC415AADF1D65285FB05DA16851C374A7A3EB51FE4F844632CA6E433D5DDACD091C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: %s: %s
                                        • API String ID: 3401966785-1451338302
                                        • Opcode ID: d327bfcba7da6c9850592b24ce4796f2f4af7d1b57654c47056b74fb5bfbcf62
                                        • Instruction ID: cbae3d297881fc2b97d2191d1fbb1bafbd21ecfa5eda2e1e5aaf03431b77809b
                                        • Opcode Fuzzy Hash: d327bfcba7da6c9850592b24ce4796f2f4af7d1b57654c47056b74fb5bfbcf62
                                        • Instruction Fuzzy Hash: 1A417D95A092D2C6EF68EA06511C3B99793EB61FE4F444239CE6F077C5DE6CD055C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                        • API String ID: 1294909896-619256714
                                        • Opcode ID: 50459ee11d2f4459c53cb9f1ba6f40b876d28e43561577c7a73ff8fdf612430e
                                        • Instruction ID: 0f2eea20c4b73277ec08396b2e84a5f1c5dc8add84616bcae5b1494162ec706a
                                        • Opcode Fuzzy Hash: 50459ee11d2f4459c53cb9f1ba6f40b876d28e43561577c7a73ff8fdf612430e
                                        • Instruction Fuzzy Hash: 6D51B369A0C6D2C4EB20EF24950C1B9FBA6FB11F84FC48475CA8D46A95DFBCE561C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                        • API String ID: 1294909896-2752585153
                                        • Opcode ID: 52833163c9a05776fcc5bc514b77627af3a48e59c6dfb4def29ef17bc0a2b5c0
                                        • Instruction ID: 03df3efc4466a6f350cbc9871b39050b85a38e2854c96bc4c94429a0bbc2f6ef
                                        • Opcode Fuzzy Hash: 52833163c9a05776fcc5bc514b77627af3a48e59c6dfb4def29ef17bc0a2b5c0
                                        • Instruction Fuzzy Hash: 65319E69A0CA82C4EB50EF64A4081B9E793FB15F88FC84032DA4D1B295DFBCE655C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: a198ade456d71fd290c192ef9094b732cc5983dbf1400fe6e936b787195600f5
                                        • Instruction ID: cd835b2bdfd914defe9e4c76231c676fda4a9c3a085f517e06400b15eb86b220
                                        • Opcode Fuzzy Hash: a198ade456d71fd290c192ef9094b732cc5983dbf1400fe6e936b787195600f5
                                        • Instruction Fuzzy Hash: 6721B12AB08AC2C6EB50DB15E4082A9A3A6FB44FD8F884532DE5D53795DF7CD101C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Failure sending QUIT command: %s$QUIT
                                        • API String ID: 1294909896-1162443993
                                        • Opcode ID: 4ca42619a1e31173df9d1b850f7224c4b4225d9bed481e7d5c2d2b67698de71c
                                        • Instruction ID: 2dec8d0b7685dcaf71940b90b3f99f56c65865f202106aa95b8cdf817394b980
                                        • Opcode Fuzzy Hash: 4ca42619a1e31173df9d1b850f7224c4b4225d9bed481e7d5c2d2b67698de71c
                                        • Instruction Fuzzy Hash: B2317E39A48782C1EB90EF3394583B9A3A6FB45F88F884039DA9D47A55DFACD051C370
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$memcpy
                                        • String ID:
                                        • API String ID: 3478730034-0
                                        • Opcode ID: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction ID: b44808132e858675f4e7342a2cc448b61db9dbebce5e9b5c89388b1c355b6625
                                        • Opcode Fuzzy Hash: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction Fuzzy Hash: DD21B579E08782C6E7209F11A42422AB7A2FB49F98F844534DA9E57794DF7CD450C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupmalloc
                                        • String ID:
                                        • API String ID: 4236146995-0
                                        • Opcode ID: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction ID: 2ed1376a74248592bd0c7f8945d47530e5955ef1ff77d8778d4871331e00fbd2
                                        • Opcode Fuzzy Hash: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction Fuzzy Hash: C921516AB16BC581EB85DB21E0583A863E2EB89F58F480134DE4D4BB54EF7DE491C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3056473165-2389359183
                                        • Opcode ID: 242ad1759060be2da588470a9a518229d6bc086f1797fcb437397f4febbd150b
