Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tpmbypassprivatestore.exe

Overview

General Information

Sample name:tpmbypassprivatestore.exe
Analysis ID:1590934
MD5:f9abe0d8c09682a9b0a38b96d7378d8a
SHA1:1a5deff8373d2dd054b8709900cdc71a98264b86
SHA256:db82d79323e0c49e67e9df543ecbe248b2f3b82ebc72b4e21f61ee079705ff4b
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • tpmbypassprivatestore.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5: F9ABE0D8C09682A9B0A38B96D7378D8A)
    • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7700 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 7716 cmdline: certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 7724 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 7744 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 7784 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 7800 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 7892 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 7916 cmdline: C:\Windows\system32\WerFault.exe -u -p 7564 -s 836 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: tpmbypassprivatestore.exeAvira: detected
Source: tpmbypassprivatestore.exeVirustotal: Detection: 44%Perma Link
Source: tpmbypassprivatestore.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: tpmbypassprivatestore.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3532CD strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF76C3532CD
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C36ED20 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF76C36ED20
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C376090 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF76C376090
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C355550 CryptAcquireContextA,CryptCreateHash,0_2_00007FF76C355550
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3555A0 CryptHashData,0_2_00007FF76C3555A0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3555B0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF76C3555B0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3525C0 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF76C3525C0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C352690 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF76C352690
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C36F640 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF76C36F640
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C378180 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF76C378180
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF76C339040
Source: tpmbypassprivatestore.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF76C361E90
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49748 version: TLS 1.2
Source: tpmbypassprivatestore.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Bypass Valorant TPM C++\Loader TPM Bypass Novo\built\DragonBurn.pdb source: tpmbypassprivatestore.exe
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C32FD20 malloc,recv,free,0_2_00007FF76C32FD20
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: tpmbypassprivatestore.exeString found in binary or memory: http://167.114.85.75/KMDF.exe
Source: tpmbypassprivatestore.exeString found in binary or memory: http://167.114.85.75/KMDF.exeC:
Source: tpmbypassprivatestore.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: tpmbypassprivatestore.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: tpmbypassprivatestore.exe, tpmbypassprivatestore.exe, 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmp, tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/OCESS
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/ce
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/g3
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/yCESS
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49748 version: TLS 1.2
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C376090 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF76C376090
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C322B000_2_00007FF76C322B00
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C341C200_2_00007FF76C341C20
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3137900_2_00007FF76C313790
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3257400_2_00007FF76C325740
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3408E00_2_00007FF76C3408E0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3428D00_2_00007FF76C3428D0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3532CD0_2_00007FF76C3532CD
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C35DD800_2_00007FF76C35DD80
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C36ED200_2_00007FF76C36ED20
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3760900_2_00007FF76C376090
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3510500_2_00007FF76C351050
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3781100_2_00007FF76C378110
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3559600_2_00007FF76C355960
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3489200_2_00007FF76C348920
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C32EB500_2_00007FF76C32EB50
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C316BC00_2_00007FF76C316BC0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C34BC200_2_00007FF76C34BC20
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C33A5600_2_00007FF76C33A560
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3665B00_2_00007FF76C3665B0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3436F00_2_00007FF76C3436F0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C34E7700_2_00007FF76C34E770
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C36A8000_2_00007FF76C36A800
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3697D00_2_00007FF76C3697D0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3328F00_2_00007FF76C3328F0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3628B00_2_00007FF76C3628B0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C31B1900_2_00007FF76C31B190
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C33D2900_2_00007FF76C33D290
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C31C2C00_2_00007FF76C31C2C0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C35338C0_2_00007FF76C35338C
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3533950_2_00007FF76C353395
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3113400_2_00007FF76C311340
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C32E0C0 appears 46 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C342DC0 appears 33 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C33F8D0 appears 381 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C33FA50 appears 324 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C3796A4 appears 47 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C32A960 appears 49 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C32E190 appears 36 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C342C50 appears 36 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C342CE0 appears 33 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: String function: 00007FF76C33A1A0 appears 70 times
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7564 -s 836
Source: classification engineClassification label: mal68.evad.winEXE@18/0@1/2
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C329400 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF76C329400
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7916:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1229ccf6-fead-4310-bc48-b890d0b36896Jump to behavior
Source: tpmbypassprivatestore.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: tpmbypassprivatestore.exeVirustotal: Detection: 44%
Source: tpmbypassprivatestore.exeReversingLabs: Detection: 52%
Source: tpmbypassprivatestore.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\tpmbypassprivatestore.exe "C:\Users\user\Desktop\tpmbypassprivatestore.exe"
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7564 -s 836
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: tpmbypassprivatestore.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: tpmbypassprivatestore.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: tpmbypassprivatestore.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Spoofer Valorant C#\Bypass Valorant TPM C++\Loader TPM Bypass Novo\built\DragonBurn.pdb source: tpmbypassprivatestore.exe
Source: tpmbypassprivatestore.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: tpmbypassprivatestore.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: tpmbypassprivatestore.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: tpmbypassprivatestore.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: tpmbypassprivatestore.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3425B0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF76C3425B0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C32CD58 push rcx; ret 0_2_00007FF76C32CD59
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C32CC2D push rcx; ret 0_2_00007FF76C32CC35
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-49648
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeAPI coverage: 5.0 %
Source: C:\Windows\System32\timeout.exe TID: 7896Thread sleep count: 42 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging

barindex
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-49301
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C379538 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF76C379538
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C379538 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF76C379538
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3425B0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF76C3425B0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C311A10 GetProcessHeap,0_2_00007FF76C311A10
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C378CF0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF76C378CF0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C379198 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF76C379198
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C379340 SetUnhandledExceptionFilter,0_2_00007FF76C379340
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C3793AC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF76C3793AC
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C34DDF0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,closesocket,closesocket,closesocket,closesocket,0_2_00007FF76C34DDF0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C35DD80 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memmove,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF76C35DD80
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C364AE0 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF76C364AE0
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C341590 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF76C341590
Source: C:\Users\user\Desktop\tpmbypassprivatestore.exeCode function: 0_2_00007FF76C364881 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF76C364881
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
22
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory131
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS2
System Information Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590934 Sample: tpmbypassprivatestore.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 68 33 keyauth.win 2->33 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Machine Learning detection for sample 2->43 45 AI detected suspicious sample 2->45 9 tpmbypassprivatestore.exe 1 2->9         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.1.5, 443, 49748 CLOUDFLARENETUS United States 9->35 37 127.0.0.1 unknown unknown 9->37 47 Found API chain indicative of debugger detection 9->47 13 cmd.exe 1 9->13         started        15 cmd.exe 1 9->15         started        17 conhost.exe 9->17         started        19 WerFault.exe 2 9->19         started        signatures6 process7 process8 21 certutil.exe 3 1 13->21         started        23 find.exe 1 13->23         started        25 find.exe 1 13->25         started        27 cmd.exe 1 15->27         started        process9 29 conhost.exe 27->29         started        31 timeout.exe 1 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
tpmbypassprivatestore.exe44%VirustotalBrowse
tpmbypassprivatestore.exe53%ReversingLabsWin64.Trojan.Generic
tpmbypassprivatestore.exe100%AviraHEUR/AGEN.1315740
tpmbypassprivatestore.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/KMDF.exe0%Avira URL Cloudsafe
http://167.114.85.75/KMDF.exeC:0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    high
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.2/OCESStpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://keyauth.win/api/1.2/g3tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://keyauth.win/api/1.2/valoranttpmbypassprivatestore.exe, 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpfalse
            high
            http://167.114.85.75/KMDF.exetpmbypassprivatestore.exefalse
            • Avira URL Cloud: safe
            unknown
            http://167.114.85.75/KMDF.exeC:tpmbypassprivatestore.exefalse
            • Avira URL Cloud: safe
            unknown
            https://keyauth.win/api/1.2/yCESStpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://curl.haxx.se/docs/http-cookies.htmltpmbypassprivatestore.exefalse
                high
                https://curl.haxx.se/docs/http-cookies.html#tpmbypassprivatestore.exefalse
                  high
                  https://keyauth.win/api/1.2/tpmbypassprivatestore.exe, tpmbypassprivatestore.exe, 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmp, tpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://keyauth.win/api/1.2/cetpmbypassprivatestore.exe, 00000000.00000002.1382569717.000001C3DD0FC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.1.5
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:42.0.0 Malachite
                      Analysis ID:1590934
                      Start date and time:2025-01-14 16:49:57 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 52s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:18
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:tpmbypassprivatestore.exe
                      Detection:MAL
                      Classification:mal68.evad.winEXE@18/0@1/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 56
                      • Number of non-executed functions: 228
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.1.5SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                            dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          s-part-0017.t-0009.t-msedge.nethhcqxkb.exeGet hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          https://forrestore.com/static/apps/437.zipGet hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          https://2ol.itectaxice.ru/Qm75/Get hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          https://account.tctmagazine.com/emailclickthrough?TxActivity=239212&returnUrl=https://mighty-calm-plum-toucan.easy2.de/&Hash=1DD38A2BA32B80F59EA0F1A750C3EC0EGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          keyauth.winPlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                          • 104.26.0.5
                                          Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSSPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          email.emlGet hashmaliciousunknownBrowse
                                          • 172.64.41.3
                                          http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                          • 188.114.96.3
                                          PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          http://brillflooring.comGet hashmaliciousUnknownBrowse
                                          • 188.114.96.3
                                          Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • 104.21.64.1
                                          0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                          • 172.65.251.78
                                          http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                          • 104.20.0.15
                                          Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                          • 104.18.95.41
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ce5f3254611a8c095a3d821d44539877dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.26402.21423.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          No context
                                          No created / dropped files found
                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                          Entropy (8bit):6.427401695224324
                                          TrID:
                                          • Win64 Executable Console (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:tpmbypassprivatestore.exe
                                          File size:563'200 bytes
                                          MD5:f9abe0d8c09682a9b0a38b96d7378d8a
                                          SHA1:1a5deff8373d2dd054b8709900cdc71a98264b86
                                          SHA256:db82d79323e0c49e67e9df543ecbe248b2f3b82ebc72b4e21f61ee079705ff4b
                                          SHA512:5e15dc0c924daa0053d64e8a95de1c6e95e50772ad47e69a92b1d62baa3da173a974c556fe7e72f202ab0e9eea4e0a80d1f07b354c5e22694b0a0a0faafbec32
                                          SSDEEP:12288:l8e6P2GGYDHSt5lbNEDAemeUs81Jz8z1un:lWOGGYDytP7emZb16Run
                                          TLSH:FAC47D56A7A902E9D1ABD03CC547C613F7B2B49513119BDB43A0CA792F23BE16F3A710
                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........$...J...J...J.......J.......J...N...J...I...J...O...J...K...J.D.N...J...N...J...O...J...K...J...K.F~J...C...J.......J...H...J