                                        • Instruction ID: 1fb58551d1a7f89ca2168d071d684cbbe71c49fbc9605940b4bbca882d697bc5
                                        • Opcode Fuzzy Hash: 242ad1759060be2da588470a9a518229d6bc086f1797fcb437397f4febbd150b
                                        • Instruction Fuzzy Hash: 5421F16DA08283C5EF25EB15951C2B4A693AF15FD8F884531CD0E076E5EFBCA515C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 5365f1df1ed3cea1c2c7de787eb6e300e9b64ce9320d70a5ed4b329ba6b3b17f
                                        • Instruction ID: 67934505d19017f7d5fefc8b9a9be9535b14d1fc302cb2fe2c28797b63ce6caf
                                        • Opcode Fuzzy Hash: 5365f1df1ed3cea1c2c7de787eb6e300e9b64ce9320d70a5ed4b329ba6b3b17f
                                        • Instruction Fuzzy Hash: 2221626AA08A83C6EB50EB15E4582FAA366FF45F88F840432DE4D57766DF7CD051C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: 41b76b45187b604ba47561f7a3e753a50d17ac0b22649e8f1a55bbcb22655a30
                                        • Instruction ID: 4664e35c2284c3ff25eed3378d7f56c9682fc184af087d72f998d9c319f47b66
                                        • Opcode Fuzzy Hash: 41b76b45187b604ba47561f7a3e753a50d17ac0b22649e8f1a55bbcb22655a30
                                        • Instruction Fuzzy Hash: 9F21656AA08A83C6EB50EB15E4582EAA366FF85FC8F840432DE4D57725DF7CD151C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: db904f56e6270d6705b2c490b5aa27aa7852b63d4b065eb65d90f7fbd933b535
                                        • Instruction ID: b189b13edabd32889a8dc0b142af9c9a74fa75dc3f06e81de22854aed3cdc9a6
                                        • Opcode Fuzzy Hash: db904f56e6270d6705b2c490b5aa27aa7852b63d4b065eb65d90f7fbd933b535
                                        • Instruction Fuzzy Hash: FA21836AA08A82C6EB50EB15E4582EAA366FF85F88F840432DE4D57725DF7CD011C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction ID: 8d8973eca6cc60e8db3e78bacb7652b8ecfefc64494ee78f2876d92fbe14a658
                                        • Opcode Fuzzy Hash: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction Fuzzy Hash: AF11FE3A604A41C6E710AF12E558229B371FB89F91F548135DF8D43B54CF79E4A5C710
                                        APIs
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF761672E89), ref: 00007FF7616737EF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncpy
                                        • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                        • API String ID: 3301158039-3625861382
                                        • Opcode ID: 6380039508780b6add5a13c08d96a73198b9f942589f9f0a8f4d674408762aa1
                                        • Instruction ID: 42bed75b84aa040eebb46a276c569c81f69c4e791cb2d091e51bdf3cf70aabd6
                                        • Opcode Fuzzy Hash: 6380039508780b6add5a13c08d96a73198b9f942589f9f0a8f4d674408762aa1
                                        • Instruction Fuzzy Hash: E11106A9E1C343D0EB18EB18E55C2B8D7A2EF09F80FC85031C60E06684DEECE480C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: FALSE$TRUE
                                        • API String ID: 1865132094-1412513891
                                        • Opcode ID: d19699eb54f18728884f9ffff41851f69321f2634b7708db4c0551ad8526aaa1
                                        • Instruction ID: 1d17d450f0fb6578f15c3d9f23bd172c193522526b46cd73ef3fa1b81102d655
                                        • Opcode Fuzzy Hash: d19699eb54f18728884f9ffff41851f69321f2634b7708db4c0551ad8526aaa1
                                        • Instruction Fuzzy Hash: 7741F4AAB0D356C4FF15EA659018378A7E3AB15F98FC84536CE4E063C5DFAEE0518320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64$ErrorLast
                                        • String ID: TFTP response timeout
                                        • API String ID: 3339832089-3820788777
                                        • Opcode ID: 0ab3da824d1dea4b067a677ac3a599116cb6b186ab2029eaec530af2e695dd18
                                        • Instruction ID: 9fdc383ed08f96114e892ea16facef12c6f70cef58f008251e71eac19082351e
                                        • Opcode Fuzzy Hash: 0ab3da824d1dea4b067a677ac3a599116cb6b186ab2029eaec530af2e695dd18
                                        • Instruction Fuzzy Hash: F641F63A619A41C1EB60AF35D4082B9B792EB85FA4F804231DE2E47BC5DFBCD401C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fwrite
                                        • String ID: ...$...