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x140068a08
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows cui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x676DE83E [Thu Dec 26 23:35:26 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:503534690aeb51719377d930c26e6d60
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          call 00007FC09D1A08F0h
                                          dec eax
                                          add esp, 28h
                                          jmp 00007FC09D19FDC7h
                                          int3
                                          int3
                                          inc eax
                                          push ebx
                                          dec eax
                                          sub esp, 20h
                                          dec eax
                                          mov ebx, ecx
                                          dec eax
                                          lea ecx, dword ptr [0001DFACh]
                                          call dword ptr [000027B6h]
                                          mov eax, dword ptr [0001D63Ch]
                                          dec eax
                                          lea ecx, dword ptr [0001DF99h]
                                          mov edx, dword ptr [0001DF9Bh]
                                          inc eax
                                          mov dword ptr [0001D627h], eax
                                          mov dword ptr [ebx], eax
                                          dec eax
                                          mov eax, dword ptr [00000058h]
                                          inc ecx
                                          mov ecx, 00000004h
                                          dec esp
                                          mov eax, dword ptr [eax+edx*8]
                                          mov eax, dword ptr [0001D60Ch]
                                          inc ebx
                                          mov dword ptr [ecx+eax], eax
                                          call dword ptr [0000276Eh]
                                          dec eax
                                          lea ecx, dword ptr [0001DF57h]
                                          dec eax
                                          add esp, 20h
                                          pop ebx
                                          dec eax
                                          jmp dword ptr [0000276Bh]
                                          int3
                                          int3
                                          int3
                                          inc eax
                                          push ebx
                                          dec eax
                                          sub esp, 20h
                                          dec eax
                                          mov ebx, ecx
                                          dec eax
                                          lea ecx, dword ptr [0001DF40h]
                                          call dword ptr [0000274Ah]
                                          cmp dword ptr [ebx], 00000000h
                                          jne 00007FC09D19FF74h
                                          or dword ptr [ebx], FFFFFFFFh
                                          jmp 00007FC09D19FF97h
                                          inc ebp
                                          xor ecx, ecx
                                          dec eax
                                          lea edx, dword ptr [0001DF26h]
                                          inc ecx
                                          or eax, FFFFFFFFh
                                          dec eax
                                          lea ecx, dword ptr [0001DF13h]
                                          call dword ptr [00002735h]
                                          jmp 00007FC09D19FF2Bh
                                          cmp dword ptr [ebx], FFFFFFFFh
                                          je 00007FC09D19FF30h
                                          dec eax
                                          mov eax, dword ptr [00000058h]
                                          Programming Language:
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x823f80x208.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8d0000x1e8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x880000x4740.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000x578.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x7a9a00x70.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x7aa800x28.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7a8600x140.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x6b0000xb60.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x699000x69a00bf95f57b3eeaac052c8d6166a45faafaFalse0.5313886834319527data6.347064890226745IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x6b0000x1a1840x1a200428eb8a57b64a4426e5d8c1c141b9661False0.38158829246411485data5.598322596927925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x860000x13900x800c76cf58d1d552732f4980d7479f95149False0.20751953125data3.76760610115393IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x880000x47400x480061ead6eea1aa491aa690c762edffc6adFalse0.4814995659722222data5.781604397759615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x8d0000x1e80x200c317bfdbea1210b1ab592ac9f5a906ffFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x8e0000x5780x6005906dee2ce41997ba62968ce18249c3cFalse0.5423177083333334data5.165401574106448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_MANIFEST0x8d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                          DLLImport
                                          KERNEL32.dllQueryPerformanceFrequency, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, GetSystemDirectoryA, FreeLibrary, GetProcAddress, LoadLibraryA, VerifyVersionInfoA, QueryPerformanceCounter, GetTickCount, MoveFileExA, FormatMessageA, HeapAlloc, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetCurrentProcessId, LocalFree, SetLastError, QueryFullProcessImageNameW, GetModuleHandleW, GetModuleHandleA, UnmapViewOfFile, MapViewOfFile, CreateFileMappingW, VirtualProtect, CreateThread, GetCurrentProcess, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, WaitForSingleObjectEx, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, HeapDestroy, GetLastError, HeapReAlloc, CloseHandle, GetConsoleWindow, SetConsoleScreenBufferInfoEx, GetModuleFileNameA, GetConsoleMode, Sleep, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetStdHandle, SetConsoleTitleA, SetConsoleTextAttribute, MultiByteToWideChar, CreateFileW
                                          USER32.dllMoveWindow, GetWindowLongW, SetWindowLongW, MessageBoxA, GetWindowRect
                                          MSVCP140.dll??1_Lockit@std@@QEAA@XZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Xbad_function_call@std@@YAXXZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??Bid@locale@std@@QEAA_KXZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?good@ios_base@std@@QEBA_NXZ, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ??0_Lockit@std@@QEAA@H@Z, ?_Throw_Cpp_error@std@@YAXH@Z, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Xlength_error@std@@YAXPEBD@Z, ?_Random_device@std@@YAIXZ, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPEBD@Z
                                          urlmon.dllURLDownloadToFileA
                                          Normaliz.dllIdnToAscii
                                          WLDAP32.dll
                                          CRYPT32.dllCertCloseStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertOpenStore
                                          WS2_32.dllgethostname, recvfrom, freeaddrinfo, closesocket, recv, send, getaddrinfo, ntohl, sendto, __WSAFDIsSet, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, select, ntohs, htons, WSAGetLastError, getsockopt, getsockname, getpeername, connect, bind
                                          RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                                          PSAPI.DLLGetModuleInformation
                                          USERENV.dllUnloadUserProfile
                                          VCRUNTIME140_1.dll__CxxFrameHandler4
                                          VCRUNTIME140.dll__current_exception, strrchr, __current_exception_context, strchr, strstr, __C_specific_handler, memset, __std_exception_destroy, __std_exception_copy, memmove, memcpy, memcmp, memchr, __std_terminate, _CxxThrowException
                                          api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_exe, exit, _configure_narrow_argv, system, _getpid, _initialize_onexit_table, terminate, _cexit, _resetstkoflw, _invalid_parameter_noinfo, _register_onexit_function, __sys_nerr, strerror, _set_app_type, _crt_atexit, _beginthreadex, _get_initial_narrow_environment, _initterm_e, _exit, __p___argc, __p___argv, _c_exit, _errno, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _initialize_narrow_environment, _initterm
                                          api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, fwrite, fflush, fclose, fgetpos, fgetc, __stdio_common_vfprintf, setvbuf, ungetc, fgets, fputc, _open, _close, _write, _read, _pclose, __p__commode, _set_fmode, _popen, __stdio_common_vsprintf, _get_stream_buffer_pointers, _lseeki64, fopen, fsetpos, fputs, __stdio_common_vsscanf, ftell, fseek, feof, fread, _fseeki64
                                          api-ms-win-crt-heap-l1-1-0.dllmalloc, free, realloc, _callnewh, _set_new_mode, calloc
                                          api-ms-win-crt-time-l1-1-0.dll_localtime64_s, strftime, _time64, _gmtime64
                                          api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _unlink, _lock_file, _access, _stat64, _fstat64
                                          api-ms-win-crt-convert-l1-1-0.dllstrtoull, strtol, strtoll, atoi, strtoul, strtod
                                          api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                          api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                          api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcmp, strncmp, strncpy, strspn, isupper, _strdup, tolower, strcspn
                                          api-ms-win-crt-utility-l1-1-0.dllqsort
                                          ADVAPI32.dllCryptGenRandom, SetSecurityInfo, CopySid, ConvertSidToStringSidA, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, InitializeAcl, GetTokenInformation, GetLengthSid, CryptHashData, CryptEncrypt, CryptImportKey, CryptDestroyKey, CryptDestroyHash, AddAccessAllowedAce, OpenProcessToken, IsValidSid
                                          SHELL32.dllShellExecuteA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 14, 2025 16:50:52.194935083 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.194972038 CET44349748104.26.1.5192.168.2.9
                                          Jan 14, 2025 16:50:52.195024967 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.205396891 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.205418110 CET44349748104.26.1.5192.168.2.9
                                          Jan 14, 2025 16:50:52.686660051 CET44349748104.26.1.5192.168.2.9
                                          Jan 14, 2025 16:50:52.686732054 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.698174953 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.698206902 CET44349748104.26.1.5192.168.2.9
                                          Jan 14, 2025 16:50:52.698329926 CET49748443192.168.2.9104.26.1.5
                                          Jan 14, 2025 16:50:52.698452950 CET44349748104.26.1.5192.168.2.9
                                          Jan 14, 2025 16:50:52.698496103 CET49748443192.168.2.9104.26.1.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 14, 2025 16:50:52.183197021 CET6314553192.168.2.91.1.1.1
                                          Jan 14, 2025 16:50:52.190325022 CET53631451.1.1.1192.168.2.9
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 14, 2025 16:50:52.183197021 CET192.168.2.91.1.1.10x1058Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 14, 2025 16:50:45.537754059 CET1.1.1.1192.168.2.90xe696No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                          Jan 14, 2025 16:50:45.537754059 CET1.1.1.1192.168.2.90xe696No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                          Jan 14, 2025 16:50:52.190325022 CET1.1.1.1192.168.2.90x1058No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                          Jan 14, 2025 16:50:52.190325022 CET1.1.1.1192.168.2.90x1058No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                          Jan 14, 2025 16:50:52.190325022 CET1.1.1.1192.168.2.90x1058No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:10:50:48
                                          Start date:14/01/2025
                                          Path:C:\Users\user\Desktop\tpmbypassprivatestore.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\tpmbypassprivatestore.exe"
                                          Imagebase:0x7ff76c310000
                                          File size:563'200 bytes
                                          MD5 hash:F9ABE0D8C09682A9B0A38B96D7378D8A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:10:50:48
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff70f010000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:10:50:50
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                          Imagebase:0x7ff68c850000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:10:50:50
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\certutil.exe
                                          Wow64 process (32bit):false
                                          Commandline:certutil -hashfile "C:\Users\user\Desktop\tpmbypassprivatestore.exe" MD5
                                          Imagebase:0x7ff663ac0000
                                          File size:1'651'712 bytes
                                          MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:5
                                          Start time:10:50:51
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\find.exe
                                          Wow64 process (32bit):false
                                          Commandline:find /i /v "md5"
                                          Imagebase:0x7ff6121f0000
                                          File size:17'920 bytes
                                          MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:6
                                          Start time:10:50:51
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\find.exe
                                          Wow64 process (32bit):false
                                          Commandline:find /i /v "certutil"
                                          Imagebase:0x7ff6121f0000
                                          File size:17'920 bytes
                                          MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:7
                                          Start time:10:50:51
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                          Imagebase:0x7ff68c850000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:10:50:51
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                          Imagebase:0x7ff68c850000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:10:50:52
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff70f010000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:10:50:52
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\timeout.exe
                                          Wow64 process (32bit):false
                                          Commandline:timeout /t 5
                                          Imagebase:0x7ff694f90000
                                          File size:32'768 bytes
                                          MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:13
                                          Start time:10:50:52
                                          Start date:14/01/2025
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 7564 -s 836
                                          Imagebase:0x7ff778f60000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.3%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:30.2%
                                            Total number of Nodes:1910
                                            Total number of Limit Nodes:91
                                            execution_graph 49133 7ff76c35ab5a 49134 7ff76c35abc3 49133->49134 49138 7ff76c35ab93 49133->49138 49202 7ff76c35c1f0 38 API calls 49134->49202 49136 7ff76c35abc8 49136->49138 49154 7ff76c35acdc 49136->49154 49137 7ff76c35abb3 49138->49137 49155 7ff76c35d390 32 API calls 49138->49155 49140 7ff76c35ac53 49141 7ff76c35ad33 49140->49141 49156 7ff76c373cd0 35 API calls 49140->49156 49212 7ff76c35bf90 free free free free 49141->49212 49144 7ff76c35ac6e 49157 7ff76c33fa50 49144->49157 49147 7ff76c35ac9d 49148 7ff76c35acf0 49147->49148 49147->49154 49167 7ff76c35b440 49147->49167 49148->49154 49211 7ff76c345d30 17 API calls 49148->49211 49151 7ff76c35acc1 49151->49148 49152 7ff76c35acc7 49151->49152 49152->49154 49203 7ff76c340530 49152->49203 49155->49140 49156->49144 49158 7ff76c33fa59 49157->49158 49159 7ff76c33fbae 49157->49159 49166 7ff76c33fb29 49158->49166 49213 7ff76c32e290 13 API calls 49158->49213 49159->49141 49159->49147 49162 7ff76c33fb11 49164 7ff76c33fb5e fwrite fwrite 49162->49164 49162->49166 49163 7ff76c33faac 49163->49162 49214 7ff76c32e190 49163->49214 49164->49166 49217 7ff76c3784d0 49166->49217 49168 7ff76c35b469 49167->49168 49169 7ff76c35b4d0 49167->49169 49171 7ff76c35b47a 49168->49171 49172 7ff76c35b490 49168->49172 49270 7ff76c344a60 49169->49270 49268 7ff76c344960 395 API calls 49171->49268 49229 7ff76c3408e0 49172->49229 49175 7ff76c35b485 49175->49151 49177 7ff76c35b541 49181 7ff76c35b66e 49177->49181 49182 7ff76c35b572 49177->49182 49198 7ff76c35b5ba 49177->49198 49178 7ff76c35b4dd 49178->49177 49178->49198 49290 7ff76c373cd0 35 API calls 49178->49290 49180 7ff76c35b4a1 49180->49198 49269 7ff76c35c0c0 32 API calls 49180->49269 49298 7ff76c345d30 17 API calls 49181->49298 49183 7ff76c35b5ce 49182->49183 49184 7ff76c35b57e 49182->49184 49195 7ff76c35b5d7 49183->49195 49294 7ff76c375d60 _errno strtoll _errno 49183->49294 49291 7ff76c35bdd0 47 API calls 49184->49291 49188 7ff76c35b588 49188->49198 49292 7ff76c35b920 26 API calls 49188->49292 49189 7ff76c35b4c5 49189->49151 49192 7ff76c35b62e 49192->49198 49297 7ff76c373cd0 35 API calls 49192->49297 49195->49192 49296 7ff76c35c160 39 API calls 49195->49296 49196 7ff76c35b5f3 49196->49192 49196->49195 49199 7ff76c35b619 49196->49199 49197 7ff76c35b5a3 49197->49198 49293 7ff76c35bd10 32 API calls 49197->49293 49198->49151 49295 7ff76c35c160 39 API calls 49199->49295 49202->49136 49204 7ff76c340570 closesocket 49203->49204 49205 7ff76c340545 49203->49205 49204->49154 49206 7ff76c340561 49205->49206 49207 7ff76c340586 49205->49207 49669 7ff76c32fa60 free 49206->49669 49670 7ff76c32fa60 free 49207->49670 49210 7ff76c34058e 49210->49154 49211->49154 49212->49154 49213->49163 49226 7ff76c32eb50 13 API calls 49214->49226 49216 7ff76c32e1c3 49216->49162 49218 7ff76c3784d9 49217->49218 49219 7ff76c3784e4 49218->49219 49220 7ff76c378d24 IsProcessorFeaturePresent 49218->49220 49219->49159 49221 7ff76c378d3c 49220->49221 49227 7ff76c378f18 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 49221->49227 49223 7ff76c378d4f 49228 7ff76c378cf0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49223->49228 49226->49216 49227->49223 49230 7ff76c340938 49229->49230 49245 7ff76c34092f 49229->49245 49299 7ff76c346b40 49230->49299 49232 7ff76c3784d0 8 API calls 49233 7ff76c340e65 49232->49233 49233->49169 49233->49180 49234 7ff76c340952 49235 7ff76c3409c9 49234->49235 49236 7ff76c3409e2 49234->49236 49347 7ff76c33f8d0 19 API calls 49235->49347 49238 7ff76c3409ec 49236->49238 49244 7ff76c340a19 49236->49244 49240 7ff76c341ab0 607 API calls 49238->49240 49239 7ff76c3409d8 49239->49245 49241 7ff76c3409fa 49240->49241 49241->49245 49246 7ff76c341bc0 51 API calls 49241->49246 49243 7ff76c340cf5 49243->49245 49349 7ff76c3421e0 612 API calls 49243->49349 49244->49243 49247 7ff76c340c64 SleepEx getsockopt 49244->49247 49251 7ff76c340c06 SleepEx getsockopt 49244->49251 49253 7ff76c340b17 WSASetLastError 49244->49253 49256 7ff76c340d33 49244->49256 49266 7ff76c33fa50 15 API calls 49244->49266 49267 7ff76c3421e0 612 API calls 49244->49267 49302 7ff76c34f370 49244->49302 49348 7ff76c329bf0 27 API calls 49244->49348 49245->49232 49246->49245 49247->49244 49250 7ff76c340cac WSAGetLastError 49247->49250 49249 7ff76c340d0e 49249->49245 49254 7ff76c340d27 49249->49254 49250->49244 49251->49244 49252 7ff76c340c4e WSAGetLastError 49251->49252 49252->49244 49253->49244 49350 7ff76c329bf0 27 API calls 49254->49350 49255 7ff76c340d8b 49326 7ff76c341ab0 49255->49326 49256->49255 49258 7ff76c340530 2 API calls 49256->49258 49258->49255 49260 7ff76c340e07 49351 7ff76c33f8d0 19 API calls 49260->49351 49261 7ff76c340da9 49261->49245 49339 7ff76c341bc0 49261->49339 49264 7ff76c340e25 49264->49245 49266->49244 49267->49244 49268->49175 49269->49189 49271 7ff76c344aaf 49270->49271 49272 7ff76c344a94 49270->49272 49273 7ff76c344af1 memset 49271->49273 49277 7ff76c344ab5 49271->49277 49272->49271 49399 7ff76c339ad0 49272->49399 49278 7ff76c344b23 49273->49278 49275 7ff76c3784d0 8 API calls 49276 7ff76c344c55 49275->49276 49276->49178 49277->49275 49279 7ff76c344b7e calloc 49278->49279 49280 7ff76c344bf6 49278->49280 49282 7ff76c344bac 49279->49282 49283 7ff76c344b96 49279->49283 49412 7ff76c343e10 394 API calls 49280->49412 49284 7ff76c33fa50 15 API calls 49282->49284 49283->49277 49286 7ff76c344bbb 49284->49286 49285 7ff76c344c06 49287 7ff76c33fa50 15 API calls 49285->49287 49288 7ff76c344c21 49285->49288 49286->49280 49287->49288 49288->49277 49289 7ff76c344c2b free 49288->49289 49289->49277 49290->49177 49291->49188 49292->49197 49293->49198 49294->49196 49295->49192 49296->49192 49297->49198 49298->49198 49300 7ff76c346b8d GetTickCount 49299->49300 49301 7ff76c346b52 QueryPerformanceCounter 49299->49301 49300->49234 49301->49234 49303 7ff76c34f3b7 49302->49303 49314 7ff76c34f3eb 49302->49314 49304 7ff76c34f3c1 49303->49304 49303->49314 49305 7ff76c34f3db Sleep 49304->49305 49306 7ff76c34f3c8 WSASetLastError 49304->49306 49307 7ff76c34f3e4 49304->49307 49305->49307 49306->49307 49309 7ff76c3784d0 8 API calls 49307->49309 49313 7ff76c34f69e 49309->49313 49310 7ff76c34f535 49312 7ff76c34f53a 49310->49312 49315 7ff76c34f543 WSASetLastError 49310->49315 49316 7ff76c34f556 Sleep 49310->49316 49311 7ff76c34f563 select 49311->49312 49312->49307 49317 7ff76c34f62c 49312->49317 49318 7ff76c34f602 __WSAFDIsSet __WSAFDIsSet 49312->49318 49313->49244 49314->49310 49314->49311 49315->49312 49316->49312 49319 7ff76c34f65b 49317->49319 49320 7ff76c34f634 __WSAFDIsSet 49317->49320 49318->49317 49319->49307 49321 7ff76c34f663 __WSAFDIsSet 49319->49321 49322 7ff76c34f647 49320->49322 49323 7ff76c34f64a __WSAFDIsSet 49320->49323 49324 7ff76c34f679 __WSAFDIsSet 49321->49324 49325 7ff76c34f676 49321->49325 49322->49323 49323->49319 49324->49307 49325->49324 49327 7ff76c341bb5 49326->49327 49331 7ff76c341ac7 49326->49331 49327->49261 49328 7ff76c341b97 49354 7ff76c34f7d0 579 API calls 49328->49354 49330 7ff76c341b6a 49353 7ff76c34fe20 606 API calls 49330->49353 49331->49328 49331->49330 49334 7ff76c341b4c 49331->49334 49333 7ff76c341bb0 49333->49261 49334->49330 49336 7ff76c341b51 49334->49336 49335 7ff76c341b92 49335->49261 49352 7ff76c33f8d0 19 API calls 49336->49352 49338 7ff76c341b60 49338->49261 49340 7ff76c341bed 49339->49340 49341 7ff76c341be0 49339->49341 49355 7ff76c341260 49340->49355 49385 7ff76c34e420 49341->49385 49346 7ff76c341c05 49346->49245 49347->49239 49348->49244 49349->49249 49350->49260 49351->49264 49352->49338 49353->49335 49354->49333 49356 7ff76c341297 49355->49356 49357 7ff76c341493 49355->49357 49356->49357 49359 7ff76c3412b1 getpeername 49356->49359 49358 7ff76c3784d0 8 API calls 49357->49358 49360 7ff76c34157a 49358->49360 49361 7ff76c34130d getsockname 49359->49361 49362 7ff76c3412d6 WSAGetLastError 49359->49362 49388 7ff76c33c000 15 API calls 49360->49388 49364 7ff76c341397 49361->49364 49365 7ff76c341360 WSAGetLastError 49361->49365 49389 7ff76c329bf0 27 API calls 49362->49389 49393 7ff76c340490 19 API calls 49364->49393 49391 7ff76c329bf0 27 API calls 49365->49391 49367 7ff76c3412f3 49390 7ff76c33f8d0 19 API calls 49367->49390 49369 7ff76c3413b9 49372 7ff76c3413fd 49369->49372 49373 7ff76c3413bd _errno _errno 49369->49373 49371 7ff76c34137d 49392 7ff76c33f8d0 19 API calls 49371->49392 49396 7ff76c340490 19 API calls 49372->49396 49394 7ff76c329bf0 27 API calls 49373->49394 49377 7ff76c3413e3 49395 7ff76c33f8d0 19 API calls 49377->49395 49378 7ff76c34144f 49378->49357 49380 7ff76c341453 _errno _errno 49378->49380 49397 7ff76c329bf0 27 API calls 49380->49397 49382 7ff76c341479 49398 7ff76c33f8d0 19 API calls 49382->49398 49384 7ff76c341308 49384->49357 49386 7ff76c346b40 2 API calls 49385->49386 49387 7ff76c34e43a 49386->49387 49387->49340 49388->49346 49389->49367 49390->49384 49391->49371 49392->49384 49393->49369 49394->49377 49395->49384 49396->49378 49397->49382 49398->49384 49400 7ff76c339af7 49399->49400 49404 7ff76c339afe 49399->49404 49449 7ff76c33a4b0 memset 49400->49449 49402 7ff76c339b24 49450 7ff76c33f8d0 19 API calls 49402->49450 49403 7ff76c339b2d 49413 7ff76c352e10 49403->49413 49431 7ff76c352180 49403->49431 49404->49402 49404->49403 49406 7ff76c339b67 49404->49406 49406->49271 49407 7ff76c339b52 49407->49406 49409 7ff76c34e420 2 API calls 49407->49409 49408 7ff76c339b77 49408->49406 49409->49406 49412->49285 49414 7ff76c352e64 49413->49414 49418 7ff76c352e59 49413->49418 49427 7ff76c352e8b 49414->49427 49451 7ff76c341150 49414->49451 49415 7ff76c352f82 49415->49418 49579 7ff76c354570 69 API calls 49415->49579 49417 7ff76c341150 10 API calls 49417->49427 49418->49407 49421 7ff76c352f6c 49578 7ff76c33f8d0 19 API calls 49421->49578 49424 7ff76c352f65 49424->49418 49425 7ff76c34f370 19 API calls 49425->49427 49427->49415 49427->49417 49427->49418 49427->49421 49427->49425 49428 7ff76c352f4d WSAGetLastError 49427->49428 49430 7ff76c352f3c 49427->49430 49512 7ff76c353de0 49427->49512 49577 7ff76c33f8d0 19 API calls 49428->49577 49430->49418 49430->49421 49432 7ff76c352e10 49431->49432 49433 7ff76c341150 10 API calls 49432->49433 49445 7ff76c352e8b 49432->49445 49448 7ff76c352e59 49432->49448 49436 7ff76c352e77 49433->49436 49434 7ff76c341150 10 API calls 49434->49445 49435 7ff76c352f82 49435->49448 49668 7ff76c354570 69 API calls 49435->49668 49438 7ff76c352f6c 49436->49438 49440 7ff76c353000 74 API calls 49436->49440 49667 7ff76c33f8d0 19 API calls 49438->49667 49440->49445 49441 7ff76c352f65 49441->49448 49442 7ff76c34f370 19 API calls 49442->49445 49443 7ff76c353de0 250 API calls 49443->49445 49444 7ff76c352f4d WSAGetLastError 49666 7ff76c33f8d0 19 API calls 49444->49666 49445->49434 49445->49435 49445->49438 49445->49442 49445->49443 49445->49444 49447 7ff76c352f3c 49445->49447 49445->49448 49447->49438 49447->49448 49448->49407 49449->49404 49450->49408 49452 7ff76c34119a 49451->49452 49453 7ff76c346b40 2 API calls 49452->49453 49454 7ff76c3411ba 49452->49454 49453->49454 49455 7ff76c3784d0 8 API calls 49454->49455 49456 7ff76c34124e 49455->49456 49456->49421 49457 7ff76c353000 49456->49457 49458 7ff76c353072 49457->49458 49580 7ff76c342750 49458->49580 49461 7ff76c3530c1 49463 7ff76c3530ca GetModuleHandleA GetProcAddress 49461->49463 49467 7ff76c353108 49461->49467 49462 7ff76c33fa50 15 API calls 49462->49461 49464 7ff76c3530ec 49463->49464 49463->49467 49465 7ff76c342750 14 API calls 49464->49465 49466 7ff76c353100 49465->49466 49466->49467 49468 7ff76c342750 14 API calls 49467->49468 49479 7ff76c353165 49467->49479 49469 7ff76c353161 49468->49469 49470 7ff76c353172 49469->49470 49469->49479 49605 7ff76c33f8d0 19 API calls 49470->49605 49472 7ff76c353a97 49588 7ff76c350c90 49472->49588 49474 7ff76c3784d0 8 API calls 49477 7ff76c353d9c 49474->49477 49475 7ff76c353aac 49476 7ff76c353abf 49475->49476 49480 7ff76c350c90 13 API calls 49475->49480 49481 7ff76c33fa50 15 API calls 49476->49481 49483 7ff76c353ad2 49476->49483 49477->49427 49478 7ff76c353228 49606 7ff76c33f8d0 19 API calls 49478->49606 49479->49472 49479->49478 49480->49476 49481->49483 49485 7ff76c33fa50 15 API calls 49483->49485 49487 7ff76c353b1b 49483->49487 49485->49487 49486 7ff76c353b7d calloc 49488 7ff76c353bd7 49486->49488 49489 7ff76c353bf0 49486->49489 49487->49486 49607 7ff76c33f8d0 19 API calls 49488->49607 49491 7ff76c353cfc 49489->49491 49492 7ff76c353c59 free 49489->49492 49510 7ff76c353be6 49489->49510 49602 7ff76c340190 49491->49602 49493 7ff76c353c8a 49492->49493 49494 7ff76c353cd6 49492->49494 49497 7ff76c353cb0 49493->49497 49498 7ff76c353c92 49493->49498 49496 7ff76c329400 22 API calls 49494->49496 49499 7ff76c353ce0 49496->49499 49501 7ff76c329400 22 API calls 49497->49501 49608 7ff76c329400 GetLastError _errno 49498->49608 49629 7ff76c33f8d0 19 API calls 49499->49629 49505 7ff76c353cba 49501->49505 49628 7ff76c33f8d0 19 API calls 49505->49628 49506 7ff76c353181 49506->49510 49508 7ff76c353d79 49630 7ff76c33f8d0 19 API calls 49508->49630 49510->49474 49514 7ff76c353e50 49512->49514 49513 7ff76c35454f 49514->49513 49515 7ff76c353ef2 49514->49515 49516 7ff76c353eb2 malloc 49514->49516 49517 7ff76c353ef8 malloc 49515->49517 49518 7ff76c353f43 49515->49518 49516->49513 49516->49515 49517->49513 49517->49518 49519 7ff76c353fb0 49518->49519 49520 7ff76c353f56 realloc 49518->49520 49524 7ff76c353ff5 49519->49524 49652 7ff76c33fc50 recv 49519->49652 49520->49519 49521 7ff76c353f72 49520->49521 49655 7ff76c33f8d0 19 API calls 49521->49655 49525 7ff76c35403a malloc 49524->49525 49527 7ff76c35424a 49524->49527 49535 7ff76c353f81 49524->49535 49525->49513 49526 7ff76c3540d7 memmove 49525->49526 49528 7ff76c3540f7 free 49526->49528 49526->49535 49656 7ff76c33f8d0 19 API calls 49527->49656 49534 7ff76c354169 49528->49534 49528->49535 49529 7ff76c3784d0 8 API calls 49530 7ff76c353f9d 49529->49530 49530->49427 49532 7ff76c354265 49532->49535 49536 7ff76c3544dc 49534->49536 49537 7ff76c35428d 49534->49537 49543 7ff76c354188 49534->49543 49535->49529 49536->49535 49538 7ff76c329400 22 API calls 49536->49538 49540 7ff76c3542d4 49537->49540 49541 7ff76c354296 49537->49541 49539 7ff76c3544ff 49538->49539 49665 7ff76c33f8d0 19 API calls 49539->49665 49542 7ff76c329400 22 API calls 49540->49542 49541->49536 49545 7ff76c3542a3 49541->49545 49546 7ff76c3542eb 49542->49546 49547 7ff76c340190 48 API calls 49543->49547 49549 7ff76c3541f4 49543->49549 49552 7ff76c354302 49543->49552 49548 7ff76c329400 22 API calls 49545->49548 49658 7ff76c33f8d0 19 API calls 49546->49658 49547->49543 49551 7ff76c3542b8 49548->49551 49554 7ff76c354220 memmove 49549->49554 49559 7ff76c354328 49549->49559 49657 7ff76c33f8d0 19 API calls 49551->49657 49659 7ff76c33f8d0 19 API calls 49552->49659 49554->49527 49554->49559 49556 7ff76c3544b0 49556->49535 49557 7ff76c3544cb 49556->49557 49664 7ff76c36ed20 91 API calls 49557->49664 49559->49535 49559->49556 49560 7ff76c354483 49559->49560 49561 7ff76c3543d9 49559->49561 49562 7ff76c329400 22 API calls 49560->49562 49563 7ff76c35444b 49561->49563 49567 7ff76c3543e7 memset 49561->49567 49564 7ff76c354497 49562->49564 49565 7ff76c35445a CertFreeCertificateContext 49563->49565 49566 7ff76c354460 49563->49566 49663 7ff76c33f8d0 19 API calls 49564->49663 49565->49566 49566->49556 49569 7ff76c354464 49566->49569 49570 7ff76c35440c 49567->49570 49662 7ff76c33f8d0 19 API calls 49569->49662 49570->49563 49573 7ff76c35441c 49570->49573 49576 7ff76c354436 49570->49576 49571 7ff76c3544a9 49571->49563 49573->49576 49660 7ff76c339040 251 API calls 49573->49660 49576->49563 49661 7ff76c33f8d0 19 API calls 49576->49661 49577->49424 49578->49424 49579->49418 49581 7ff76c34277d 49580->49581 49582 7ff76c34282f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 49581->49582 49583 7ff76c342795 49581->49583 49584 7ff76c342872 VerSetConditionMask 49582->49584 49585 7ff76c342884 VerifyVersionInfoA 49582->49585 49586 7ff76c3784d0 8 API calls 49583->49586 49584->49585 49585->49583 49587 7ff76c3428bb 49586->49587 49587->49461 49587->49462 49589 7ff76c350c9c 49588->49589 49594 7ff76c350cc6 49588->49594 49590 7ff76c350ca1 _errno 49589->49590 49599 7ff76c350cb7 49589->49599 49590->49475 49591 7ff76c350d87 49591->49475 49592 7ff76c350d20 strchr 49592->49594 49593 7ff76c350e30 strchr 49596 7ff76c350e50 strchr 49593->49596 49593->49599 49594->49591 49594->49592 49595 7ff76c3784d0 8 API calls 49597 7ff76c350f96 49595->49597 49596->49599 49597->49475 49598 7ff76c350f45 49601 7ff76c350edd 49598->49601 49631 7ff76c350ce0 strchr 49598->49631 49599->49593 49599->49598 49599->49601 49601->49595 49632 7ff76c33fe30 49602->49632 49605->49506 49606->49506 49607->49510 49612 7ff76c329445 49608->49612 49626 7ff76c32943e 49608->49626 49609 7ff76c3784d0 8 API calls 49611 7ff76c3299e3 49609->49611 49610 7ff76c329469 49613 7ff76c32e190 13 API calls 49610->49613 49627 7ff76c33f8d0 19 API calls 49611->49627 49612->49610 49614 7ff76c329933 49612->49614 49615 7ff76c3294a7 FormatMessageA strchr 49613->49615 49616 7ff76c32e190 13 API calls 49614->49616 49617 7ff76c32950e 49615->49617 49618 7ff76c32994b 49616->49618 49619 7ff76c329997 strncpy 49617->49619 49620 7ff76c329974 49617->49620 49621 7ff76c3299aa _errno 49618->49621 49619->49621 49622 7ff76c32e190 13 API calls 49620->49622 49623 7ff76c3299be GetLastError 49621->49623 49624 7ff76c3299b5 _errno 49621->49624 49622->49618 49625 7ff76c3299c8 SetLastError 49623->49625 49623->49626 49624->49623 49625->49626 49626->49609 49627->49506 49628->49506 49629->49506 49630->49510 49631->49601 49633 7ff76c33ff37 send 49632->49633 49634 7ff76c33fe9f 49632->49634 49635 7ff76c33ff55 WSAGetLastError 49633->49635 49636 7ff76c33ff64 49633->49636 49634->49633 49639 7ff76c34f370 19 API calls 49634->49639 49635->49636 49637 7ff76c33ff70 49635->49637 49640 7ff76c3784d0 8 API calls 49636->49640 49650 7ff76c329bf0 27 API calls 49637->49650 49644 7ff76c33fed3 49639->49644 49642 7ff76c33ffb7 49640->49642 49641 7ff76c33ff82 49651 7ff76c33f8d0 19 API calls 49641->49651 49642->49508 49642->49510 49644->49633 49646 7ff76c33fedc 49644->49646 49645 7ff76c33ff94 49645->49636 49647 7ff76c33ff10 recv 49646->49647 49648 7ff76c33fee4 malloc 49646->49648 49647->49633 49649 7ff76c33ff2d 49647->49649 49648->49647 49648->49649 49649->49633 49650->49641 49651->49645 49653 7ff76c33fc6b WSAGetLastError 49652->49653 49654 7ff76c33fc92 49652->49654 49653->49524 49654->49524 49655->49535 49656->49532 49657->49532 49658->49532 49659->49532 49660->49576 49661->49563 49662->49532 49663->49571 49664->49532 49665->49532 49666->49441 49667->49441 49668->49448 49669->49204 49670->49210 49671 7ff76c3316db 49672 7ff76c3316ee 49671->49672 49673 7ff76c3317a7 49672->49673 49674 7ff76c344a60 397 API calls 49672->49674 49676 7ff76c3316f6 49672->49676 49675 7ff76c331733 49673->49675 49673->49676 49679 7ff76c33172d 49674->49679 49678 7ff76c330c60 292 API calls 49675->49678 49680 7ff76c3311db 49676->49680 49747 7ff76c344910 free 49676->49747 49678->49680 49679->49673 49679->49675 49679->49676 49694 7ff76c34a660 49679->49694 49681 7ff76c332400 17 API calls 49680->49681 49683 7ff76c332273 49680->49683 49685 7ff76c332282 49680->49685 49688 7ff76c341150 10 API calls 49680->49688 49690 7ff76c33127e 49680->49690 49712 7ff76c33f8d0 19 API calls 49680->49712 49713 7ff76c330c60 49680->49713 49748 7ff76c33b390 49680->49748 49772 7ff76c32f980 15 API calls 