                                        • API String ID: 3559309478-2253869979
                                        • Opcode ID: 0c08b42f7022a8eadbaf655e4f3f22b107ec018da9aba7661bea463086124471
                                        • Instruction ID: dd754656304b99b499318684519b49877a72c759c0c91a2014d462e0b23366e5
                                        • Opcode Fuzzy Hash: 0c08b42f7022a8eadbaf655e4f3f22b107ec018da9aba7661bea463086124471
                                        • Instruction Fuzzy Hash: 4831A625A19AC1C1EB64EB21E4487F9A3A2FB84F54F808131CA5E03794CFBDD155C7A0
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF761694479), ref: 00007FF761694ACD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: realloc
                                        • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                        • API String ID: 471065373-1365219457
                                        • Opcode ID: 28b0121e55b498e294cbccc24d51bb5541ef030638a624a5ee614dbf6a3813a8
                                        • Instruction ID: ede87693f4d5a9a8958224f567f9131296950444f87248b2e3ac834f5c6057cc
                                        • Opcode Fuzzy Hash: 28b0121e55b498e294cbccc24d51bb5541ef030638a624a5ee614dbf6a3813a8
                                        • Instruction Fuzzy Hash: 9A217E36B18A85C6DB04AB1AE5842ADA362FB49FC8F444031EF5D43B59CF7CD5A1C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: :
                                        • API String ID: 2653869212-336475711
                                        • Opcode ID: 52448389aad6167ad041a96b6c2331e0cd9db80a6cc4f9b00badf8efbd453cef
                                        • Instruction ID: ff6d3784e9aa1d0240ea1dfba7086cf6f0ec61bd0bf0fc12433bfe88848b4458
                                        • Opcode Fuzzy Hash: 52448389aad6167ad041a96b6c2331e0cd9db80a6cc4f9b00badf8efbd453cef
                                        • Instruction Fuzzy Hash: C1218E2AA09B85C5EB61AF15E5083B9B3A1BB44B94F988231CB9D43794EF7CD410C720
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s$LIST "%s" *
                                        • API String ID: 0-1744359683
                                        • Opcode ID: 01fd01fb85fd1cdc814dc4af1efcb68caa986b23848b21fa259ade442a81e157
                                        • Instruction ID: 348d370541e50cb21477d505202fc28fbd9fa03e3aeee7bfd313945911936729
                                        • Opcode Fuzzy Hash: 01fd01fb85fd1cdc814dc4af1efcb68caa986b23848b21fa259ade442a81e157
                                        • Instruction Fuzzy Hash: C911A22AF08642C2EB14EB56E5481B8A362FB48FC4F844875DE0E07315DF7CE941C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3985033223-2389359183
                                        • Opcode ID: f4815eb0cca36db6935b362272cb02cb240f91003449dbf941b94fd9afdc2f62
                                        • Instruction ID: 0d17b475c4a0895158e5e2c53da84ccef61d02f3967e865fc1caf4cccf8dcd69
                                        • Opcode Fuzzy Hash: f4815eb0cca36db6935b362272cb02cb240f91003449dbf941b94fd9afdc2f62
                                        • Instruction Fuzzy Hash: B101B159A0C283C5EB10EB14A41C2B9A7A7AF15F88FC84831CA0A4B1A6DFBCA515C331
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$mallocmemcpy
                                        • String ID:
                                        • API String ID: 320687583-0
                                        • Opcode ID: e2d21262de4b7909a237c534343391991a6930e2b65d8f6e0f77b0b64d484383
                                        • Instruction ID: 984cd486de12d945879d2924edbb662d966ce09335e1c5158ff391f1e2100060
                                        • Opcode Fuzzy Hash: e2d21262de4b7909a237c534343391991a6930e2b65d8f6e0f77b0b64d484383
                                        • Instruction Fuzzy Hash: 3521F816A0D69282EFA5AB2251142B9E7D39F44FC4F8C4479DE8D477C6DF6CD806C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 1294909896-910067264
                                        • Opcode ID: db9eeee5f1351480a12aa5f2da278e349761a42a46aad56eca97a60ea7c9fc7e
                                        • Instruction ID: 017033559af9b83797e99e89e1408c0cf737474ac69fa31732d22cdc47b61ac6
                                        • Opcode Fuzzy Hash: db9eeee5f1351480a12aa5f2da278e349761a42a46aad56eca97a60ea7c9fc7e
                                        • Instruction Fuzzy Hash: C451C26AA1C696C4EB11DF24A50C2B9EBA7EB11F84FC44032DA4D42B64DFBCE565C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                        • API String ID: 1294909896-2632828617