49680->49772 49773 7ff76c34e570 22 API calls 49680->49773 49681->49680 49774 7ff76c33f8d0 19 API calls 49683->49774 49688->49680 49689 7ff76c33f8d0 19 API calls 49689->49690 49690->49680 49690->49689 49695 7ff76c34a68c 49694->49695 49696 7ff76c344a60 397 API calls 49695->49696 49699 7ff76c34a696 49696->49699 49697 7ff76c3784d0 8 API calls 49698 7ff76c34a7f2 49697->49698 49698->49673 49700 7ff76c34a7ac 49699->49700 49701 7ff76c34a6e7 49699->49701 49704 7ff76c34a7c6 49699->49704 49702 7ff76c339ad0 251 API calls 49700->49702 49700->49704 49703 7ff76c32e190 13 API calls 49701->49703 49702->49704 49705 7ff76c34a758 calloc 49703->49705 49704->49697 49706 7ff76c34a777 49705->49706 49707 7ff76c34a770 49705->49707 49775 7ff76c34acf0 25 API calls 49706->49775 49707->49704 49709 7ff76c34a786 49709->49704 49776 7ff76c34aaa0 8 API calls 49709->49776 49711 7ff76c34a7a8 49711->49700 49711->49704 49712->49680 49714 7ff76c330c9c 49713->49714 49723 7ff76c330d72 49713->49723 49777 7ff76c334eb0 49714->49777 49716 7ff76c330ca7 free free 49718 7ff76c330cd7 49716->49718 49717 7ff76c3784d0 8 API calls 49719 7ff76c330da7 49717->49719 49720 7ff76c330d15 49718->49720 49805 7ff76c34e050 22 API calls 49718->49805 49719->49680 49795 7ff76c332400 49720->49795 49723->49717 49724 7ff76c330ddc 49799 7ff76c3478b0 49724->49799 49725 7ff76c330d2f 49725->49723 49725->49724 49806 7ff76c348270 free free free free 49725->49806 49729 7ff76c330e0b 49730 7ff76c330e10 free 49729->49730 49730->49730 49731 7ff76c330e2e 49730->49731 49732 7ff76c330f5b 49731->49732 49733 7ff76c330e97 49731->49733 49735 7ff76c33b390 90 API calls 49732->49735 49734 7ff76c32e190 13 API calls 49733->49734 49738 7ff76c330ef6 49734->49738 49736 7ff76c330f8d 49735->49736 49810 7ff76c33b510 292 API calls 49736->49810 49807 7ff76c3386a0 92 API calls 49738->49807 49740 7ff76c330f17 49741 7ff76c330f1b 49740->49741 49742 7ff76c330f45 49740->49742 49744 7ff76c33fa50 15 API calls 49741->49744 49809 7ff76c33b510 292 API calls 49742->49809 49745 7ff76c330f36 49744->49745 49808 7ff76c33b510 292 API calls 49745->49808 49747->49680 49749 7ff76c33b4cc 49748->49749 49751 7ff76c33b3b2 49748->49751 49749->49680 49750 7ff76c33b3df 49753 7ff76c3478b0 9 API calls 49750->49753 49751->49749 49751->49750 49819 7ff76c348270 free free free free 49751->49819 49754 7ff76c33b3f2 49753->49754 49816 7ff76c369f60 49754->49816 49756 7ff76c33b3fa 49757 7ff76c369b70 7 API calls 49756->49757 49758 7ff76c33b402 49757->49758 49759 7ff76c33fa50 15 API calls 49758->49759 49760 7ff76c33b443 49759->49760 49761 7ff76c334b60 16 API calls 49760->49761 49762 7ff76c33b44b 49761->49762 49763 7ff76c33b477 49762->49763 49765 7ff76c340530 closesocket free 49762->49765 49764 7ff76c33b48c 49763->49764 49766 7ff76c340530 closesocket free 49763->49766 49767 7ff76c33b4a1 49764->49767 49768 7ff76c340530 closesocket free 49764->49768 49765->49763 49766->49764 49769 7ff76c33b4b6 49767->49769 49770 7ff76c340530 closesocket free 49767->49770 49768->49767 49771 7ff76c33c510 44 API calls 49769->49771 49770->49769 49771->49749 49772->49680 49773->49680 49774->49685 49775->49709 49776->49711 49778 7ff76c334ed7 49777->49778 49779 7ff76c334ec5 49777->49779 49782 7ff76c334fe8 EnterCriticalSection LeaveCriticalSection 49778->49782 49783 7ff76c335074 free 49778->49783 49779->49778 49780 7ff76c334ecb 49779->49780 49811 7ff76c352130 WaitForSingleObjectEx CloseHandle 49780->49811 49784 7ff76c33502b 49782->49784 49785 7ff76c335021 CloseHandle 49782->49785 49783->49716 49787 7ff76c335039 49784->49787 49788 7ff76c335031 49784->49788 49792 7ff76c33504c 49785->49792 49786 7ff76c334ed0 49786->49778 49813 7ff76c335090 7 API calls 49787->49813 49812 7ff76c352130 WaitForSingleObjectEx CloseHandle 49788->49812 49791 7ff76c335061 closesocket 49791->49783 49792->49791 49814 7ff76c32fa60 free 49792->49814 49793 7ff76c335042 free 49793->49792 49796 7ff76c332450 49795->49796 49797 7ff76c332417 49795->49797 49796->49725 49815 7ff76c32f750 17 API calls 49797->49815 49802 7ff76c3478d1 49799->49802 49804 7ff76c34792a 49799->49804 49800 7ff76c3784d0 8 API calls 49801 7ff76c330deb free 49800->49801 49801->49729 49801->49731 49803 7ff76c3478f3 _time64 49802->49803 49802->49804 49803->49804 49804->49800 49805->49720 49806->49724 49807->49740 49811->49786 49812->49787 49813->49793 49814->49791 49815->49796 49820 7ff76c36d4e0 8 API calls 49816->49820 49818 7ff76c369f75 49819->49750 49820->49818 49821 7ff76c33139c 49822 7ff76c34e420 2 API calls 49821->49822 49823 7ff76c3313a9 49822->49823 49824 7ff76c3313c5 49823->49824 49879 7ff76c32f750 17 API calls 49823->49879 49826 7ff76c3313e1 49824->49826 49880 7ff76c32f750 17 API calls 49824->49880 49848 7ff76c33b0f0 free free 49826->49848 49829 7ff76c3313f1 49830 7ff76c33fa50 15 API calls 49829->49830 49833 7ff76c331447 49829->49833 49845 7ff76c3311db 49829->49845 49831 7ff76c33143b 49830->49831 49832 7ff76c332400 17 API calls 49831->49832 49832->49833 49833->49845 49881 7ff76c344910 free 49833->49881 49836 7ff76c332282 49837 7ff76c332273 49884 7ff76c33f8d0 19 API calls 49837->49884 49839 7ff76c332400 17 API calls 49839->49845 49840 7ff76c33b390 90 API calls 49840->49845 49842 7ff76c341150 10 API calls 49842->49845 49843 7ff76c33f8d0 19 API calls 49844 7ff76c33127e 49843->49844 49844->49843 49844->49845 49845->49836 49845->49837 49845->49839 49845->49840 49845->49842 49845->49844 49847 7ff76c330c60 292 API calls 49845->49847 49878 7ff76c33f8d0 19 API calls 49845->49878 49882 7ff76c32f980 15 API calls 49845->49882 49883 7ff76c34e570 22 API calls 49845->49883 49847->49845 49885 7ff76c33aed0 49848->49885 49851 7ff76c33aed0 292 API calls 49852 7ff76c33b156 memset 49851->49852 49918 7ff76c33c880 49852->49918 49855 7ff76c33b390 90 API calls 49857 7ff76c33b19d 49855->49857 49856 7ff76c34e420 2 API calls 49858 7ff76c33b1bf 49856->49858 49857->49829 49858->49857 49859 7ff76c33b1eb free 49858->49859 49863 7ff76c33b212 49858->49863 50008 7ff76c32e0c0 15 API calls 49859->50008 49860 7ff76c346b40 2 API calls 49862 7ff76c33b260 49860->49862 49865 7ff76c33b29d 49862->49865 49866 7ff76c33b274 49862->49866 49863->49860 49864 7ff76c33b21e 49863->49864 49864->49855 49864->49857 49868 7ff76c34e420 2 API calls 49865->49868 50009 7ff76c3406e0 49866->50009 49869 7ff76c33b2aa 49868->49869 49873 7ff76c33b2cd 49869->49873 49874 7ff76c34e420 2 API calls 49869->49874 49871 7ff76c33b357 49872 7ff76c346b40 2 API calls 49871->49872 49872->49857 49875 7ff76c341260 47 API calls 49873->49875 49874->49873 49876 7ff76c33b2e7 49875->49876 49876->49871 49877 7ff76c33fa50 15 API calls 49876->49877 49877->49871 49878->49845 49879->49824 49880->49826 49881->49845 49882->49845 49883->49845 49884->49836 49886 7ff76c33b0db 49885->49886 49887 7ff76c33aedf 49885->49887 49886->49851 49887->49886 50020 7ff76c32f980 15 API calls 49887->50020 49889 7ff76c33aefd 49890 7ff76c33af11 49889->49890 50021 7ff76c330890 292 API calls 49889->50021 49892 7ff76c33af22 49890->49892 50022 7ff76c330580 292 API calls 49890->50022 49894 7ff76c33af46 free 49892->49894 49895 7ff76c33af53 49892->49895 49894->49895 50023 7ff76c33b510 292 API calls 49895->50023 49919 7ff76c33c8c5 49918->49919 50007 7ff76c33c8e9 49919->50007 50024 7ff76c33c080 calloc 49919->50024 49921 7ff76c33c8fb 49921->50007 50039 7ff76c33e4f0 49921->50039 49922 7ff76c3784d0 8 API calls 49923 7ff76c33b185 49922->49923 49923->49856 49923->49857 49923->49864 49926 7ff76c33c932 _strdup 49927 7ff76c33c944 49926->49927 49926->50007 49928 7ff76c33c950 _strdup 49927->49928 49929 7ff76c33c962 49927->49929 49928->49929 49928->50007 50089 7ff76c33d290 49929->50089 49933 7ff76c32e190 13 API calls 49934 7ff76c33c9d5 49933->49934 49934->50007 50148 7ff76c33dae0 49934->50148 49935 7ff76c33ca27 49936 7ff76c33ca6c _strdup 49935->49936 49937 7ff76c33ca82 49935->49937 49935->50007 49936->49937 49936->50007 49938 7ff76c33ca8c _strdup 49937->49938 49939 7ff76c33caa5 49937->49939 49938->49939 49938->50007 50164 7ff76c33df50 49939->50164 49944 7ff76c33caf2 49946 7ff76c33cb14 49944->49946 49947 7ff76c33b620 38 API calls 49944->49947 49944->50007 49945 7ff76c33b620 38 API calls 49945->49944 49948 7ff76c33b620 38 API calls 49946->49948 49949 7ff76c33cb36 49946->49949 49946->50007 49947->49946 49948->49949 49950 7ff76c33cccf 49949->49950 49954 7ff76c33cc34 49949->49954 49949->50007 50186 7ff76c338e00 49950->50186 49952 7ff76c33ce6a 49953 7ff76c338e00 8 API calls 49952->49953 49952->50007 49955 7ff76c33ce81 49953->49955 49956 7ff76c33ccbf 49954->49956 49957 7ff76c33cc54 49954->49957 49955->50007 50210 7ff76c33e9b0 49955->50210 49959 7ff76c33b6f0 2 API calls 49956->49959 50266 7ff76c337d40 17 API calls 49957->50266 49959->50007 49960 7ff76c33cc6a 49963 7ff76c33f420 17 API calls 49960->49963 49960->50007 49965 7ff76c33cc7c 49963->49965 49969 7ff76c33cc82 49965->49969 50267 7ff76c345d30 17 API calls 49965->50267 49966 7ff76c33ced9 49970 7ff76c33cee1 49966->49970 49971 7ff76c33cf74 49966->49971 49967 7ff76c33d021 49972 7ff76c33fa50 15 API calls 49967->49972 49969->50007 50269 7ff76c33f0d0 34 API calls 49970->50269 49971->49967 50270 7ff76c3382e0 13 API calls 49971->50270 49973 7ff76c33d030 49972->49973 50272 7ff76c33c510 44 API calls 49973->50272 49976 7ff76c33cef1 free free 49978 7ff76c33cf18 49976->49978 49981 7ff76c33fa50 15 API calls 49978->49981 49979 7ff76c33cfc6 49987 7ff76c33d00b 49979->49987 50271 7ff76c338090 QueryPerformanceCounter GetTickCount 49979->50271 49985 7ff76c33cf6f 49981->49985 49982 7ff76c33d0ac 50274 7ff76c337d40 17 API calls 49982->50274 49984 7ff76c33cfed 49990 7ff76c33d00d 49984->49990 49991 7ff76c33d000 49984->49991 50229 7ff76c33b6f0 49985->50229 49987->49982 50273 7ff76c338160 QueryPerformanceCounter GetTickCount 49987->50273 49988 7ff76c33d12b 50233 7ff76c33f420 49988->50233 49989 7ff76c33d0e1 49989->49985 50004 7ff76c33fa50 15 API calls 49989->50004 49996 7ff76c33fa50 15 API calls 49990->49996 49995 7ff76c33b390 90 API calls 49991->49995 49994 7ff76c33d0bb 49994->49989 50001 7ff76c33fa50 15 API calls 49994->50001 49994->50007 49995->49987 49996->49967 49997 7ff76c33d095 49998 7ff76c33d27b 49997->49998 49999 7ff76c33d0a1 49997->49999 50003 7ff76c33fa50 15 API calls 49998->50003 50002 7ff76c33b390 90 API calls 49999->50002 50000 7ff76c33d133 50000->50007 50242 7ff76c33ee50 50000->50242 50001->49989 50002->49982 50003->49967 50006 7ff76c33d10f 50004->50006 50006->49985 50007->49922 50008->49863 50010 7ff76c346b40 2 API calls 50009->50010 50011 7ff76c340703 50010->50011 50012 7ff76c34077b 50011->50012 50019 7ff76c340794 50011->50019 50411 7ff76c33f8d0 19 API calls 50012->50411 50014 7ff76c34078a 50015 7ff76c33b28a 50014->50015 50015->49864 50015->49871 50016 7ff76c34089d 50016->50015 50412 7ff76c32f750 17 API calls 50016->50412 50019->50016 50346 7ff76c341c20 50019->50346 50020->49889 50021->49890 50022->49892 50025 7ff76c33c0b0 calloc 50024->50025 50026 7ff76c33c0a5 50024->50026 50027 7ff76c33c0da 50025->50027 50028 7ff76c33c321 free 50025->50028 50026->49921 50029 7ff76c346b40 2 API calls 50027->50029 50028->49921 50030 7ff76c33c171 50029->50030 50031 7ff76c346b40 2 API calls 50030->50031 50032 7ff76c33c185 50031->50032 50033 7ff76c33c2e7 _strdup 50032->50033 50034 7ff76c33c35d 50032->50034 50033->50034 50036 7ff76c33c2f9 50033->50036 50035 7ff76c346b40 2 API calls 50034->50035 50037 7ff76c33c39d 50035->50037 50038 7ff76c33c307 free free 50036->50038 50037->49921 50038->50028 50275 7ff76c33f4d0 8 API calls 50039->50275 50042 7ff76c33e517 50279 7ff76c367890 calloc 50042->50279 50043 7ff76c33e510 50278 7ff76c3678d0 23 API calls 50043->50278 50046 7ff76c33e515 50047 7ff76c33e51c 50046->50047 50052 7ff76c33e592 50047->50052 50084 7ff76c33c91c 50047->50084 50280 7ff76c367500 tolower 50047->50280 50048 7ff76c33e655 50283 7ff76c367a10 8 API calls 50048->50283 50051 7ff76c33e55f 50051->50052 50053 7ff76c33e578 50051->50053 50054 7ff76c33e56b free 50051->50054 50052->50048 50052->50084 50282 7ff76c367a10 8 API calls 50052->50282 50281 7ff76c32e0c0 15 API calls 50053->50281 50054->50053 50057 7ff76c33e6bc 50284 7ff76c33f8d0 19 API calls 50057->50284 50058 7ff76c33e63c 50058->50048 50061 7ff76c33e648 free 50058->50061 50058->50084 50060 7ff76c33e6ce 50060->50084 50061->50048 50062 7ff76c33e67e 50062->50057 50063 7ff76c33e6f4 50062->50063 50062->50084 50285 7ff76c367a10 8 API calls 50063->50285 50065 7ff76c33e71b 50066 7ff76c33e725 _strdup 50065->50066 50067 7ff76c33e742 50065->50067 50066->50067 50066->50084 50067->50084 50286 7ff76c367a10 8 API calls 50067->50286 50069 7ff76c33e765 50070 7ff76c33e788 50069->50070 50071 7ff76c33e76f _strdup 50069->50071 50070->50084 50287 7ff76c367a10 8 API calls 50070->50287 50071->50070 50071->50084 50073 7ff76c33e7a8 50074 7ff76c33e83d 50073->50074 50075 7ff76c33e7b2 _strdup 50073->50075 50074->50084 50288 7ff76c367a10 8 API calls 50074->50288 50075->50074 50075->50084 50077 7ff76c33e858 50077->50084 50289 7ff76c367a10 8 API calls 50077->50289 50079 7ff76c33e88d 50079->50084 50290 7ff76c367a10 8 API calls 50079->50290 50081 7ff76c33e8d1 50082 7ff76c33e8f1 strtoul 50081->50082 50083 7ff76c33e8d5 50081->50083 50082->50083 50083->50084 50291 7ff76c367a10 8 API calls 50083->50291 50084->49926 50084->49927 50084->50007 50086 7ff76c33e96d _strdup 50086->50084 50087 7ff76c33e930 50087->50086 50087->50087 50292 7ff76c33f5a0 20 API calls 50087->50292 50090 7ff76c33d3ad 50089->50090 50091 7ff76c33d2dd memset memset 50089->50091 50092 7ff76c33d3b9 _strdup 50090->50092 50093 7ff76c33d3e0 50090->50093 50094 7ff76c33d328 50091->50094 50095 7ff76c33d310 strncpy 50091->50095 50092->50093 50096 7ff76c33d3c7 50092->50096 50097 7ff76c33d3ec _strdup 50093->50097 50098 7ff76c33d3ff 50093->50098 50099 7ff76c33d34f 50094->50099 50100 7ff76c33d334 strncpy 50094->50100 50095->50094 50301 7ff76c33f8d0 19 API calls 50096->50301 50097->50096 50097->50098 50126 7ff76c33d45e 50098->50126 50302 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50098->50302 50299 7ff76c355410 malloc strtoul free 50099->50299 50100->50099 50103 7ff76c33d3d6 50106 7ff76c33d907 free free 50103->50106 50105 7ff76c33d36f 50108 7ff76c33d39c 50105->50108 50300 7ff76c355410 malloc strtoul free 50105->50300 50109 7ff76c3784d0 8 API calls 50106->50109 50107 7ff76c33d420 50110 7ff76c33d43c 50107->50110 50303 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50107->50303 50108->50090 50108->50106 50113 7ff76c33c977 50109->50113 50117 7ff76c33fa50 15 API calls 50110->50117 50110->50126 50112 7ff76c33d6c1 free 50114 7ff76c33d6fe 50112->50114 50115 7ff76c33d6d1 50112->50115 50113->49933 50113->49934 50113->50007 50122 7ff76c33d728 50114->50122 50127 7ff76c33d718 free 50114->50127 50115->50114 50121 7ff76c33d6f2 free 50115->50121 50117->50126 50118 7ff76c33d609 50304 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50118->50304 50119 7ff76c33d5b6 50119->50112 50119->50118 50123 7ff76c33d5f0 tolower 50119->50123 50120 7ff76c33d744 free free free 50133 7ff76c33d737 50120->50133 50121->50114 50124 7ff76c33d72d 50122->50124 50308 7ff76c33e1a0 47 API calls 50122->50308 50123->50118 50123->50123 50124->50133 50143 7ff76c33d7e1 50124->50143 50309 7ff76c33e1a0 47 API calls 50124->50309 50126->50119 50126->50120 50126->50126 50131 7ff76c33d4ce strchr 50126->50131 50147 7ff76c33d4e7 50126->50147 50127->50122 50129 7ff76c33d66c 50135 7ff76c33d69f 50129->50135 50306 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50129->50306 50130 7ff76c33d78f free 50130->50124 50130->50133 50131->50119 50131->50147 50133->50106 50134 7ff76c33d7c3 free 50134->50133 50134->50143 50136 7ff76c33fa50 15 API calls 50135->50136 50139 7ff76c33d6bc 50135->50139 50136->50139 50138 7ff76c33d688 50138->50135 50307 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50138->50307 50139->50112 50140 7ff76c33d630 50140->50129 50305 7ff76c3552d0 realloc GetEnvironmentVariableA realloc free 50140->50305 50141 7ff76c33d510 strchr 50141->50147 50143->50133 50146 7ff76c33d857 free 50143->50146 50144 7ff76c33d540 strchr 50144->50147 50146->50133 50147->50119 50147->50120 50147->50141 50147->50144 50149 7ff76c33db11 50148->50149 50157 7ff76c33db44 50148->50157 50152 7ff76c33db30 50149->50152 50153 7ff76c33db24 free 50149->50153 50149->50157 50150 7ff76c33db59 free _strdup 50151 7ff76c33db7b 50150->50151 50162 7ff76c33dc78 50150->50162 50154 7ff76c33dbb1 50151->50154 50155 7ff76c33db8f free _strdup 50151->50155 50156 7ff76c33db38 free 50152->50156 50152->50157 50153->50152 50158 7ff76c33dbc5 free _strdup 50154->50158 50159 7ff76c33dbef 50154->50159 50155->50154 50155->50162 50156->50157 50157->50150 50157->50151 50158->50159 50158->50162 50159->50162 50310 7ff76c369680 36 API calls 50159->50310 50161 7ff76c33dc5e 50161->50162 50163 7ff76c33fa50 15 API calls 50161->50163 50162->49935 50163->50162 50171 7ff76c33df80 50164->50171 50165 7ff76c33cab7 50165->50007 50174 7ff76c33b620 50165->50174 50167 7ff76c33e058 strchr 50168 7ff76c33e06d strtol 50167->50168 50167->50171 50168->50171 50170 7ff76c33e0fa free 50170->50171 50171->50165 50171->50167 50171->50170 50172 7ff76c33e027 free 50171->50172 50173 7ff76c33fa50 15 API calls 50171->50173 50311 7ff76c32e0c0 15 API calls 50171->50311 50312 7ff76c33dd50 22 API calls 50171->50312 50172->50170 50172->50171 50173->50171 50176 7ff76c33b655 50174->50176 50180 7ff76c33b66f 50174->50180 50175 7ff76c3784d0 8 API calls 50177 7ff76c33b681 50175->50177 50176->50180 50313 7ff76c3695d0 18 API calls 50176->50313 50177->49944 50177->49945 50177->50007 50179 7ff76c33b6a8 50179->50180 50181 7ff76c33b6bb GetLastError 50179->50181 50180->50175 50314 7ff76c329d30 21 API calls 50181->50314 50183 7ff76c33b6d3 50315 7ff76c33f8d0 19 API calls 50183->50315 50185 7ff76c33b6e9 50185->50180 50187 7ff76c338e46 _strdup 50186->50187 50188 7ff76c338e65 50186->50188 50187->50188 50189 7ff76c338e55 50187->50189 50190 7ff76c338e72 _strdup 50188->50190 50191 7ff76c338e91 50188->50191 50189->49952 50190->50191 50192 7ff76c338e81 50190->50192 50193 7ff76c338e9e _strdup 50191->50193 50194 7ff76c338ebd 50191->50194 50192->49952 50193->50194 50195 7ff76c338ead 50193->50195 50196 7ff76c338eca _strdup 50194->50196 50198 7ff76c338ee9 50194->50198 50195->49952 50197 7ff76c338ed9 50196->50197 50196->50198 50197->49952 50199 7ff76c338ef6 _strdup 50198->50199 