                                        • Opcode ID: beebfd99418d3e134666a3b667360a78397b1afae66b590f3b48bc445c02abfd
                                        • Instruction ID: 10b9e54d572596765609ee548da413557eb8a09b2a1ddc3a1f1ee270f1ae1414
                                        • Opcode Fuzzy Hash: beebfd99418d3e134666a3b667360a78397b1afae66b590f3b48bc445c02abfd
                                        • Instruction Fuzzy Hash: 9B41C2AAA0C692C5EB60DB15A5082B9F792EB61F94FC58431CE8D43755CFBCE056C720
                                        APIs
                                        • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76166D1A8), ref: 00007FF76166D66E
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76166D1A8), ref: 00007FF76166D69C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76166D1A8), ref: 00007FF76166D705
                                          • Part of subcall function 00007FF7616BFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7616643FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF761661B59), ref: 00007FF7616BFB32
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF76166D712
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                        • String ID:
                                        • API String ID: 2942768764-0
                                        • Opcode ID: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction ID: 7f22cdbca9b20a3d23d9c688c8995cfe6aa6b4a0e63903d0ac623fcabf637782
                                        • Opcode Fuzzy Hash: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction Fuzzy Hash: A741FF7A705A81C5EB14EF25D00827CA362BB44FA0FA48631CAAD537C4DFACE490C3A1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction ID: f088456ffa952b71f7f4b4adea5a72d6712bfd94257685c6eb37df2e27b9a6c5
                                        • Opcode Fuzzy Hash: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction Fuzzy Hash: B631F725B19B41C1DB20EB12A44827EE2A2BB05FD0F944235DE6D877C1DF7CE091C3A0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF76169D2EB), ref: 00007FF7616BB19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: 9458df8b602da903cdb5424232a6394ac26afb359fa881c3766516657283d285
                                        • Instruction ID: afc5e0b90dda49b92cb5d31d53775f901458389425f0759ac07fada9b6c0f65b
                                        • Opcode Fuzzy Hash: 9458df8b602da903cdb5424232a6394ac26afb359fa881c3766516657283d285
                                        • Instruction Fuzzy Hash: EA417E36A18B85C2EB50EB16B4441AAB3A1FB85FA4F544535DF9E03BA1DF78E4A1C310
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF76169EB30,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF7616BB5D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616BB65C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: d2a8b9a4341a91b2540e73c8fc20f79953a9bdad88463489212d982f9f51326b
                                        • Instruction ID: 70fedc5557887c8a48fadf6a7a2993b5f44896f01468d7545d17c82b58ed77c0
                                        • Opcode Fuzzy Hash: d2a8b9a4341a91b2540e73c8fc20f79953a9bdad88463489212d982f9f51326b
                                        • Instruction Fuzzy Hash: BD418136A08B85C2EB50EB26B4441AAB3A1FB85F94F444534DF8E43BA1EF7CE491C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: ff507d46c410e9d9cdcf4b9eb39d48e974748f0d30041aa2655652cf5154f83c
                                        • Instruction ID: b3d683a1b0950cc35536e5d0dcd4224d85351ab6a8bf9d20c8d67e5699b384d9
                                        • Opcode Fuzzy Hash: ff507d46c410e9d9cdcf4b9eb39d48e974748f0d30041aa2655652cf5154f83c
                                        • Instruction Fuzzy Hash: F631106AB09781D5EB10AF22A50826DE292AB05FD4F980235DE5D477C6CFBEE091C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                        • API String ID: 1294909896-918878739
                                        • Opcode ID: 7f4687f8412e3f34b693d9f25119206f39845ea297186b2d0ffc6b4486a475f8
                                        • Instruction ID: 26ab9e5118059c8aba06f730b9be78c358dd9c1df12d7b5513d30db7ce2a428d
                                        • Opcode Fuzzy Hash: 7f4687f8412e3f34b693d9f25119206f39845ea297186b2d0ffc6b4486a475f8
                                        • Instruction Fuzzy Hash: 4531A06AA0DA85D8EB11DF65D5082B9A763FB54F94FC44432CA4E03695DFBCE161C320
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7616A6B14
                                          • Part of subcall function 00007FF761686400: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF761686525
                                          • Part of subcall function 00007FF761686400: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF761686540
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fwrite$free
                                        • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                        • API String ID: 3468156532-1133524294
                                        • Opcode ID: 107df9816e9e57e54c596b5414249ee813eff7631e7fd5186d7bed0e4551ce14
                                        • Instruction ID: 28c92a605e50adc627f00b1ff1b8ecde9a908919c100116e7a5bf97bb6a8bf96
                                        • Opcode Fuzzy Hash: 107df9816e9e57e54c596b5414249ee813eff7631e7fd5186d7bed0e4551ce14
                                        • Instruction Fuzzy Hash: 8F41327AA08A82C5E760EF29D4581ADA362FB44F84F854036DF4E4B795DFBDD441C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 1294909896-1153420294
                                        • Opcode ID: f83450b56afee37c46f647a23c326d31c9929905e360993e1279dba9b38c8cf3
                                        • Instruction ID: b977c467272699cb0e91e86afcf9d4610cff47aada7b6ecd80877eb0555ef652
                                        • Opcode Fuzzy Hash: f83450b56afee37c46f647a23c326d31c9929905e360993e1279dba9b38c8cf3
                                        • Instruction Fuzzy Hash: 013190AAA08B81C5EB60EF61A4486B9A3A2EB65F88FD54032CF4D07255CFBCD555C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3056473165-3412697401
                                        • Opcode ID: 832afbf59ecc20a4234f36153a96e11bc8f9fb7faa3d461da38802b0e2ff7b07
                                        • Instruction ID: 2d830673c24d837e3ac36c6464266fd6dcc84ca528d3fcf343df6e0c4ad1540d
                                        • Opcode Fuzzy Hash: 832afbf59ecc20a4234f36153a96e11bc8f9fb7faa3d461da38802b0e2ff7b07
                                        • Instruction Fuzzy Hash: 8721A4AEB0D64684EF05DA169518374A763AB55FE4F844532CD1E077D4EEBDD091C320
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761680BA2
                                        • memcpy.VCRUNTIME140 ref: 00007FF761680BDD
                                          • Part of subcall function 00007FF761675F30: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761675F45
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF761680C12
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676067
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676073
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: %s:
                                        • API String ID: 901724546-64597662
                                        • Opcode ID: 1a3d84051bc9983276391cc2067a49442cdfa67c9e2bedaa0b5562f7457c09d7
                                        • Instruction ID: 0e452b5cd84c6d2e8e4e1879fb9a700b2db2f28284cc23ea1a3f5e320728d4ad
                                        • Opcode Fuzzy Hash: 1a3d84051bc9983276391cc2067a49442cdfa67c9e2bedaa0b5562f7457c09d7
                                        • Instruction Fuzzy Hash: 8D21F62AA09B85C1DB00EF12E9581AAB365FB94FE8F840532EE5D47795DF7CD441C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: %s: %s
                                        • API String ID: 3056473165-1451338302
                                        • Opcode ID: f5d230d09bddb11f4c2be80aeeb1f72dbe8f6298f509e8bbdd2ac7d4761eaa65
                                        • Instruction ID: a32f4b2872720774433c20df0daab24c4214b74fdf2ec651b026f37e40ca23f9
                                        • Opcode Fuzzy Hash: f5d230d09bddb11f4c2be80aeeb1f72dbe8f6298f509e8bbdd2ac7d4761eaa65
                                        • Instruction Fuzzy Hash: 0921C299A09782C1EF61EA02A5083B69352BB94FE8F884132CE5D03B95DF7CE455C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Start Date: %s$%s%lx$Start Date
                                        • API String ID: 1294909896-3519493645
                                        • Opcode ID: 8ba2f3c3a053e956985141babda8935762c040b5fe9b0ce8652dc4cd589aa744
                                        • Instruction ID: e7f0b1d774276a5af068cdaccad679a942c5d49111af6635411fe3636f71004b
                                        • Opcode Fuzzy Hash: 8ba2f3c3a053e956985141babda8935762c040b5fe9b0ce8652dc4cd589aa744
                                        • Instruction Fuzzy Hash: 4921F859A0C282C5EF10FB25941C2F9A793AF15F88FC49831CA0E5B696DFADA514C330
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616B47A9,00000000,?,?,00007FF7616B3D66), ref: 00007FF7616B3A69
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616B47A9,00000000,?,?,00007FF7616B3D66), ref: 00007FF7616B3AA0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7616B47A9,00000000,?,?,00007FF7616B3D66), ref: 00007FF7616B3AB2