50200 7ff76c338f15 50198->50200 50199->50200 50201 7ff76c338f05 50199->50201 50202 7ff76c338f22 _strdup 50200->50202 50203 7ff76c338f41 50200->50203 50201->49952 50202->50203 50204 7ff76c338f31 50202->50204 50205 7ff76c338f4e _strdup 50203->50205 50206 7ff76c338f6d 50203->50206 50204->49952 50205->50206 50207 7ff76c338f5d 50205->50207 50208 7ff76c338f7a _strdup 50206->50208 50209 7ff76c338f89 50206->50209 50207->49952 50208->50209 50209->49952 50211 7ff76c346b40 2 API calls 50210->50211 50220 7ff76c33e9c3 50211->50220 50212 7ff76c33ce97 50212->49971 50268 7ff76c33a560 15 API calls 50212->50268 50214 7ff76c3478b0 9 API calls 50214->50220 50215 7ff76c369f60 8 API calls 50215->50220 50217 7ff76c33fa50 15 API calls 50217->50220 50219 7ff76c340530 closesocket free 50219->50220 50220->50212 50220->50214 50220->50215 50220->50217 50220->50219 50221 7ff76c33eb36 30 API calls 50220->50221 50316 7ff76c348270 free free free free 50220->50316 50317 7ff76c369b70 50220->50317 50320 7ff76c334b60 50220->50320 50334 7ff76c33c800 free free 50221->50334 50223 7ff76c33ed96 50224 7ff76c33eda4 free 50223->50224 50335 7ff76c338fb0 8 API calls 50224->50335 50226 7ff76c33edc4 50336 7ff76c338fb0 8 API calls 50226->50336 50228 7ff76c33edd0 free free free 50228->50220 50230 7ff76c33b6fe 50229->50230 50231 7ff76c346b40 2 API calls 50230->50231 50232 7ff76c33b768 50231->50232 50232->49988 50234 7ff76c33f43c 50233->50234 50235 7ff76c33f445 50234->50235 50236 7ff76c33f45e free 50234->50236 50237 7ff76c33f472 50234->50237 50235->50000 50236->50237 50238 7ff76c33f477 50237->50238 50239 7ff76c33f485 _strdup 50237->50239 50341 7ff76c32e0c0 15 API calls 50238->50341 50241 7ff76c33f483 50239->50241 50241->50000 50243 7ff76c341150 10 API calls 50242->50243 50244 7ff76c33ee75 50243->50244 50245 7ff76c33ee97 calloc 50244->50245 50246 7ff76c33ef3c 50244->50246 50251 7ff76c33ee80 50244->50251 50247 7ff76c33eeb7 50245->50247 50248 7ff76c33eeaf 50245->50248 50249 7ff76c33ef48 _strdup 50246->50249 50250 7ff76c33effd _strdup 50246->50250 50342 7ff76c351f20 6 API calls 50247->50342 50248->50251 50253 7ff76c33f02a 50249->50253 50261 7ff76c33ef95 50249->50261 50250->50253 50258 7ff76c33f040 50250->50258 50251->50007 50253->50007 50254 7ff76c33eed0 50254->50248 50256 7ff76c33ef23 free 50254->50256 50257 7ff76c33eef3 50254->50257 50256->50251 50343 7ff76c33f8d0 19 API calls 50257->50343 50258->50251 50260 7ff76c33f079 50258->50260 50345 7ff76c33f8d0 19 API calls 50260->50345 50261->50251 50264 7ff76c33efce 50261->50264 50262 7ff76c33ef05 free 50262->50251 50344 7ff76c33f8d0 19 API calls 50264->50344 50266->49960 50267->49956 50268->49966 50269->49976 50270->49979 50271->49984 50272->50007 50273->49997 50274->49994 50293 7ff76c3678a0 50275->50293 50278->50046 50280->50051 50281->50052 50282->50058 50283->50062 50284->50060 50285->50065 50286->50069 50287->50073 50288->50077 50289->50079 50290->50081 50291->50087 50292->50086 50294 7ff76c3678a5 50293->50294 50295 7ff76c33e504 50293->50295 50298 7ff76c368880 12 API calls 50294->50298 50295->50042 50295->50043 50299->50105 50300->50108 50301->50103 50302->50107 50303->50110 50304->50140 50305->50129 50306->50138 50307->50135 50308->50130 50309->50134 50310->50161 50311->50171 50312->50171 50313->50179 50314->50183 50315->50185 50316->50220 50337 7ff76c36da90 7 API calls 50317->50337 50319 7ff76c369b8e 50321 7ff76c334fd0 50320->50321 50322 7ff76c334fe8 EnterCriticalSection LeaveCriticalSection 50321->50322 50323 7ff76c335074 free 50321->50323 50324 7ff76c33502b 50322->50324 50325 7ff76c335021 CloseHandle 50322->50325 50323->50220 50326 7ff76c335039 50324->50326 50327 7ff76c335031 50324->50327 50331 7ff76c33504c 50325->50331 50339 7ff76c335090 7 API calls 50326->50339 50338 7ff76c352130 WaitForSingleObjectEx CloseHandle 50327->50338 50330 7ff76c335061 closesocket 50330->50323 50331->50330 50340 7ff76c32fa60 free 50331->50340 50332 7ff76c335042 free 50332->50331 50334->50223 50335->50226 50336->50228 50337->50319 50338->50326 50339->50332 50340->50330 50341->50241 50342->50254 50343->50262 50344->50248 50345->50248 50347 7ff76c341c8f memmove 50346->50347 50349 7ff76c341cf8 socket 50347->50349 50351 7ff76c341ccb 50347->50351 50349->50351 50350 7ff76c3784d0 8 API calls 50353 7ff76c3421cb 50350->50353 50355 7ff76c341d37 50351->50355 50404 7ff76c342054 50351->50404 50433 7ff76c34e020 ioctlsocket 50351->50433 50353->50019 50354 7ff76c34215a _errno _errno _errno 50438 7ff76c329bf0 27 API calls 50354->50438 50355->50354 50413 7ff76c36a410 50355->50413 50358 7ff76c341d84 50358->50354 50360 7ff76c341d8d htons 50358->50360 50359 7ff76c34218b 50439 7ff76c33f8d0 19 API calls 50359->50439 50362 7ff76c33fa50 15 API calls 50360->50362 50365 7ff76c341dae 50362->50365 50363 7ff76c3421a0 50364 7ff76c340530 2 API calls 50363->50364 50399 7ff76c342035 50364->50399 50366 7ff76c341e29 50365->50366 50367 7ff76c341dcf setsockopt 50365->50367 50369 7ff76c342750 14 API calls 50366->50369 50373 7ff76c341e61 50366->50373 50367->50366 50368 7ff76c341dfd WSAGetLastError 50367->50368 50434 7ff76c329bf0 27 API calls 50368->50434 50369->50373 50370 7ff76c341e82 getsockopt 50374 7ff76c341ea9 50370->50374 50375 7ff76c341eb3 setsockopt 50370->50375 50371 7ff76c341e65 50378 7ff76c341eea setsockopt 50371->50378 50390 7ff76c341f29 50371->50390 50373->50370 50373->50371 50374->50371 50374->50375 50375->50371 50376 7ff76c341e17 50377 7ff76c33fa50 15 API calls 50376->50377 50377->50366 50379 7ff76c341f17 50378->50379 50381 7ff76c341f2e 50378->50381 50380 7ff76c33fa50 15 API calls 50379->50380 50380->50390 50388 7ff76c341f5c WSAIoctl 50381->50388 50382 7ff76c34205e 50432 7ff76c34e020 ioctlsocket 50382->50432 50383 7ff76c342008 50435 7ff76c341590 592 API calls 50383->50435 50385 7ff76c34206b 50387 7ff76c346b40 2 API calls 50385->50387 50391 7ff76c342075 50387->50391 50388->50390 50392 7ff76c341fa4 WSAGetLastError 50388->50392 50389 7ff76c342024 50389->50382 50393 7ff76c34202a 50389->50393 50394 7ff76c341ff7 50390->50394 50400 7ff76c342049 50390->50400 50395 7ff76c34209f 50391->50395 50436 7ff76c32f750 17 API calls 50391->50436 50396 7ff76c33fa50 15 API calls 50392->50396 50397 7ff76c340530 2 API calls 50393->50397 50394->50382 50394->50383 50402 7ff76c3420e8 WSAGetLastError 50395->50402 50403 7ff76c3420bf connect 50395->50403 50395->50404 50396->50390 50397->50399 50399->50404 50401 7ff76c340530 2 API calls 50400->50401 50401->50404 50402->50404 50405 7ff76c3420f5 50402->50405 50403->50402 50403->50404 50404->50350 50405->50404 50437 7ff76c329bf0 27 API calls 50405->50437 50407 7ff76c342111 50408 7ff76c33fa50 15 API calls 50407->50408 50409 7ff76c342127 50408->50409 50410 7ff76c340530 2 API calls 50409->50410 50410->50404 50411->50014 50412->50015 50414 7ff76c36a449 50413->50414 50415 7ff76c36a41f 50413->50415 50417 7ff76c32e190 13 API calls 50414->50417 50416 7ff76c36a424 _errno 50415->50416 50420 7ff76c36a437 50415->50420 50416->50358 50419 7ff76c36a4b8 50417->50419 50418 7ff76c36a504 _errno 50422 7ff76c36a4d7 50418->50422 50419->50418 50419->50422 50424 7ff76c32e190 13 API calls 50420->50424 50425 7ff76c36a7aa 50420->50425 50427 7ff76c36a730 50420->50427 50421 7ff76c3784d0 8 API calls 50423 7ff76c36a51f 50421->50423 50422->50421 50423->50358 50424->50420 50440 7ff76c36a460 14 API calls 50425->50440 50428 7ff76c36a759 50427->50428 50429 7ff76c36a7c3 _errno 50427->50429 50430 7ff76c3784d0 8 API calls 50428->50430 50429->50428 50431 7ff76c36a797 50430->50431 50431->50358 50432->50385 50433->50355 50434->50376 50435->50389 50436->50395 50437->50407 50438->50359 50439->50363 50440->50427 50441 7ff76c325740 50442 7ff76c325790 50441->50442 50442->50442 50463 7ff76c3201f0 GetModuleHandleW 50442->50463 50444 7ff76c3201f0 21 API calls 50462 7ff76c3257af 50444->50462 50445 7ff76c325822 GetCurrentProcess OpenProcessToken 50446 7ff76c32584d GetTokenInformation malloc 50445->50446 50445->50462 50448 7ff76c32587f GetTokenInformation 50446->50448 50446->50462 50447 7ff76c32594d CloseHandle 50447->50462 50449 7ff76c32593b free 50448->50449 50450 7ff76c3258a6 IsValidSid 50448->50450 50449->50462 50450->50449 50452 7ff76c3258b7 GetLengthSid malloc 50450->50452 50452->50449 50453 7ff76c3258d3 InitializeAcl 50452->50453 50456 7ff76c3258e8 AddAccessAllowedAce 50453->50456 50457 7ff76c325932 free 50453->50457 50454 7ff76c325aa0 SleepEx 50454->50462 50455 7ff76c3259c0 GetModuleHandleA GetCurrentProcess GetModuleInformation 50455->50462 50456->50457 50460 7ff76c325903 GetCurrentProcess SetSecurityInfo 50456->50460 50457->50449 50458 7ff76c321a90 25 API calls 50458->50462 50459 7ff76c31feb0 7 API calls 50459->50462 50460->50457 50461 7ff76c321a90 25 API calls 50461->50454 50462->50444 50462->50445 50462->50447 50462->50454 50462->50455 50462->50458 50462->50459 50462->50461 50475 7ff76c321a90 50462->50475 50464 7ff76c320230 50463->50464 50465 7ff76c3203e6 50463->50465 50464->50465 50493 7ff76c31eb60 GetCurrentProcess QueryFullProcessImageNameW CreateFileW 50464->50493 50466 7ff76c3784d0 8 API calls 50465->50466 50467 7ff76c3203f5 50466->50467 50467->50462 50470 7ff76c3203d4 UnmapViewOfFile CloseHandle 50470->50465 50471 7ff76c3203b2 UnmapViewOfFile CloseHandle 50471->50465 50472 7ff76c320330 50472->50471 50473 7ff76c3202c8 50473->50471 50473->50472 50474 7ff76c320364 VirtualProtect VirtualProtect 50473->50474 50474->50473 50500 7ff76c317300 50475->50500 50477 7ff76c321acd 50478 7ff76c321b17 50477->50478 50479 7ff76c321ae4 memmove 50477->50479 50515 7ff76c319180 9 API calls 3 library calls 50478->50515 50483 7ff76c321b39 system 50479->50483 50482 7ff76c321b36 50482->50483 50484 7ff76c321bac Concurrency::wait 50483->50484 50485 7ff76c321b7c 50483->50485 50486 7ff76c321bfe Concurrency::wait 50484->50486 50490 7ff76c321bf7 _invalid_parameter_noinfo_noreturn 50484->50490 50485->50484 50487 7ff76c321ba5 _invalid_parameter_noinfo_noreturn 50485->50487 50488 7ff76c321c35 Concurrency::wait 50486->50488 50491 7ff76c321c6e _invalid_parameter_noinfo_noreturn 50486->50491 50487->50484 50489 7ff76c3784d0 8 API calls 50488->50489 50492 7ff76c321c59 50489->50492 50490->50486 50492->50445 50494 7ff76c31ec0d 50493->50494 50495 7ff76c31ebe4 CreateFileMappingW 50493->50495 50498 7ff76c3784d0 8 API calls 50494->50498 50496 7ff76c31ec3c MapViewOfFile 50495->50496 50497 7ff76c31ec04 CloseHandle 50495->50497 50496->50494 50497->50494 50499 7ff76c31ec27 50498->50499 50499->50465 50499->50470 50499->50473 50501 7ff76c317325 50500->50501 50504 7ff76c3173fa memmove memmove 50501->50504 50505 7ff76c3173e5 50501->50505 50507 7ff76c3173c3 50501->50507 50508 7ff76c317446 50501->50508 50513 7ff76c31744b 50501->50513 50504->50477 50506 7ff76c3173d0 50505->50506 50510 7ff76c3784f0 std::_Facet_Register 3 API calls 50505->50510 50506->50504 50516 7ff76c3784f0 50507->50516 50525 7ff76c311cf0 50508->50525 50510->50506 50528 7ff76c311d90 ?_Xlength_error@std@@YAXPEBD 50513->50528 50514 7ff76c3173de _invalid_parameter_noinfo_noreturn 50514->50505 50515->50482 50517 7ff76c37850a malloc 50516->50517 50518 7ff76c3784fb 50517->50518 50519 7ff76c3173cb 50517->50519 50518->50517 50520 7ff76c37851a 50518->50520 50519->50506 50519->50514 50521 7ff76c378525 50520->50521 50529 7ff76c378fb0 _CxxThrowException std::bad_alloc::bad_alloc 50520->50529 50522 7ff76c311cf0 Concurrency::cancel_current_task __std_exception_copy 50521->50522 50524 7ff76c37852b 50522->50524 50526 7ff76c311cfe Concurrency::cancel_current_task 50525->50526 50527 7ff76c311d0f __std_exception_copy 50526->50527 50527->50513 50530 7ff76c335100 50531 7ff76c32e190 13 API calls 50530->50531 50532 7ff76c33513f 50531->50532 50549 7ff76c351a60 getaddrinfo 50532->50549 50535 7ff76c33517d EnterCriticalSection 50537 7ff76c3351a8 50535->50537 50538 7ff76c33518c LeaveCriticalSection 50535->50538 50536 7ff76c33515b WSAGetLastError 50539 7ff76c33517a 50536->50539 50540 7ff76c335165 WSAGetLastError 50536->50540 50542 7ff76c3351b2 send 50537->50542 50543 7ff76c3351d6 LeaveCriticalSection 50537->50543 50567 7ff76c335090 7 API calls 50538->50567 50539->50535 50540->50535 50542->50543 50545 7ff76c3351cd WSAGetLastError 50542->50545 50546 7ff76c3351e6 50543->50546 50544 7ff76c33519d free 50544->50546 50545->50543 50547 7ff76c3784d0 8 API calls 50546->50547 50548 7ff76c3351f5 50547->50548 50551 7ff76c351a93 50549->50551 50560 7ff76c335155 50549->50560 50550 7ff76c351c04 WSASetLastError 50550->50560 50551->50550 50552 7ff76c351b7e 50551->50552 50555 7ff76c351ae9 malloc 50551->50555 50553 7ff76c351bc7 50552->50553 50554 7ff76c351bc1 freeaddrinfo 50552->50554 50556 7ff76c351bcc 50553->50556 50557 7ff76c351bff 50553->50557 50554->50553 50558 7ff76c351bac 50555->50558 50559 7ff76c351b00 malloc 50555->50559 50556->50560 50561 7ff76c351bd1 free free free 50556->50561 50557->50550 50557->50560 50558->50552 50562 7ff76c351b9b free 50559->50562 50563 7ff76c351b37 memmove 50559->50563 50560->50535 50560->50536 50561->50560 50561->50561 50562->50552 50564 7ff76c351b5e 50563->50564 50565 7ff76c351b4f _strdup 50563->50565 50564->50551 50565->50564 50566 7ff76c351b80 free free 50565->50566 50566->50552 50567->50544 50568 7ff76c34a820 50569 7ff76c339ad0 251 API calls 50568->50569 50570 7ff76c34a837 50569->50570 50571 7ff76c37888c 50572 7ff76c3788a5 50571->50572 50573 7ff76c3788ad __scrt_acquire_startup_lock 50572->50573 50574 7ff76c3789e3 50572->50574 50576 7ff76c3789ed 50573->50576 50581 7ff76c3788cb __scrt_release_startup_lock 50573->50581 50700 7ff76c379198 9 API calls 50574->50700 50701 7ff76c379198 9 API calls 50576->50701 50578 7ff76c3789f8 50580 7ff76c378a00 _exit 50578->50580 50579 7ff76c3788f0 50581->50579 50582 7ff76c378976 _get_initial_narrow_environment __p___argv __p___argc 50581->50582 50586 7ff76c37896e _register_thread_local_exe_atexit_callback 50581->50586 50591 7ff76c313790 50582->50591 50586->50582 50587 7ff76c37899f 50587->50578 50588 7ff76c3789a3 50587->50588 50589 7ff76c3789ad 50588->50589 50590 7ff76c3789a8 _cexit 50588->50590 50589->50579 50590->50589 50592 7ff76c3784f0 std::_Facet_Register 3 API calls 50591->50592 50593 7ff76c3137d8 _beginthreadex 50592->50593 50594 7ff76c313818 50593->50594 50595 7ff76c3147be ?_Throw_Cpp_error@std@@YAXH 50593->50595 50596 7ff76c3147b2 ?_Throw_Cpp_error@std@@YAXH 50594->50596 50597 7ff76c313823 _Thrd_detach 50594->50597 50598 7ff76c3147cf 50595->50598 50596->50595 50597->50596 50600 7ff76c313841 17 API calls 50597->50600 50766 7ff76c315de0 ?_Xout_of_range@std@@YAXPEBD 50598->50766 50702 7ff76c313570 50600->50702 50601 7ff76c3147d4 50604 7ff76c311cf0 Concurrency::cancel_current_task __std_exception_copy 50601->50604 50606 7ff76c3147da 50604->50606 50767 7ff76c311d90 ?_Xlength_error@std@@YAXPEBD 50606->50767 50607 7ff76c3139b4 50733 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50607->50733 50609 7ff76c3139c0 GetStdHandle SetConsoleTextAttribute 50734 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50609->50734 50613 7ff76c3139e5 GetStdHandle SetConsoleTextAttribute 50735 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50613->50735 50615 7ff76c313a0a GetStdHandle SetConsoleTextAttribute 50736 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50615->50736 50617 7ff76c313a2f GetStdHandle SetConsoleTextAttribute 50737 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50617->50737 50619 7ff76c313a54 GetStdHandle SetConsoleTextAttribute 50738 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50619->50738 50621 7ff76c313a79 GetStdHandle SetConsoleTextAttribute 50739 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50621->50739 50623 7ff76c313a9e 50740 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50623->50740 50625 7ff76c313aaa GetStdHandle SetConsoleTextAttribute 50741 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50625->50741 50627 7ff76c313acf GetStdHandle SetConsoleTextAttribute 50742 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50627->50742 50629 7ff76c313af4 GetStdHandle SetConsoleTextAttribute 50743 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50629->50743 50631 7ff76c313b19 50744 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50631->50744 50633 7ff76c313b25 GetStdHandle SetConsoleTextAttribute 50745 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50633->50745 50635 7ff76c313b4a GetStdHandle SetConsoleTextAttribute 50746 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50635->50746 50637 7ff76c313b6f GetStdHandle SetConsoleTextAttribute 50747 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50637->50747 50639 7ff76c313b94 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH 50640 7ff76c3146c8 50639->50640 50690 7ff76c313bb3 Concurrency::wait 50639->50690 50641 7ff76c31476d 50640->50641 50642 7ff76c3146d1 50640->50642 50644 7ff76c31477b 50641->50644 50645 7ff76c314774 terminate 50641->50645 50764 7ff76c3155b0 7 API calls 2 library calls 50642->50764 50643 7ff76c313bd0 system 50643->50690 50647 7ff76c3784d0 8 API calls 50644->50647 50645->50644 50649 7ff76c31478c 50647->50649 50648 7ff76c3146e1 50765 7ff76c3155b0 7 API calls 2 library calls 50648->50765 50699 7ff76c3792ec GetModuleHandleW 50649->50699 50651 7ff76c3169e0 9 API calls 50651->50690 50652 7ff76c3146f5 50653 7ff76c31470d URLDownloadToFileA system system Sleep exit 50652->50653 50654 7ff76c314751 _invalid_parameter_noinfo_noreturn 50653->50654 50655 7ff76c314758 _invalid_parameter_noinfo_noreturn 50654->50655 50656 7ff76c31475f _invalid_parameter_noinfo_noreturn 50655->50656 50657 7ff76c314766 _invalid_parameter_noinfo_noreturn 50656->50657 50657->50641 50658 7ff76c31448c Sleep system GetStdHandle SetConsoleTextAttribute 50748 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50658->50748 50660 7ff76c3144c9 50749 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50660->50749 50662 7ff76c3156f0 21 API calls 50662->50690 50663 7ff76c3144d5 GetStdHandle SetConsoleTextAttribute 50750 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50663->50750 50665 7ff76c3144fa GetStdHandle SetConsoleTextAttribute 50751 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50665->50751 50667 7ff76c31451f GetStdHandle SetConsoleTextAttribute 50752 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50667->50752 50669 7ff76c31405b strtol 50671 7ff76c3140a4 _localtime64_s strftime 50669->50671 50669->50690 50670 7ff76c314544 GetStdHandle SetConsoleTextAttribute 50753 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50670->50753 50671->50690 50673 7ff76c314569 GetStdHandle SetConsoleTextAttribute 50754 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50673->50754 50675 7ff76c31458e GetStdHandle SetConsoleTextAttribute 50755 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50675->50755 50676 7ff76c314133 memmove 50676->50690 50678 7ff76c3145b3 50756 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50678->50756 50680 7ff76c3784f0 __std_exception_copy malloc _CxxThrowException std::_Facet_Register 50680->50690 50681 7ff76c3145bf GetStdHandle SetConsoleTextAttribute 50757 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50681->50757 50682 7ff76c3141be memmove 50682->50690 50683 7ff76c316190 9 API calls 50683->50690 50685 7ff76c3145e4 GetStdHandle SetConsoleTextAttribute 50758 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50685->50758 50687 7ff76c314609 GetStdHandle SetConsoleTextAttribute 50759 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50687->50759 50689 7ff76c31462e 50760 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50689->50760 50690->50598 50690->50601 50690->50606 50690->50643 50690->50651 50690->50654 50690->50655 50690->50656 50690->50657 50690->50658 50690->50662 50690->50669 50690->50671 50690->50676 50690->50680 50690->50682 50690->50683 50692 7ff76c31463a GetStdHandle SetConsoleTextAttribute 50761 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50692->50761 50694 7ff76c31465f GetStdHandle SetConsoleTextAttribute 50762 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50694->50762 50696 7ff76c314684 GetStdHandle SetConsoleTextAttribute 50763 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50696->50763 50698 7ff76c3146a9 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH 50698->50640 50698->50643 50699->50587 50700->50576 50701->50578 50768 7ff76c312ed0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 50702->50768 50706 7ff76c313594 Concurrency::wait 50707 7ff76c313610 50706->50707 50708 7ff76c3156f0 21 API calls 50706->50708 50709 7ff76c31369e _invalid_parameter_noinfo_noreturn 50706->50709 50711 7ff76c3136a5 50706->50711 50786 7ff76c322b00 CreateThread 50706->50786 50989 7ff76c312d10 23 API calls 50706->50989 51012 7ff76c324140 612 API calls 50706->51012 50720 7ff76c313640 50707->50720 50990 7ff76c315fa0 ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N ?getloc@ios_base@std@@QEBA?AVlocale@2 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 50707->50990 50991 7ff76c3156f0 50707->50991 51010 7ff76c324140 612 API calls 50707->51010 51013 7ff76c312d10 23 API calls 50707->51013 50708->50706 50709->50711 50714 7ff76c3784f0 std::_Facet_Register 3 API calls 50711->50714 50715 7ff76c3136b3 50714->50715 51014 7ff76c312d10 23 API calls 50715->51014 51011 7ff76c3131d0 79 API calls 50720->51011 50725 7ff76c313731 50728 7ff76c31376a Concurrency::wait 50725->50728 50730 7ff76c313763 _invalid_parameter_noinfo_noreturn 50725->50730 50726 7ff76c313649 50726->50725 50729 7ff76c3784d0 8 API calls 50728->50729 50731 7ff76c31377b system system GetStdHandle SetConsoleTextAttribute 50729->50731 50730->50728 50732 7ff76c311b90 __acrt_iob_func __stdio_common_vfprintf 50731->50732 50732->50607 50733->50609 50734->50613 50735->50615 50736->50617 50737->50619 50738->50621 50739->50623 50740->50625 50741->50627 50742->50629 50743->50631 50744->50633 50745->50635 50746->50637 50747->50639 50748->50660 50749->50663 50750->50665 50751->50667 50752->50670 50753->50673 50754->50675 50755->50678 50756->50681 50757->50685 50758->50687 50759->50689 50760->50692 50761->50694 50762->50696 50763->50698 50764->50648 50765->50652 51015 7ff76c315ad0 50768->51015 50770 7ff76c312fa3 50771 7ff76c312fc7 50770->50771 50772 7ff76c312fa8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 50770->50772 50773 7ff76c312fef ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD 50771->50773 50774 7ff76c3130e3 50771->50774 50772->50771 51027 7ff76c316830 12 API calls 50773->51027 51023 7ff76c313110 50774->51023 50777 7ff76c3130ed 50777->50706 50778 7ff76c313019 50779 7ff76c31309e ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 50778->50779 50780 7ff76c313020 50778->50780 50782 7ff76c3130c4 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 50779->50782 51028 7ff76c315920 10 API calls 50780->51028 50782->50774 50784 7ff76c313053 fclose ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 50784->50774 50785 7ff76c31309c 50784->50785 50785->50782 50787 7ff76c323b50 50786->50787 50788 7ff76c322b71 50786->50788 50790 7ff76c323b9b MessageBoxA exit 50787->50790 50788->50787 50789 7ff76c322b7d UuidCreate UuidToStringA 50788->50789 50791 7ff76c322bd9 50789->50791 50792 7ff76c322c14 50789->50792 50796 7ff76c31feb0 7 API calls 50791->50796 51031 7ff76c31feb0 50792->51031 50794 7ff76c322c6d 50795 7ff76c31feb0 7 API calls 50794->50795 50797 7ff76c322cbc 50795->50797 50798 7ff76c322bf9 RpcStringFreeA 50796->50798 51049 7ff76c323bc0 50797->51049 50798->50792 50800 7ff76c322cf0 50801 7ff76c322d55 Concurrency::wait 50800->50801 50802 7ff76c322d4e _invalid_parameter_noinfo_noreturn 50800->50802 50803 7ff76c31fe20 10 API calls 50801->50803 50802->50801 50804 7ff76c322d8c 50803->50804 50805 7ff76c31e320 _invalid_parameter_noinfo_noreturn 50804->50805 50806 7ff76c322dbb 50805->50806 50807 7ff76c322df4 Concurrency::wait 50806->50807 50809 7ff76c322ded _invalid_parameter_noinfo_noreturn 50806->50809 50808 7ff76c322e33 Concurrency::wait 50807->50808 50811 7ff76c322e2c _invalid_parameter_noinfo_noreturn 50807->50811 50810 7ff76c320410 27 API calls 50808->50810 50809->50807 50812 7ff76c322e44 50810->50812 50811->50808 50813 7ff76c317560 15 API calls 50812->50813 50814 7ff76c322edc 50813->50814 50815 7ff76c31fe20 10 API calls 50814->50815 50816 7ff76c322ef8 50815->50816 50817 7ff76c317460 9 API calls 50816->50817 50818 7ff76c322f2b 50817->50818 50819 7ff76c31fe20 10 API calls 50818->50819 50820 7ff76c322f52 50819->50820 50821 7ff76c31feb0 7 API calls 50820->50821 50822 7ff76c322fc4 50821->50822 50823 7ff76c323bc0 ?_Xout_of_range@std@@YAXPEBD 50822->50823 50824 7ff76c322fe2 50823->50824 50825 7ff76c323045 Concurrency::wait 50824->50825 50827 7ff76c32303e _invalid_parameter_noinfo_noreturn 50824->50827 50826 7ff76c31fe20 10 API calls 50825->50826 50828 7ff76c323081 50826->50828 50827->50825 50829 7ff76c317460 9 API calls 50828->50829 50830 7ff76c3230bd 50829->50830 50831 7ff76c31fe20 10 API calls 50830->50831 50832 7ff76c3230da 50831->50832 50833 7ff76c3176d0 9 API calls 50832->50833 50834 7ff76c32310d 50833->50834 50835 7ff76c31fe20 10 API calls 50834->50835 50836 7ff76c323129 50835->50836 50837 7ff76c315550 _invalid_parameter_noinfo_noreturn 50836->50837 50838 7ff76c323161 50837->50838 50839 7ff76c315550 _invalid_parameter_noinfo_noreturn 50838->50839 50840 7ff76c32316b 50839->50840 50841 7ff76c315550 _invalid_parameter_noinfo_noreturn 50840->50841 50842 7ff76c323178 50841->50842 50843 7ff76c315550 _invalid_parameter_noinfo_noreturn 50842->50843 50844 7ff76c323185 50843->50844 50845 7ff76c315550 _invalid_parameter_noinfo_noreturn 50844->50845 50846 7ff76c32318f 50845->50846 50847 7ff76c315550 _invalid_parameter_noinfo_noreturn 50846->50847 50848 7ff76c323199 50847->50848 50849 7ff76c315550 _invalid_parameter_noinfo_noreturn 50848->50849 50850 7ff76c3231a6 50849->50850 50851 7ff76c315550 _invalid_parameter_noinfo_noreturn 50850->50851 50852 7ff76c3231b0 50851->50852 50853 7ff76c315550 _invalid_parameter_noinfo_noreturn 50852->50853 50854 7ff76c3231ba 50853->50854 50855 7ff76c3156f0 21 API calls 50854->50855 50856 7ff76c3231d3 50855->50856 50857 7ff76c3156f0 21 API calls 50856->50857 50858 7ff76c3231e9 50857->50858 50859 7ff76c326fb0 409 API calls 50858->50859 50861 7ff76c3231fc 50859->50861 50860 7ff76c323350 50865 7ff76c31ae90 167 API calls 50860->50865 50862 7ff76c31feb0 7 API calls 50861->50862 50864 7ff76c3232b2 50861->50864 50866 7ff76c323269 50862->50866 50863 7ff76c3232e6 50863->50860 50872 7ff76c323333 MessageBoxA exit 50863->50872 50864->50860 50864->50863 50867 7ff76c315e00 _invalid_parameter_noinfo_noreturn 50864->50867 50868 7ff76c323373 50865->50868 50866->50864 50870 7ff76c3232a9 memcmp 50866->50870 50867->50863 50869 7ff76c31e930 7 API calls 50868->50869 50871 7ff76c323397 50869->50871 50870->50864 50873 7ff76c3233b4 50871->50873 50874 7ff76c319730 11 API calls 50871->50874 50872->50860 50875 7ff76c3233dc 50873->50875 50876 7ff76c31e7d0 24 API calls 50873->50876 50874->50873 50877 7ff76c3172a0 7 API calls 50875->50877 50876->50875 50878 7ff76c3233ee 50877->50878 50879 7ff76c315550 _invalid_parameter_noinfo_noreturn 50878->50879 50880 7ff76c3233f8 memset 50879->50880 50881 7ff76c31d810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 50880->50881 50882 7ff76c32341d 50881->50882 50883 7ff76c3784f0 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 50882->50883 50884 7ff76c32343a 50883->50884 50886 7ff76c32dda0 16 API calls 50884->50886 50887 7ff76c3234a6 50886->50887 50888 7ff76c32351d 50887->50888 50889 7ff76c3234c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ?setw@std@@YA?AU?$_Smanip@_J@1@_J 50887->50889 50890 7ff76c329130 7 API calls 50888->50890 50892 7ff76c32350a ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H 50889->50892 50891 7ff76c32352d 50890->50891 50893 7ff76c32356d memcmp 50891->50893 50894 7ff76c323584 50891->50894 50892->50888 50892->50889 50893->50894 50895 7ff76c323579 50893->50895 50896 7ff76c315550 _invalid_parameter_noinfo_noreturn 50894->50896 50897 7ff76c315550 _invalid_parameter_noinfo_noreturn 50895->50897 50898 7ff76c32358d 50896->50898 50899 7ff76c323582 50897->50899 50900 7ff76c317300 7 API calls 50898->50900 50903 7ff76c31d360 8 API calls 50899->50903 50901 7ff76c3235a4 50900->50901 50902 7ff76c321a90 25 API calls 50901->50902 50902->50899 50904 7ff76c3235bd 50903->50904 50905 7ff76c3251c0 28 API calls 50904->50905 50906 7ff76c3235c8 50905->50906 50907 7ff76c31e930 7 API calls 50906->50907 50908 7ff76c3235eb 50907->50908 50909 7ff76c323603 50908->50909 50910 7ff76c319730 11 API calls 50908->50910 50911 7ff76c32362b 50909->50911 50912 7ff76c31e7d0 24 API calls 50909->50912 50910->50909 50913 7ff76c315550 _invalid_parameter_noinfo_noreturn 50911->50913 50912->50911 50914 7ff76c32364c 50913->50914 50915 7ff76c323837 50914->50915 50916 7ff76c323654 50914->50916 50917 7ff76c3784f0 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 50915->50917 50918 7ff76c3290c0 7 API calls 50916->50918 50920 7ff76c323867 50917->50920 50919 7ff76c32367e 50918->50919 50921 7ff76c323696 50919->50921 50923 7ff76c319730 11 API calls 50919->50923 50922 7ff76c31ea80 7 API calls 50920->50922 50925 7ff76c3236bd 50921->50925 50928 7ff76c31e7d0 24 API calls 50921->50928 50924 7ff76c32388c 50922->50924 50923->50921 50926 7ff76c31e930 7 API calls 50924->50926 50931 7ff76c31feb0 7 API calls 50925->50931 50927 7ff76c3238b4 50926->50927 50929 7ff76c319730 11 API calls 50927->50929 50930 7ff76c3238cc 50927->50930 50928->50925 50929->50930 50933 7ff76c31e7d0 24 API calls 50930->50933 50936 7ff76c3238f4 50930->50936 50932 7ff76c3236eb 50931->50932 50934 7ff76c315550 _invalid_parameter_noinfo_noreturn 50932->50934 50933->50936 50935 7ff76c3236f5 50934->50935 50937 7ff76c31e930 7 API calls 50935->50937 50938 7ff76c315550 _invalid_parameter_noinfo_noreturn 50936->50938 50939 7ff76c323718 50937->50939 50940 7ff76c323913 50938->50940 50941 7ff76c323730 50939->50941 50944 7ff76c319730 11 API calls 50939->50944 50942 7ff76c320f20 20 API calls 50940->50942 50947 7ff76c323758 50941->50947 50950 7ff76c31e7d0 24 API calls 50941->50950 50943 7ff76c323921 50942->50943 50945 7ff76c323929 50943->50945 50946 7ff76c323781 50943->50946 50944->50941 50948 7ff76c31e9a0 7 API calls 50945->50948 50949 7ff76c31e1a0 _invalid_parameter_noinfo_noreturn 50946->50949 50953 7ff76c31d360 8 API calls 50947->50953 50951 7ff76c323956 50948->50951 50952 7ff76c32378e 50949->50952 50950->50947 50955 7ff76c31e780 24 API calls 50951->50955 50956 7ff76c31ec60 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 50952->50956 50954 7ff76c32376c 50953->50954 50957 7ff76c325050 28 API calls 50954->50957 50958 7ff76c323967 50955->50958 50959 7ff76c32379b 50956->50959 50960 7ff76c323777 50957->50960 50961 7ff76c3172a0 7 API calls 50958->50961 50962 7ff76c315550 _invalid_parameter_noinfo_noreturn 50959->50962 50963 7ff76c315550 _invalid_parameter_noinfo_noreturn 50960->50963 50964 7ff76c323976 50961->50964 50965 7ff76c3237a8 50962->50965 50963->50946 50966 7ff76c315550 _invalid_parameter_noinfo_noreturn 50964->50966 50967 7ff76c320f20 20 API calls 50965->50967 50968 7ff76c323980 50966->50968 50969 7ff76c3237bc 50967->50969 50970 7ff76c316fe0 memcmp 50968->50970 50971 7ff76c315550 _invalid_parameter_noinfo_noreturn 50969->50971 50972 7ff76c323993 50970->50972 50973 7ff76c3237c9 50971->50973 50975 7ff76c32399b 50972->50975 50979 7ff76c323b01 50972->50979 50974 7ff76c315550 _invalid_parameter_noinfo_noreturn 50973->50974 50976 7ff76c3237d6 50974->50976 50978 7ff76c323aeb MessageBoxA 50975->50978 50977 7ff76c315550 _invalid_parameter_noinfo_noreturn 50976->50977 50980 7ff76c3237e3 50977->50980 50981 7ff76c323b47 exit 50978->50981 50982 7ff76c323b29 ShellExecuteA 50979->50982 50983 7ff76c315550 _invalid_parameter_noinfo_noreturn 50980->50983 50981->50787 50982->50981 50984 7ff76c3237f0 50983->50984 50985 7ff76c315550 _invalid_parameter_noinfo_noreturn 50984->50985 50986 7ff76c3237fd 50985->50986 50987 7ff76c3784d0 8 API calls 50986->50987 50988 7ff76c32380c 50987->50988 50988->50706 50990->50707 50992 7ff76c315726 50991->50992 50993 7ff76c3157fd 50992->50993 50997 7ff76c31573c 50992->50997 51055 7ff76c311d90 ?_Xlength_error@std@@YAXPEBD 50993->51055 50994 7ff76c31574a 50994->50707 50996 7ff76c315802 50999 7ff76c311cf0 Concurrency::cancel_current_task __std_exception_copy 50996->50999 50997->50994 50997->50996 51000 7ff76c315766 50997->51000 51002 7ff76c3157c0 50997->51002 50998 7ff76c3784f0 std::_Facet_Register 3 API calls 51003 7ff76c31577c 50998->51003 51004 7ff76c315808 50999->51004 51000->50998 51001 7ff76c3157ca memmove 51001->50994 51002->51001 51005 7ff76c3784f0 std::_Facet_Register 3 API calls 51002->51005 51006 7ff76c3157b9 _invalid_parameter_noinfo_noreturn 51003->51006 51007 7ff76c315784 51003->51007 51056 7ff76c3134b0 15 API calls 51004->51056 51005->51001 51006->51002 51007->51001 51011->50726 51016 7ff76c315af8 ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH 51015->51016 51017 7ff76c315c01 51015->51017 51016->51017 51018 7ff76c315b19 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 51016->51018 51017->50770 51029 7ff76c316360 10 API calls 2 library calls 51018->51029 51020 7ff76c315ba7 ?always_noconv@codecvt_base@std@ 51021 7ff76c315bbd ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 51020->51021 51022 7ff76c315bb7 51020->51022 51021->51022 51022->50770 51024 7ff76c313166 51023->51024 51025 7ff76c3131a3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 51024->51025 51030 7ff76c315a10 12 API calls 51024->51030 51027->50778 51028->50784 51029->51020 51030->51025 51032 7ff76c31fece memmove 51031->51032 51037 7ff76c31fefa 51031->51037 51032->50794 51034 7ff76c320006 51053 7ff76c311d90 ?_Xlength_error@std@@YAXPEBD 51034->51053 51037->51034 51038 7ff76c31ff58 51037->51038 51039 7ff76c31ff84 51037->51039 51040 7ff76c320001 51038->51040 51043 7ff76c3784f0 std::_Facet_Register 3 API calls 51038->51043 51041 7ff76c3784f0 std::_Facet_Register 3 API calls 51039->51041 51048 7ff76c31ff6d 51039->51048 51044 7ff76c311cf0 Concurrency::cancel_current_task __std_exception_copy 51040->51044 51041->51048 51042 7ff76c31ff95 memmove 51045 7ff76c31ffdb Concurrency::wait 51042->51045 51046 7ff76c31ffb6 51042->51046 51043->51048 51044->51034 51045->50794 51046->51045 51047 7ff76c31fffa _invalid_parameter_noinfo_noreturn 51046->51047 51047->51040 51048->51042 51048->51047 51050 7ff76c323cbb 51049->51050 51054 7ff76c315e90 ?