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7616B47A9,00000000,?,?,00007FF7616B3D66), ref: 00007FF7616B3ADA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpyrealloc
                                        • String ID:
                                        • API String ID: 3881842442-0
                                        • Opcode ID: 201d7c26a47bb9774e8661d9b7b0fff41fc2ec85823bd8ab3e7185ccf4486254
                                        • Instruction ID: 5549183b095a1ca799cf9c6bde568b75ae73aa0e09267b6fb3ca467bf3265e51
                                        • Opcode Fuzzy Hash: 201d7c26a47bb9774e8661d9b7b0fff41fc2ec85823bd8ab3e7185ccf4486254
                                        • Instruction Fuzzy Hash: D2216D6AB09B81C2DB44CF16F054229B3A1FB48FC8B888435DE5E43758DF78C4A1C710
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF761680DC9,?,?,?,?,00007FF76168016B), ref: 00007FF76169C878
                                        • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF761680DC9,?,?,?,?,00007FF76168016B), ref: 00007FF76169C89E
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF761680DC9,?,?,?,?,00007FF76168016B), ref: 00007FF76169C8BF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF761680DC9,?,?,?,?,00007FF76168016B), ref: 00007FF76169C8D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: realloc$EnvironmentVariablefree
                                        • String ID:
                                        • API String ID: 2828309815-0
                                        • Opcode ID: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction ID: 661a586291145f5083057487ed410f7cc33861a3c36025aa82d21f1d157cc4fa
                                        • Opcode Fuzzy Hash: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction Fuzzy Hash: C311E725F09743C7EB20AB12664823AE692FB49FD0F850435DE4E57B44DEBCD8418750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$freemalloc
                                        • String ID:
                                        • API String ID: 2605342592-0
                                        • Opcode ID: 03c04eedff98bd114c8db373987edfe353b16d9b561a06dbe701af264d9b3090
                                        • Instruction ID: e51b324f7734227bfe3fa2c08509f826293a2c04d029fbbd9f9c79f747ce28c6
                                        • Opcode Fuzzy Hash: 03c04eedff98bd114c8db373987edfe353b16d9b561a06dbe701af264d9b3090
                                        • Instruction Fuzzy Hash: C8115B39B0DB41C6E710AF62B808129B7A5FB88F84B884438DF8D47B14DFB8E561CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Proxy-Connection: Keep-Alive
                                        • API String ID: 1294909896-2835282938
                                        • Opcode ID: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction ID: ad8afe8f0f5bc24263de910e17050c3966afcfe477acdc64826af14024c7f53b
                                        • Opcode Fuzzy Hash: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction Fuzzy Hash: A0010466F05B42C2FB156B56B4543A9A261AF44FE0F448674CEA9073C0DFBC9891C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalDeleteSectionclosesocket
                                        • String ID:
                                        • API String ID: 3086658127-0
                                        • Opcode ID: af2388205e1df7f8a2eb9a4d6a6a74e23c5d38f564cdff0bf6df485ebc21babc
                                        • Instruction ID: 15a4931614009ed91dda30c00505a58c74dba84b57aa87baef3d141cc621a31c
                                        • Opcode Fuzzy Hash: af2388205e1df7f8a2eb9a4d6a6a74e23c5d38f564cdff0bf6df485ebc21babc
                                        • Instruction Fuzzy Hash: AA017517D18B82C3E714EF35C8681786321FFE9F1CB41A325DE6D411A59FA8A5E0C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: 1084f5eface751f809c7f2a4aad978dbdc4d4029a98d1f95eb81aebacb5737ad
                                        • Instruction ID: f1173a7560beb8157668ceb084111e8298783dbd714b4a7fd6d78a2a95a04013
                                        • Opcode Fuzzy Hash: 1084f5eface751f809c7f2a4aad978dbdc4d4029a98d1f95eb81aebacb5737ad
                                        • Instruction Fuzzy Hash: DCF08229B08543C1EF909B21D8A8675E7969F89F88F896135CD2E816D4CEACD200C731
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: 9ec57b4b14ab1520ae2fd61540b1c7808844ff866eeb48084511e072fc2270d1
                                        • Instruction ID: bd2f3938563b37b40c63026a00cad91a64a0cef4671db7ef566d4e6d284de7b8
                                        • Opcode Fuzzy Hash: 9ec57b4b14ab1520ae2fd61540b1c7808844ff866eeb48084511e072fc2270d1