_Xout_of_range@std@@YAXPEBD 51050->51054 51057 7ff76c316d50 51058 7ff76c316d5b _Cnd_do_broadcast_at_thread_exit 51057->51058 51059 7ff76c316d6e Concurrency::wait 51058->51059 51060 7ff76c347f70 51061 7ff76c347fbe 51060->51061 51094 7ff76c3482e0 51061->51094 51064 7ff76c33fa50 15 API calls 51073 7ff76c347ff7 51064->51073 51065 7ff76c348145 51067 7ff76c3784d0 8 API calls 51065->51067 51066 7ff76c350c90 13 API calls 51068 7ff76c348076 51066->51068 51069 7ff76c348172 51067->51069 51070 7ff76c34807a 51068->51070 51071 7ff76c34809b 51068->51071 51109 7ff76c351c40 15 API calls 51070->51109 51072 7ff76c350c90 13 API calls 51071->51072 51075 7ff76c3480ad 51072->51075 51073->51065 51073->51066 51078 7ff76c3480b1 51075->51078 51084 7ff76c3480d2 51075->51084 51076 7ff76c34808f 51076->51071 51077 7ff76c34818a 51076->51077 51080 7ff76c348194 51077->51080 51110 7ff76c351c40 15 API calls 51078->51110 51114 7ff76c3474f0 27 API calls 51080->51114 51082 7ff76c3480c6 51082->51077 51082->51084 51083 7ff76c3481b6 51085 7ff76c34813e 51083->51085 51115 7ff76c351a10 free free free 51083->51115 51084->51065 51089 7ff76c348103 51084->51089 51111 7ff76c36bc00 530 API calls 51084->51111 51085->51065 51088 7ff76c348120 51088->51065 51090 7ff76c348139 51088->51090 51091 7ff76c348140 51088->51091 51089->51077 51089->51088 51112 7ff76c36be00 314 API calls 51090->51112 51113 7ff76c334d60 51 API calls 51091->51113 51095 7ff76c348320 51094->51095 51096 7ff76c34835b 51095->51096 51098 7ff76c348346 tolower 51095->51098 51097 7ff76c32e190 13 API calls 51096->51097 51099 7ff76c348372 51097->51099 51098->51096 51098->51098 51100 7ff76c3483dc 51099->51100 51101 7ff76c348451 51099->51101 51103 7ff76c3483b8 tolower 51099->51103 51100->51101 51102 7ff76c348416 _time64 51100->51102 51105 7ff76c3784d0 8 API calls 51101->51105 51102->51101 51104 7ff76c348435 51102->51104 51106 7ff76c32e190 13 API calls 51103->51106 51104->51101 51108 7ff76c33fa50 15 API calls 51104->51108 51107 7ff76c347fdb 51105->51107 51106->51100 51107->51064 51107->51073 51108->51101 51109->51076 51110->51082 51111->51089 51112->51085 51113->51065 51114->51083 51115->51085 51116 7ff76c353395 51152 7ff76c353399 51116->51152 51117 7ff76c353467 51118 7ff76c353925 calloc 51117->51118 51119 7ff76c353486 strchr 51117->51119 51120 7ff76c35394c 51118->51120 51121 7ff76c3539c8 51118->51121 51122 7ff76c3535eb 51119->51122 51123 7ff76c35349f strncmp 51119->51123 51229 7ff76c33f8d0 19 API calls 51120->51229 51132 7ff76c353a2a 51121->51132 51133 7ff76c353a24 CertFreeCertificateContext 51121->51133 51127 7ff76c3539ab 51122->51127 51128 7ff76c3536fe fopen 51122->51128 51125 7ff76c3534bc 51123->51125 51126 7ff76c3534e0 strncmp 51123->51126 51130 7ff76c3535b9 strchr 51125->51130 51126->51125 51131 7ff76c353502 strncmp 51126->51131 51231 7ff76c33f8d0 19 API calls 51127->51231 51128->51127 51134 7ff76c353717 fseek 51128->51134 51129 7ff76c35395b 51135 7ff76c353969 CertFreeCertificateContext 51129->51135 51221 7ff76c353be6 51129->51221 51130->51122 51136 7ff76c3535d3 _strdup 51130->51136 51131->51125 51138 7ff76c353524 strncmp 51131->51138 51139 7ff76c353a2e 51132->51139 51140 7ff76c353a93 51132->51140 51133->51132 51141 7ff76c35374d 51134->51141 51142 7ff76c353741 ftell 51134->51142 51135->51221 51136->51122 51143 7ff76c3535f3 51136->51143 51138->51125 51145 7ff76c353543 strncmp 51138->51145 51148 7ff76c329400 22 API calls 51139->51148 51159 7ff76c350c90 13 API calls 51140->51159 51149 7ff76c35375e fseek 51141->51149 51150 7ff76c353979 fclose 51141->51150 51142->51141 51143->51122 51164 7ff76c353614 CertOpenStore 51143->51164 51144 7ff76c353420 strtol 51151 7ff76c353442 strchr 51144->51151 51144->51152 51145->51130 51147 7ff76c35355a strncmp 51145->51147 51146 7ff76c3784d0 8 API calls 51153 7ff76c353d9c 51146->51153 51147->51125 51154 7ff76c353579 strncmp 51147->51154 51155 7ff76c353a42 51148->51155 51149->51150 51157 7ff76c35377b malloc 51149->51157 51230 7ff76c33f8d0 19 API calls 51150->51230 51151->51117 51151->51152 51152->51117 51152->51144 51152->51151 51171 7ff76c3534c7 51152->51171 51223 7ff76c3527c0 62 API calls 51152->51223 51154->51125 51160 7ff76c353598 strncmp 51154->51160 51232 7ff76c33f8d0 19 API calls 51155->51232 51157->51150 51163 7ff76c353794 fread 51157->51163 51165 7ff76c353aac 51159->51165 51160->51122 51160->51125 51162 7ff76c353998 free 51162->51221 51163->51150 51168 7ff76c3537b2 fclose 51163->51168 51169 7ff76c353667 free CryptStringToBinaryA 51164->51169 51170 7ff76c353637 GetLastError 51164->51170 51166 7ff76c353abf 51165->51166 51172 7ff76c350c90 13 API calls 51165->51172 51175 7ff76c33fa50 15 API calls 51166->51175 51185 7ff76c353ad2 51166->51185 51167 7ff76c353a54 free 51220 7ff76c3534d6 51167->51220 51167->51221 51177 7ff76c3537df malloc 51168->51177 51178 7ff76c3537cf 51168->51178 51173 7ff76c3538f1 CertCloseStore 51169->51173 51174 7ff76c3536b2 CertFindCertificateInStore 51169->51174 51225 7ff76c33f8d0 19 API calls 51170->51225 51224 7ff76c33f8d0 19 API calls 51171->51224 51172->51166 51173->51221 51183 7ff76c35390a CertCloseStore 51174->51183 51184 7ff76c3536e4 51174->51184 51175->51185 51181 7ff76c353823 PFXImportCertStore free free 51177->51181 51182 7ff76c3537f9 MultiByteToWideChar 51177->51182 51178->51177 51180 7ff76c353656 free 51180->51221 51190 7ff76c3538aa CertFindCertificateInStore 51181->51190 51191 7ff76c353854 GetLastError 51181->51191 51182->51181 51183->51118 51184->51173 51186 7ff76c353b1b 51185->51186 51188 7ff76c33fa50 15 API calls 51185->51188 51189 7ff76c353b7d calloc 51186->51189 51188->51186 51192 7ff76c353bd7 51189->51192 51193 7ff76c353bf0 51189->51193 51197 7ff76c353906 51190->51197 51198 7ff76c3538d2 GetLastError 51190->51198 51194 7ff76c353869 51191->51194 51195 7ff76c353891 51191->51195 51233 7ff76c33f8d0 19 API calls 51192->51233 51202 7ff76c353cfc 51193->51202 51203 7ff76c353c59 free 51193->51203 51193->51221 51226 7ff76c33f8d0 19 API calls 51194->51226 51227 7ff76c33f8d0 19 API calls 51195->51227 51197->51183 51228 7ff76c33f8d0 19 API calls 51198->51228 51206 7ff76c340190 48 API calls 51202->51206 51204 7ff76c353c8a 51203->51204 51205 7ff76c353cd6 51203->51205 51208 7ff76c353cb0 51204->51208 51209 7ff76c353c92 51204->51209 51207 7ff76c329400 22 API calls 51205->51207 51210 7ff76c353d1d 51206->51210 51211 7ff76c353ce0 51207->51211 51213 7ff76c329400 22 API calls 51208->51213 51212 7ff76c329400 22 API calls 51209->51212 51218 7ff76c353d79 51210->51218 51210->51221 51236 7ff76c33f8d0 19 API calls 51211->51236 51215 7ff76c353c99 51212->51215 51216 7ff76c353cba 51213->51216 51234 7ff76c33f8d0 19 API calls 51215->51234 51235 7ff76c33f8d0 19 API calls 51216->51235 51237 7ff76c33f8d0 19 API calls 51218->51237 51220->51221 51221->51146 51223->51152 51224->51220 51225->51180 51226->51220 51227->51220 51228->51173 51229->51129 51230->51162 51231->51220 51232->51167 51233->51221 51234->51220 51235->51220 51236->51220 51237->51221 51238 7ff76c334b70 51239 7ff76c334bc4 51238->51239 51240 7ff76c334bb4 51238->51240 51242 7ff76c346b40 2 API calls 51239->51242 51283 7ff76c347480 51240->51283 51243 7ff76c334c06 51242->51243 51249 7ff76c335210 calloc 51243->51249 51246 7ff76c334c2e 51290 7ff76c33f8d0 19 API calls 51246->51290 51247 7ff76c334c25 51250 7ff76c33539e _errno 51249->51250 51251 7ff76c335261 malloc 51249->51251 51273 7ff76c334c21 51250->51273 51252 7ff76c3352ec InitializeCriticalSectionEx 51251->51252 51259 7ff76c335317 51251->51259 51291 7ff76c34ddf0 socket 51252->51291 51254 7ff76c335340 free 51257 7ff76c335358 51254->51257 51258 7ff76c335353 51254->51258 51255 7ff76c335330 DeleteCriticalSection free 51255->51254 51262 7ff76c335368 free 51257->51262 51263 7ff76c335362 closesocket 51257->51263 51311 7ff76c351a10 free free free 51258->51311 51259->51254 51259->51255 51260 7ff76c3353c6 _strdup 51260->51259 51264 7ff76c3353e0 free _strdup 51260->51264 51262->51250 51263->51262 51265 7ff76c33542e 51264->51265 51266 7ff76c335402 51264->51266 51268 7ff76c33543a EnterCriticalSection LeaveCriticalSection 51265->51268 51269 7ff76c3354b1 free 51265->51269 51310 7ff76c3520e0 _beginthreadex 51266->51310 51271 7ff76c335475 51268->51271 51272 7ff76c335464 CloseHandle 51268->51272 51269->51250 51270 7ff76c335416 51270->51273 51274 7ff76c33541e _errno 51270->51274 51276 7ff76c33547a 51271->51276 51277 7ff76c335482 51271->51277 51275 7ff76c335498 51272->51275 51273->51246 51273->51247 51274->51265 51280 7ff76c3354a8 closesocket 51275->51280 51314 7ff76c32fa60 free 51275->51314 51312 7ff76c352130 WaitForSingleObjectEx CloseHandle 51276->51312 51313 7ff76c335090 7 API calls 51277->51313 51280->51269 51282 7ff76c33548b free 51282->51275 51284 7ff76c347489 51283->51284 51285 7ff76c34749f socket 51283->51285 51284->51239 51286 7ff76c3474bc 51285->51286 51287 7ff76c3474b5 51285->51287 51288 7ff76c340530 2 API calls 51286->51288 51287->51239 51289 7ff76c3474c6 51288->51289 51289->51239 51290->51247 51292 7ff76c34de45 htonl setsockopt 51291->51292 51293 7ff76c34de40 51291->51293 51294 7ff76c34dfcb closesocket closesocket closesocket 51292->51294 51295 7ff76c34dea4 bind 51292->51295 51297 7ff76c3784d0 8 API calls 51293->51297 51294->51293 51295->51294 51296 7ff76c34debf getsockname 51295->51296 51296->51294 51298 7ff76c34dedb listen 51296->51298 51299 7ff76c33530f 51297->51299 51298->51294 51300 7ff76c34def0 socket 51298->51300 51299->51259 51299->51260 51300->51294 51301 7ff76c34df0b connect 51300->51301 51301->51294 51302 7ff76c34df26 accept 51301->51302 51302->51294 51303 7ff76c34df42 51302->51303 51304 7ff76c32e190 13 API calls 51303->51304 51305 7ff76c34df59 send 51304->51305 51305->51294 51307 7ff76c34df8a recv 51305->51307 51307->51294 51308 7ff76c34dfa8 51307->51308 51308->51294 51309 7ff76c34dfbe closesocket 51308->51309 51309->51293 51310->51270 51311->51257 51312->51277 51313->51282 51314->51280 51315 7ff76c3314d0 51316 7ff76c3314e1 51315->51316 51343 7ff76c3477b0 51316->51343 51318 7ff76c331515 51319 7ff76c331547 51318->51319 51320 7ff76c33fa50 15 API calls 51318->51320 51371 7ff76c348200 314 API calls 51319->51371 51322 7ff76c331541 51320->51322 51322->51319 51324 7ff76c331557 51322->51324 51323 7ff76c331554 51323->51324 51347 7ff76c332480 51324->51347 51329 7ff76c332400 17 API calls 51340 7ff76c3311db 51329->51340 51332 7ff76c332282 51333 7ff76c332273 51374 7ff76c33f8d0 19 API calls 51333->51374 51335 7ff76c33b390 90 API calls 51335->51340 51337 7ff76c341150 10 API calls 51337->51340 51338 7ff76c33f8d0 19 API calls 51339 7ff76c33127e 51338->51339 51339->51338 51339->51340 51340->51329 51340->51332 51340->51333 51340->51335 51340->51337 51340->51339 51342 7ff76c330c60 292 API calls 51340->51342 51369 7ff76c33f8d0 19 API calls 51340->51369 51372 7ff76c32f980 15 API calls 51340->51372 51373 7ff76c34e570 22 API calls 51340->51373 51342->51340 51344 7ff76c3477da 51343->51344 51345 7ff76c3482e0 18 API calls 51344->51345 51346 7ff76c3477f9 51345->51346 51346->51318 51358 7ff76c3324e6 51347->51358 51348 7ff76c332868 memmove memmove 51349 7ff76c332750 51348->51349 51350 7ff76c3784d0 8 API calls 51349->51350 51351 7ff76c331562 51350->51351 51351->51340 51363 7ff76c347ed0 51351->51363 51352 7ff76c33262e calloc 51352->51349 51356 7ff76c332648 51352->51356 51353 7ff76c332864 51353->51348 51355 7ff76c332747 free 51355->51349 51356->51349 51356->51355 51357 7ff76c346e90 malloc memmove 51356->51357 51356->51358 51360 7ff76c33273f 51356->51360 51375 7ff76c3471d0 51356->51375 51357->51356 51358->51352 51358->51356 51359 7ff76c33275a 51358->51359 51359->51348 51359->51353 51381 7ff76c347160 free 51359->51381 51380 7ff76c347160 free 51360->51380 51364 7ff76c347ee9 51363->51364 51382 7ff76c33bdf0 51364->51382 51366 7ff76c347f00 51367 7ff76c33146c 51366->51367 51368 7ff76c33b390 90 API calls 51366->51368 51367->51340 51370 7ff76c344910 free 51367->51370 51368->51367 51369->51340 51370->51340 51371->51323 51372->51340 51373->51340 51374->51332 51376 7ff76c347286 51375->51376 51377 7ff76c3471e7 51375->51377 51376->51356 51377->51376 51378 7ff76c347207 malloc 51377->51378 51379 7ff76c347236 51378->51379 51379->51356 51380->51355 51381->51359 51383 7ff76c34e420 2 API calls 51382->51383 51384 7ff76c33be15 51383->51384 51385 7ff76c33be25 51384->51385 51386 7ff76c33be79 51384->51386 51387 7ff76c33be4e free 51384->51387 51385->51366 51389 7ff76c346b40 2 API calls 51386->51389 51391 7ff76c33be85 51386->51391 51406 7ff76c32e0c0 15 API calls 51387->51406 51390 7ff76c33beaf 51389->51390 51392 7ff76c33bef1 51390->51392 51393 7ff76c33bec3 51390->51393 51391->51366 51394 7ff76c34e420 2 API calls 51392->51394 51395 7ff76c3406e0 612 API calls 51393->51395 51396 7ff76c33befe 51394->51396 51397 7ff76c33bed9 51395->51397 51400 7ff76c33bf21 51396->51400 51401 7ff76c34e420 2 API calls 51396->51401 51398 7ff76c33bee1 51397->51398 51399 7ff76c346b40 2 API calls 51397->51399 51398->51366 51402 7ff76c33bfb4 51399->51402 51403 7ff76c341260 47 API calls 51400->51403 51401->51400 51402->51366 51404 7ff76c33bf3a 51403->51404 51404->51397 51405 7ff76c33fa50 15 API calls 51404->51405 51405->51397 51406->51386 51407 7ff76c352570 51410 7ff76c36b6d0 51407->51410 51411 7ff76c36b6de 51410->51411 51412 7ff76c352579 51410->51412 51413 7ff76c342750 14 API calls 51411->51413 51414 7ff76c36b6f1 51413->51414 51418 7ff76c3425b0 GetModuleHandleA 51414->51418 51416 7ff76c36b70a 51416->51412 51417 7ff76c36b716 GetProcAddressForCaller 51416->51417 51417->51412 51419 7ff76c3425da GetProcAddress strpbrk 51418->51419 51420 7ff76c3425d2 51418->51420 51421 7ff76c342607 51419->51421 51422 7ff76c34263e 51419->51422 51420->51416 51423 7ff76c342628 LoadLibraryA 51421->51423 51424 7ff76c34260f 51421->51424 51425 7ff76c342676 GetSystemDirectoryA 51422->51425 51426 7ff76c342643 GetProcAddress 51422->51426 51423->51416 51424->51416 51428 7ff76c342738 51425->51428 51429 7ff76c342690 malloc 51425->51429 51426->51425 51427 7ff76c342658 LoadLibraryExA 51426->51427 51427->51416 51428->51416 51431 7ff76c34272a free 51429->51431 51432 7ff76c3426bd GetSystemDirectoryA 51429->51432 51431->51428 51432->51431 51433 7ff76c3426cd 51432->51433 51434 7ff76c342721 LoadLibraryA 51433->51434 51435 7ff76c342716 51433->51435 51434->51435 51435->51431 51436 7ff76c3521f0 51437 7ff76c33a330 51436->51437 51438 7ff76c352205 51436->51438 51441 7ff76c352240 51437->51441 51442 7ff76c35228c 51441->51442 51443 7ff76c33fa50 15 API calls 51442->51443 51446 7ff76c3522d0 51443->51446 51444 7ff76c352445 51445 7ff76c35245f free 51444->51445 51451 7ff76c352482 51444->51451 51445->51451 51446->51444 51452 7ff76c352334 51446->51452 51460 7ff76c352357 51446->51460 51447 7ff76c3524d7 free 51448 7ff76c352510 51447->51448 51449 7ff76c352519 free 51448->51449 51450 7ff76c35235c 51448->51450 51449->51450 51455 7ff76c3784d0 8 API calls 51450->51455 51453 7ff76c3524b5 51451->51453 51458 7ff76c3524ac free 51451->51458 51454 7ff76c329400 22 API calls 51452->51454 51453->51447 51453->51448 51456 7ff76c352345 51454->51456 51457 7ff76c33a34c 51455->51457 51464 7ff76c33f8d0 19 API calls 51456->51464 51458->51453 51460->51444 51460->51450 51461 7ff76c340190 48 API calls 51460->51461 51462 7ff76c352404 51461->51462 51462->51444 51463 7ff76c33fa50 15 API calls 51462->51463 51463->51444 51464->51460

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ff76c313790-7ff76c313812 call 7ff76c3784f0 _beginthreadex 3 7ff76c313818-7ff76c31381d 0->3 4 7ff76c3147be-7ff76c3147ce ?_Throw_Cpp_error@std@@YAXH@Z 0->4 5 7ff76c3147b2-7ff76c3147bd ?_Throw_Cpp_error@std@@YAXH@Z 3->5 6 7ff76c313823-7ff76c31383b _Thrd_detach 3->6 7 7ff76c3147cf-7ff76c3147d4 call 7ff76c315de0 4->7 5->4 6->5 9 7ff76c313841-7ff76c313970 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongW SetWindowLongW GetConsoleWindow GetWindowRect MoveWindow SleepEx GetStdHandle SetConsoleTextAttribute call 7ff76c313570 6->9 12 7ff76c3147d5-7ff76c3147da call 7ff76c311cf0 7->12 13 7ff76c313975-7ff76c313bad system * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 9->13 19 7ff76c3147db-7ff76c3147e0 call 7ff76c311d90 12->19 51 7ff76c3146c8-7ff76c3146cb 13->51 52 7ff76c313bb3-7ff76c313bce 13->52 53 7ff76c31476d-7ff76c314772 51->53 54 7ff76c3146d1-7ff76c314750 call 7ff76c3155b0 * 2 call 7ff76c315540 * 2 URLDownloadToFileA system * 2 Sleep exit 51->54 55 7ff76c313bd0-7ff76c313bf3 system 52->55 58 7ff76c31477b-7ff76c3147b1 call 7ff76c3784d0 53->58 59 7ff76c314774-7ff76c31477a terminate 53->59 85 7ff76c314751-7ff76c314757 _invalid_parameter_noinfo_noreturn 54->85 56 7ff76c313bf9-7ff76c313bfd 55->56 57 7ff76c313d80-7ff76c313da9 call 7ff76c316190 55->57 61 7ff76c313d3f-7ff76c313d46 56->61 62 7ff76c313c03-7ff76c313c35 56->62 72 7ff76c313dab 57->72 73 7ff76c313db2-7ff76c313df0 call 7ff76c3169e0 57->73 59->58 67 7ff76c313d50-7ff76c313d7e 61->67 66 7ff76c313c40-7ff76c313d37 62->66 66->66 71 7ff76c313d3d 66->71 67->57 67->67 71->57 72->73 80 7ff76c313ef5-7ff76c313eff 73->80 81 7ff76c313df6-7ff76c313eef 73->81 83 7ff76c313f00-7ff76c313f2e 80->83 81->80 83->83 84 7ff76c313f30-7ff76c313f55 call 7ff76c316190 83->84 90 7ff76c313f57 84->90 91 7ff76c313f5e-7ff76c313ff0 call 7ff76c3169e0 call 7ff76c316190 call 7ff76c3169e0 84->91 87 7ff76c314758-7ff76c31475e _invalid_parameter_noinfo_noreturn 85->87 89 7ff76c31475f-7ff76c314765 _invalid_parameter_noinfo_noreturn 87->89 92 7ff76c314766-7ff76c31476c _invalid_parameter_noinfo_noreturn 89->92 90->91 99 7ff76c31448c-7ff76c3146c2 Sleep system GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 * 2 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 GetStdHandle SetConsoleTextAttribute call 7ff76c311b90 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 91->99 100 7ff76c313ff6-7ff76c313ff9 91->100 92->53 99->51 99->55 102 7ff76c314000-7ff76c31400a 100->102 102->7 104 7ff76c314010-7ff76c314056 call 7ff76c3156f0 * 3 102->104 118 7ff76c314058 104->118 119 7ff76c31405b-7ff76c314072 strtol 104->119 118->119 121 7ff76c3140a4-7ff76c31410c _localtime64_s strftime 119->121 122 7ff76c314074-7ff76c314081 119->122 126 7ff76c314113-7ff76c31411a 121->126 124 7ff76c31409f call 7ff76c378774 122->124 125 7ff76c314083-7ff76c314096 122->125 124->121 125->85 128 7ff76c31409c 125->128 126->126 130 7ff76c31411c-7ff76c31411f 126->130 128->124 130->19 132 7ff76c314125-7ff76c314131 130->132 134 7ff76c314151-7ff76c31415b 132->134 135 7ff76c314133-7ff76c31414c memmove 132->135 137 7ff76c31415d-7ff76c314164 134->137 138 7ff76c314166-7ff76c31417e 134->138 136 7ff76c3141e7-7ff76c314203 135->136 144 7ff76c314209-7ff76c314238 136->144 145 7ff76c314342-7ff76c31434c 136->145 140 7ff76c31418d-7ff76c314198 call 7ff76c3784f0 137->140 141 7ff76c3141ac-7ff76c3141af 138->141 142 7ff76c314180-7ff76c314187 138->142 140->87 159 7ff76c31419e-7ff76c3141aa 140->159 149 7ff76c3141bb 141->149 150 7ff76c3141b1-7ff76c3141b9 call 7ff76c3784f0 141->150 142->12 142->140 146 7ff76c314240-7ff76c314337 144->146 147 7ff76c314350-7ff76c31437a 145->147 146->146 152 7ff76c31433d-7ff76c314340 146->152 147->147 153 7ff76c31437c-7ff76c3143af call 7ff76c316190 call 7ff76c3169e0 147->153 157 7ff76c3141be-7ff76c3141dd memmove 149->157 150->157 152->145 152->153 169 7ff76c3143b1-7ff76c3143c2 153->169 170 7ff76c3143e3-7ff76c3143ee 153->170 157->136 159->157 172 7ff76c3143dd-7ff76c3143e2 call 7ff76c378774 169->172 173 7ff76c3143c4-7ff76c3143d7 169->173 174 7ff76c3143f0-7ff76c314404 170->174 175 7ff76c314424-7ff76c31442f 170->175 172->170 173->89 173->172 176 7ff76c31441f call 7ff76c378774 174->176 177 7ff76c314406-7ff76c314419 174->177 179 7ff76c314431-7ff76c314445 175->179 180 7ff76c314465-7ff76c314486 175->180 176->175 177->92 177->176 184 7ff76c314447-7ff76c31445a 179->184 185 7ff76c314460 call 7ff76c378774 179->185 180->99 180->102 184->92 184->185 185->180
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Console$Handle$AttributeText$Windowsystem$_invalid_parameter_noinfo_noreturn$Mode$Concurrency::cancel_current_taskSleep$??5?$basic_istream@BufferCpp_error@std@@D@std@@@std@@InfoLongScreenThrow_U?$char_traits@V01@memmove$DownloadFileMoveRectThrd_detach__acrt_iob_func__stdio_common_vfprintf_beginthreadex_localtime64_sexitmallocstrftimestrtolterminate
                                            • String ID: Informacoes da Key: $ Iniciar Bypass: $ Selecione a opcao: $##########################################################$##########################################################$%a %m/%d/%y %H:%M:%S %Z$C:\Windows\KMDF.exe$O[L3{bC$[ Selecione uma opcao: ]$cd C:\$cls$http://167.114.85.75/KMDF.exe$start C:\Windows\KMDF.exe