                                        • Instruction Fuzzy Hash: 28F08229B0C543C1EF909B21D8A8675E7969F89F88F896135CD1E816D4CEACD200C731
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF761686E86), ref: 00007FF7616B1AE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno
                                        • String ID: %lx
                                        • API String ID: 2918714741-1448181948
                                        • Opcode ID: 52c6e097e963a6628f868ec6cac9492ecd733cabba3e5dc2fb46574cf4b56e25
                                        • Instruction ID: cb0881d4d956b0a548e5574b840601dcf7b81b13b4fc9b1e6738f5e654d887b8
                                        • Opcode Fuzzy Hash: 52c6e097e963a6628f868ec6cac9492ecd733cabba3e5dc2fb46574cf4b56e25
                                        • Instruction Fuzzy Hash: C0816D27A1C1D1C5E768DB24B45827DBBF2F785B90F544235EAAE422C0DEBCD451CB20
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF76169D1D3), ref: 00007FF76169D8C2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF76169D1D3), ref: 00007FF76169D913
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: (){ %*]
                                        • API String ID: 3515966317-731572209
                                        • Opcode ID: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction ID: df1f616371fba7379b97516f83fa7ae34176d535e478df47f74cbb4f05ac359d
                                        • Opcode Fuzzy Hash: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction Fuzzy Hash: 79314619D0C687C6FB216B156148378ABD39F56F58FC949B1D98E072C3CE6DAD05C220
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocrealloc
                                        • String ID:
                                        • API String ID: 948496778-3916222277
                                        • Opcode ID: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction ID: a721069b1a74aff3dfd8475c84e601c9c08d994d5cab34dfc416f8a7ce644e58
                                        • Opcode Fuzzy Hash: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction Fuzzy Hash: 66118176A09B81C1EB849F16E154269B3A1FB48FD8F844535DE5E07B88EF78D5E0C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: getsockoptsetsockopt
                                        • String ID: @
                                        • API String ID: 194641219-2726393805
                                        • Opcode ID: f6ec6453dcb4e67fffed1e8bcf1aefb452d83f39a6205ecab06ea16d42c783b9
                                        • Instruction ID: 877e4765ad38b02e6f44e8c0dececb073ba36b709b06afd6ec1e8cdfad537aef
                                        • Opcode Fuzzy Hash: f6ec6453dcb4e67fffed1e8bcf1aefb452d83f39a6205ecab06ea16d42c783b9
                                        • Instruction Fuzzy Hash: F9114279A08182C6FB60DF10E408676F7A2FB85B48F940034DA8946AA4DFFDD599CF20
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: TRUE
                                        • API String ID: 1865132094-3412697401
                                        • Opcode ID: 9f7382e18b3041a3e93490953c45f0e4b0f4161914aac1650cb6f1c2e67001f6
                                        • Instruction ID: 452431d5680f2d5f46041a3b6848ba389c7f091127ebcf0e4fd9aff1767fc423
                                        • Opcode Fuzzy Hash: 9f7382e18b3041a3e93490953c45f0e4b0f4161914aac1650cb6f1c2e67001f6
                                        • Instruction Fuzzy Hash: B1014CAEA0965584EB02DB25E518378A7A3AB15F98FC44832CE1E06394DEBCD092C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: %s: %s
                                        • API String ID: 3985033223-1451338302
                                        • Opcode ID: ce95b56a7c92656b16259ff00a4cfcc9f4106ba29798c8b37636380f06af6113
                                        • Instruction ID: 5dcc35d51944600897d07d9d5f4569a0421f6957c404a6e79b906807f9f04a85
                                        • Opcode Fuzzy Hash: ce95b56a7c92656b16259ff00a4cfcc9f4106ba29798c8b37636380f06af6113
                                        • Instruction Fuzzy Hash: B3F04459A0C781C1EB61AB12B8087F59352AB55F88FC84431CE5D07756DF7CE155C724
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7616B0CB8), ref: 00007FF7616BDBB1
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7616B0CB8), ref: 00007FF7616BDBC4
                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7616B0CB8), ref: 00007FF7616BDBEB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7616B0CB8), ref: 00007FF7616BDBF8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$freemalloc
                                        • String ID:
                                        • API String ID: 2605342592-0
                                        • Opcode ID: 5abc08f8efcdf07fb6a3fff450b6aa11847ea7856984884628bec1e59b2a9258
                                        • Instruction ID: ff03f5d54dcbb4a753ead5e42e3d9b7e8121caaca59d67112ad6ca1c51e9851a
                                        • Opcode Fuzzy Hash: 5abc08f8efcdf07fb6a3fff450b6aa11847ea7856984884628bec1e59b2a9258
                                        • Instruction Fuzzy Hash: E9115129B08752C2E760DB2AF41402AA6A5BF88F98F484535DF4C47B58DF7CD5908710
                                        APIs
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676067
                                          • Part of subcall function 00007FF761676040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761680640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF761672471), ref: 00007FF761676073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C546
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C556
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76167C564
                                        • memset.VCRUNTIME140 ref: 00007FF76167C59F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID:
                                        • API String ID: 2717317152-0
                                        • Opcode ID: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction ID: b92cc7662f8707aba5b8bf670a7865bce459efbe337537b967f6378287368292
                                        • Opcode Fuzzy Hash: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction Fuzzy Hash: 2C211D36E18B91D3E314DB22E6543A8A360F799B44F519225EB9D43A11DFB4F1F1C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction ID: d98c1bdca321c24b2afeafaa3a879a450d56b8f58e385f0ea4ed14f9497c47a5
                                        • Opcode Fuzzy Hash: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction Fuzzy Hash: C611EC2AA08A45C1EB54EF25E5A423CA3A6FF94F88F948435CA5E42764CE7CD861C350
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction ID: 4d1bfc4f61d089edfc42c472484853bd3ceff13b1df6bc23653a96b6694ed643
                                        • Opcode Fuzzy Hash: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction Fuzzy Hash: E211283AA04B40C6D750DF25E584368B3A5F784F48F484039DE8E57728CF38E8A5C360
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B124E), ref: 00007FF7616B5176
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B124E), ref: 00007FF7616B5197
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B124E), ref: 00007FF7616B51B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7616B124E), ref: 00007FF7616B51C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction ID: ff454cae1b777ed7da0cd77540328cb54499e6106c7eccf627bbee27ae14adb5
                                        • Opcode Fuzzy Hash: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction Fuzzy Hash: 1911A53AA04B45C2EB14EF26E99412CB3BAFF95F897504426CE5D43768CF78D8A4C390
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761688D15,?,?,00000000,00007FF7616819D1,?,?,00000000,00007FF761681F05), ref: 00007FF7616B2B00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761688D15,?,?,00000000,00007FF7616819D1,?,?,00000000,00007FF761681F05), ref: 00007FF7616B2B26
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761688D15,?,?,00000000,00007FF7616819D1,?,?,00000000,00007FF761681F05), ref: 00007FF7616B2B34
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF761688D15,?,?,00000000,00007FF7616819D1,?,?,00000000,00007FF761681F05), ref: 00007FF7616B2B42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.4045743202.00007FF761661000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF761660000, based on PE: true
                                        • Associated: 00000000.00000002.4045726305.00007FF761660000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045788411.00007FF7616C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045814302.00007FF7616D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.4045839565.00007FF7616DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff761660000_EspPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 0ca5987a86bd8772b3c6def7f7db8b85989afe65d4c00123de1d083a15ff9c08
                                        • Instruction ID: cd56394111b12818beabd7881b62d18530228a95c66f1a11aed3e13f92ddcc55
                                        • Opcode Fuzzy Hash: 0ca5987a86bd8772b3c6def7f7db8b85989afe65d4c00123de1d083a15ff9c08
                                        • Instruction Fuzzy Hash: B4F0C97AA04B01C2DB149F22F9A8128B3B5FF98F8C7514525CE9D43764CF78D465C350