                                            • API String ID: 2610904833-770532400
                                            • Opcode ID: 8e83d5c6a47920a14e129d855d6b53270a34d5ab458b7d8379ec2d018bf0d079
                                            • Instruction ID: 584983ed998f59d243bf3acf1dbff1da433948f07fba180cea37761830b2d507
                                            • Opcode Fuzzy Hash: 8e83d5c6a47920a14e129d855d6b53270a34d5ab458b7d8379ec2d018bf0d079
                                            • Instruction Fuzzy Hash: 1B92D621D19683C5FB02BB36D8159B8B360EF56796F808339E91D16AE5EF3CE185C321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupstrncmpstrtol
                                            • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                            • API String ID: 707411602-3372543188
                                            • Opcode ID: 0e9624d2271164690d4c89ec25625efcdf37d709121030a49ad146a9211cd1c5
                                            • Instruction ID: f7771ba75f2897de32e791d50f0fb076d6a68bfab9554a70ef2132d951e3f803
                                            • Opcode Fuzzy Hash: 0e9624d2271164690d4c89ec25625efcdf37d709121030a49ad146a9211cd1c5
                                            • Instruction Fuzzy Hash: 7C42B061A09B42C1EBA4AB27D440AB9BBA0FF45B96FC0413DDA1E47794DF3CE544C722

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 375 7ff76c322b00-7ff76c322b6b CreateThread 376 7ff76c323b50-7ff76c323bb7 call 7ff76c3201c0 MessageBoxA exit 375->376 377 7ff76c322b71-7ff76c322b77 375->377 377->376 379 7ff76c322b7d-7ff76c322bd7 UuidCreate UuidToStringA 377->379 381 7ff76c322bd9-7ff76c322be0 379->381 382 7ff76c322c14-7ff76c322d23 call 7ff76c31feb0 * 2 call 7ff76c323bc0 379->382 383 7ff76c322be3-7ff76c322beb 381->383 393 7ff76c322d5a-7ff76c322d7a 382->393 394 7ff76c322d25-7ff76c322d37 382->394 383->383 385 7ff76c322bed-7ff76c322c0d call 7ff76c31feb0 RpcStringFreeA 383->385 385->382 397 7ff76c322d7c 393->397 398 7ff76c322d7f-7ff76c322dc3 call 7ff76c31fe20 call 7ff76c31e320 393->398 395 7ff76c322d39-7ff76c322d4c 394->395 396 7ff76c322d55 call 7ff76c378774 394->396 395->396 399 7ff76c322d4e-7ff76c322d54 _invalid_parameter_noinfo_noreturn 395->399 396->393 397->398 405 7ff76c322dfa-7ff76c322e02 398->405 406 7ff76c322dc5-7ff76c322dd6 398->406 399->396 409 7ff76c322e38-7ff76c322eeb call 7ff76c320410 call 7ff76c317560 405->409 410 7ff76c322e04-7ff76c322e15 405->410 407 7ff76c322dd8-7ff76c322deb 406->407 408 7ff76c322df4-7ff76c322df9 call 7ff76c378774 406->408 407->408 411 7ff76c322ded-7ff76c322df3 _invalid_parameter_noinfo_noreturn 407->411 408->405 422 7ff76c322eed 409->422 423 7ff76c322ef0-7ff76c322f77 call 7ff76c31fe20 call 7ff76c317460 call 7ff76c31fe20 409->423 413 7ff76c322e17-7ff76c322e2a 410->413 414 7ff76c322e33 call 7ff76c378774 410->414 411->408 413->414 417 7ff76c322e2c-7ff76c322e32 _invalid_parameter_noinfo_noreturn 413->417 414->409 417->414 422->423 430 7ff76c322f9a-7ff76c323014 call 7ff76c31feb0 call 7ff76c323bc0 423->430 431 7ff76c322f79-7ff76c322f7c 423->431 438 7ff76c32304a-7ff76c3230c7 call 7ff76c31fe20 call 7ff76c317460 430->438 439 7ff76c323016-7ff76c323027 430->439 432 7ff76c322f80-7ff76c322f91 431->432 432->432 434 7ff76c322f93 432->434 434->430 448 7ff76c3230c9 438->448 449 7ff76c3230cd-7ff76c32311c call 7ff76c31fe20 call 7ff76c3176d0 438->449 440 7ff76c323029-7ff76c32303c 439->440 441 7ff76c323045 call 7ff76c378774 439->441 440->441 443 7ff76c32303e-7ff76c323044 _invalid_parameter_noinfo_noreturn 440->443 441->438 443->441 448->449 454 7ff76c32311e 449->454 455 7ff76c323121-7ff76c3231f7 call 7ff76c31fe20 call 7ff76c315550 * 9 call 7ff76c3156f0 * 2 call 7ff76c326fb0 449->455 454->455 481 7ff76c3231fc-7ff76c323218 455->481 482 7ff76c3232b7-7ff76c3232bb 481->482 483 7ff76c32321e-7ff76c323225 481->483 484 7ff76c3232bf-7ff76c3232ca 482->484 485 7ff76c323230-7ff76c32323e 483->485 486 7ff76c323350-7ff76c3233a6 call 7ff76c31ae90 call 7ff76c31e930 484->486 487 7ff76c3232d0-7ff76c3232d4 484->487 485->485 488 7ff76c323240-7ff76c3232a7 call 7ff76c31feb0 485->488 503 7ff76c3233a8-7ff76c3233c2 call 7ff76c319730 486->503 504 7ff76c3233c4 486->504 490 7ff76c3232e6-7ff76c3232e9 487->490 491 7ff76c3232d6-7ff76c3232e1 call 7ff76c315e00 487->491 488->484 498 7ff76c3232a9-7ff76c3232b0 memcmp 488->498 490->486 495 7ff76c3232eb-7ff76c32334f call 7ff76c320190 MessageBoxA exit 490->495 491->490 495->486 498->484 501 7ff76c3232b2-7ff76c3232b5 498->501 501->487 506 7ff76c3233cb-7ff76c3233ce 503->506 504->506 508 7ff76c3233d0-7ff76c3233dc call 7ff76c31e7d0 506->508 509 7ff76c3233df-7ff76c323483 call 7ff76c3172a0 call 7ff76c315550 memset call 7ff76c31d810 call 7ff76c3784f0 506->509 508->509 520 7ff76c323488-7ff76c3234b7 call 7ff76c32dda0 509->520 521 7ff76c323485 509->521 524 7ff76c3234b9 520->524 525 7ff76c32351d-7ff76c323532 call 7ff76c329130 520->525 521->520 526 7ff76c3234c0-7ff76c32351b ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z 524->526 530 7ff76c323540-7ff76c323548 525->530 531 7ff76c323534-7ff76c323537 525->531 526->525 530->530 532 7ff76c32354a-7ff76c32356b 530->532 531->530 533 7ff76c32356d-7ff76c323577 memcmp 532->533 534 7ff76c323584-7ff76c3235a7 call 7ff76c315550 call 7ff76c317300 call 7ff76c321a90 532->534 533->534 535 7ff76c323579-7ff76c323582 call 7ff76c315550 533->535 541 7ff76c3235ac-7ff76c3235f5 call 7ff76c31d360 call 7ff76c3251c0 call 7ff76c31e930 534->541 535->541 550 7ff76c3235f7-7ff76c323611 call 7ff76c319730 541->550 551 7ff76c323613 541->551 553 7ff76c32361a-7ff76c32361d 550->553 551->553 555 7ff76c323630 553->555 556 7ff76c32361f-7ff76c32362e call 7ff76c31e7d0 553->556 558 7ff76c323635-7ff76c32364e call 7ff76c315550 555->558 556->558 562 7ff76c323837-7ff76c3238be call 7ff76c3784f0 call 7ff76c31ea80 call 7ff76c31e930 558->562 563 7ff76c323654-7ff76c323688 call 7ff76c3290c0 558->563 581 7ff76c3238dc 562->581 582 7ff76c3238c0-7ff76c3238da call 7ff76c319730 562->582 568 7ff76c32368a-7ff76c3236a7 call 7ff76c319730 563->568 569 7ff76c3236a9 563->569 572 7ff76c3236b0-7ff76c3236b2 568->572 569->572 575 7ff76c3236bf 572->575 576 7ff76c3236b4-7ff76c3236bd call 7ff76c31e7d0 572->576 580 7ff76c3236c4-7ff76c3236c7 575->580 576->580 584 7ff76c3236c9 580->584 585 7ff76c3236cd-7ff76c3236d6 580->585 587 7ff76c3238e3-7ff76c3238e6 581->587 582->587 584->585 588 7ff76c3236d8 585->588 589 7ff76c3236db-7ff76c323722 call 7ff76c31feb0 call 7ff76c315550 call 7ff76c31e930 585->589 591 7ff76c3238e8-7ff76c3238f4 call 7ff76c31e7d0 587->591 592 7ff76c3238f6 587->592 588->589 606 7ff76c323740 589->606 607 7ff76c323724-7ff76c32373e call 7ff76c319730 589->607 596 7ff76c3238fb-7ff76c323923 call 7ff76c31e3b0 call 7ff76c315550 call 7ff76c320f20 591->596 592->596 612 7ff76c323929-7ff76c323995 call 7ff76c31e9a0 call 7ff76c31e780 call 7ff76c3172a0 call 7ff76c315550 call 7ff76c316fe0 596->612 613 7ff76c323782-7ff76c323836 call 7ff76c31e1a0 call 7ff76c31ec60 call 7ff76c315550 call 7ff76c320f20 call 7ff76c315550 * 5 call 7ff76c3784d0 596->613 611 7ff76c323747-7ff76c32374a 606->611 607->611 615 7ff76c32375a 611->615 616 7ff76c32374c-7ff76c323758 call 7ff76c31e7d0 611->616 647 7ff76c32399b-7ff76c323aff call 7ff76c320160 MessageBoxA 612->647 648 7ff76c323b01-7ff76c323b41 call 7ff76c315540 call 7ff76c320130 ShellExecuteA 612->648 620 7ff76c32375f-7ff76c323781 call 7ff76c31d360 call 7ff76c325050 call 7ff76c315550 615->620 616->620 620->613 657 7ff76c323b47-7ff76c323b4f exit 647->657 648->657 657->376
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memmove$??6?$basic_ostream@CreateD@std@@@std@@MessageStringU?$char_traits@UuidV01@exitmemcmp$?setw@std@@FreeJ@1@_Smanip@_ThreadU?$_V21@@Vios_base@1@memsetsystem
                                            • String ID: 9/0$$B@QU$BFTG$CEJB$GN_^$K\C$ND[C$Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $WA$W]GP$YN_^$^R\H
                                            • API String ID: 2665268123-4031576690
                                            • Opcode ID: aeaec02193e3c949c61d92025d3771b3f9f26bf87d2a4300e1b57fdd01a6c616
                                            • Instruction ID: 46c1f4aaba596466822b8fdaa6264fd32f4599e82e7404b9bcbc1128a09f0a89
                                            • Opcode Fuzzy Hash: aeaec02193e3c949c61d92025d3771b3f9f26bf87d2a4300e1b57fdd01a6c616
                                            • Instruction Fuzzy Hash: A9A2E222918BC1C9EB21EF35D8457ECB761FB85748F801239DA8D1BA9ADF78D284C351

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 665 7ff76c3428d0-7ff76c3428ec 666 7ff76c3428ee-7ff76c342900 WSAStartup 665->666 667 7ff76c342936-7ff76c34293d call 7ff76c36b6d0 665->667 669 7ff76c342919-7ff76c342935 call 7ff76c3784d0 666->669 670 7ff76c342902-7ff76c342909 666->670 675 7ff76c342bff-7ff76c342c16 call 7ff76c3784d0 667->675 676 7ff76c342943-7ff76c342970 GetModuleHandleA 667->676 672 7ff76c34290b-7ff76c342911 670->672 673 7ff76c342913 WSACleanup 670->673 672->667 672->673 673->669 679 7ff76c34297e-7ff76c3429b3 GetProcAddress strpbrk 676->679 680 7ff76c342972-7ff76c342979 676->680 683 7ff76c3429db-7ff76c3429de 679->683 684 7ff76c3429b5-7ff76c3429bb 679->684 682 7ff76c342b03-7ff76c342bf7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 680->682 682->675 687 7ff76c342a0a-7ff76c342a21 GetSystemDirectoryA 683->687 688 7ff76c3429e0-7ff76c3429f3 GetProcAddress 683->688 685 7ff76c3429cd-7ff76c3429d6 LoadLibraryA 684->685 686 7ff76c3429bd-7ff76c3429c8 684->686 689 7ff76c342aca-7ff76c342adc 685->689 686->689 691 7ff76c342a27-7ff76c342a3a malloc 687->691 692 7ff76c342ac2 687->692 688->687 690 7ff76c3429f5-7ff76c342a05 LoadLibraryExA 688->690 689->682 693 7ff76c342ade-7ff76c342afc GetProcAddress 689->693 690->689 694 7ff76c342ab9-7ff76c342abc free 691->694 695 7ff76c342a3c-7ff76c342a4a GetSystemDirectoryA 691->695 692->689 693->682 694->692 695->694 697 7ff76c342a4c-7ff76c342a56 695->697 698 7ff76c342a60-7ff76c342a69 697->698 698->698 699 7ff76c342a6b-7ff76c342a70 698->699 700 7ff76c342a74-7ff76c342a7b 699->700 700->700 701 7ff76c342a7d-7ff76c342a86 700->701 702 7ff76c342a90-7ff76c342a9c 701->702 702->702 703 7ff76c342a9e-7ff76c342aa4 702->703 704 7ff76c342ab0 LoadLibraryA 703->704 705 7ff76c342aa6-7ff76c342aae 703->705 706 7ff76c342ab6 704->706 705->706 706->694
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                            • API String ID: 2612373469-2794540096
                                            • Opcode ID: 4872d325a19d9fb6c40740734e13ce5fd15efe50214027a5591dfac4347baa5e
                                            • Instruction ID: d96b88daff41a3446a2cdd1b9ae897527d44a13530ec28cbe7356f616543171a
                                            • Opcode Fuzzy Hash: 4872d325a19d9fb6c40740734e13ce5fd15efe50214027a5591dfac4347baa5e
                                            • Instruction Fuzzy Hash: 3B919421A0D782C1EB60AB13E9487B9B3A0FF89B85F848139C94E5B754EF2CE445C771

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 708 7ff76c341c20-7ff76c341c8d 709 7ff76c341c92-7ff76c341ca2 708->709 710 7ff76c341c8f 708->710 711 7ff76c341cb1-7ff76c341cc9 memmove 709->711 712 7ff76c341ca4-7ff76c341cac 709->712 710->709 713 7ff76c341cf8-7ff76c341d0b socket 711->713 714 7ff76c341ccb-7ff76c341cf6 call 7ff76c3301f0 * 2 711->714 712->711 716 7ff76c341d0e-7ff76c341d1a 713->716 714->716 718 7ff76c341d20-7ff76c341d28 716->718 719 7ff76c3421af 716->719 721 7ff76c341d2a-7ff76c341d32 call 7ff76c34e020 718->721 722 7ff76c341d37-7ff76c341d40 718->722 720 7ff76c3421b4-7ff76c3421dd call 7ff76c3784d0 719->720 721->722 726 7ff76c341d42-7ff76c341d4d 722->726 727 7ff76c341d50-7ff76c341d59 722->727 726->727 728 7ff76c341d6c-7ff76c341d70 727->728 729 7ff76c341d5b-7ff76c341d5e 727->729 734 7ff76c341d75-7ff76c341d87 call 7ff76c36a410 728->734 732 7ff76c34215a-7ff76c3421ad _errno * 3 call 7ff76c329bf0 call 7ff76c33f8d0 call 7ff76c340530 729->732 733 7ff76c341d64-7ff76c341d6a 729->733 732->720 733->734 734->732 740 7ff76c341d8d-7ff76c341db5 htons call 7ff76c33fa50 734->740 747 7ff76c341db7-7ff76c341dba 740->747 748 7ff76c341dbc-7ff76c341dc1 740->748 747->748 749 7ff76c341e2e 747->749 748->749 750 7ff76c341dc3-7ff76c341dcd 748->750 751 7ff76c341e31-7ff76c341e4d 749->751 750->751 752 7ff76c341dcf-7ff76c341dfb setsockopt 750->752 753 7ff76c341e7d-7ff76c341e80 751->753 754 7ff76c341e4f-7ff76c341e63 call 7ff76c342750 751->754 755 7ff76c341e29-7ff76c341e2c 752->755 756 7ff76c341dfd-7ff76c341e24 WSAGetLastError call 7ff76c329bf0 call 7ff76c33fa50 752->756 758 7ff76c341e82-7ff76c341ea7 getsockopt 753->758 759 7ff76c341ed4-7ff76c341ed7 753->759 768 7ff76c341e71-7ff76c341e7b 754->768 769 7ff76c341e65-7ff76c341e6f 754->769 755->751 756->755 762 7ff76c341ea9-7ff76c341eb1 758->762 763 7ff76c341eb3-7ff76c341ece setsockopt 758->763 764 7ff76c341edd-7ff76c341ee4 759->764 765 7ff76c341fbf-7ff76c341fc6 759->765 762->759 762->763 763->759 764->765 772 7ff76c341eea-7ff76c341f15 setsockopt 764->772 770 7ff76c341ffa-7ff76c342001 765->770 771 7ff76c341fc8-7ff76c341ff5 call 7ff76c3301f0 * 2 765->771 768->758 769->759 775 7ff76c342008-7ff76c342028 call 7ff76c36a380 call 7ff76c341590 770->775 776 7ff76c342003-7ff76c342006 770->776 799 7ff76c341ff7 771->799 800 7ff76c342045-7ff76c342047 771->800 773 7ff76c341f17-7ff76c341f29 call 7ff76c33fa50 772->773 774 7ff76c341f2e-7ff76c341fa2 call 7ff76c3422d0 * 2 WSAIoctl 772->774 773->765 774->765 797 7ff76c341fa4-7ff76c341fba WSAGetLastError call 7ff76c33fa50 774->797 780 7ff76c34205e-7ff76c342088 call 7ff76c34e020 call 7ff76c346b40 775->780 798 7ff76c34202a-7ff76c342038 call 7ff76c340530 775->798 776->775 776->780 801 7ff76c34208a-7ff76c34209a call 7ff76c32f750 780->801 802 7ff76c34209f-7ff76c3420a2 780->802 797->765 798->719 812 7ff76c34203e-7ff76c342040 798->812 799->770 800->770 809 7ff76c342049-7ff76c342059 call 7ff76c340530 800->809 801->802 806 7ff76c3420a8-7ff76c3420b0 802->806 807 7ff76c34214f-7ff76c342158 802->807 806->807 811 7ff76c3420b6-7ff76c3420bd 806->811 807->720 809->720 814 7ff76c3420e8-7ff76c3420f3 WSAGetLastError 811->814 815 7ff76c3420bf-7ff76c3420d4 connect 811->815 812->720 816 7ff76c342142-7ff76c342144 814->816 817 7ff76c3420f5-7ff76c3420fe 814->817 815->814 818 7ff76c3420d6-7ff76c3420d8 815->818 820 7ff76c34214b-7ff76c34214d 816->820 817->816 819 7ff76c342100-7ff76c342140 call 7ff76c329bf0 call 7ff76c33fa50 call 7ff76c340530 817->819 818->820 821 7ff76c3420da-7ff76c3420e3 818->821 819->720 820->720 821->720
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemmovesocket
                                            • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                            • API String ID: 1781130894-3868455274
                                            • Opcode ID: 2b5a2510aa50124972eb9ca0f9588a045ade6e9fe1a179ee9cc75cd6561153bb
                                            • Instruction ID: 1724880766089ba5d6f1ffb63e508408f7263cc5be8c27211fde564bcd8794d0
                                            • Opcode Fuzzy Hash: 2b5a2510aa50124972eb9ca0f9588a045ade6e9fe1a179ee9cc75cd6561153bb
                                            • Instruction Fuzzy Hash: 8EF1E671A08682C6E750EB26D844ABDB3A0FB45749FC0813DEA4D8B794DF3DE549CB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 828 7ff76c325740-7ff76c325785 829 7ff76c325790-7ff76c32579e 828->829 829->829 830 7ff76c3257a0-7ff76c3257af call 7ff76c3201f0 829->830 833 7ff76c3257b0-7ff76c3257c8 830->833 834 7ff76c3257d0-7ff76c3257de 833->834 834->834 835 7ff76c3257e0-7ff76c3257f1 call 7ff76c3201f0 834->835 838 7ff76c325822-7ff76c325847 GetCurrentProcess OpenProcessToken 835->838 839 7ff76c3257f3-7ff76c32581d call 7ff76c31feb0 call 7ff76c321a90 835->839 841 7ff76c32584d-7ff76c325879 GetTokenInformation malloc 838->841 842 7ff76c325944-7ff76c32594b 838->842 839->838 841->842 846 7ff76c32587f-7ff76c3258a0 GetTokenInformation 841->846 843 7ff76c32594d CloseHandle 842->843 844 7ff76c325953-7ff76c325956 842->844 843->844 849 7ff76c325958-7ff76c325982 call 7ff76c31feb0 call 7ff76c321a90 844->849 850 7ff76c325987-7ff76c325991 844->850 847 7ff76c32593b-7ff76c32593e free 846->847 848 7ff76c3258a6-7ff76c3258b1 IsValidSid 846->848 847->842 848->847 852 7ff76c3258b7-7ff76c3258d1 GetLengthSid malloc 848->852 849->850 854 7ff76c325997-7ff76c3259ad 850->854 855 7ff76c325a6c-7ff76c325a6f 850->855 852->847 857 7ff76c3258d3-7ff76c3258e6 InitializeAcl 852->857 856 7ff76c3259b0-7ff76c3259be 854->856 859 7ff76c325aa0-7ff76c325aab SleepEx 855->859 860 7ff76c325a71-7ff76c325a9b call 7ff76c31feb0 call 7ff76c321a90 855->860 856->856 861 7ff76c3259c0-7ff76c325a01 GetModuleHandleA GetCurrentProcess GetModuleInformation 856->861 862 7ff76c3258e8-7ff76c325901 AddAccessAllowedAce 857->862 863 7ff76c325932-7ff76c325935 free 857->863 859->833 860->859 866 7ff76c325a5e 861->866 867 7ff76c325a03-7ff76c325a0c 861->867 862->863 868 7ff76c325903-7ff76c32592e GetCurrentProcess SetSecurityInfo 862->868 863->847 872 7ff76c325a61-7ff76c325a65 866->872 871 7ff76c325a10-7ff76c325a1a 867->871 868->863 873 7ff76c325a1c-7ff76c325a2e 871->873 874 7ff76c325a4e-7ff76c325a54 871->874 872->855 875 7ff76c325a32-7ff76c325a35 873->875 874->872 876 7ff76c325a37-7ff76c325a3e 875->876 877 7ff76c325a40-7ff76c325a4c 875->877 876->877 878 7ff76c325a56-7ff76c325a5c 876->878 877->874 877->875 878->866 878->871
                                            APIs
                                            Strings
                                            • Pattern checksum failed, don't tamper with the program., xrefs: 00007FF76C325A7B
                                            • check_section_integrity() failed, don't tamper with the program., xrefs: 00007FF76C3257FD
                                            • LockMemAccess() failed, don't tamper with the program., xrefs: 00007FF76C325962
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Process$CurrentInformationToken$HandleModulefreemalloc$AccessAllowedCloseInfoInitializeLengthOpenSecuritySleepValid
                                            • String ID: LockMemAccess() failed, don't tamper with the program.$Pattern checksum failed, don't tamper with the program.$check_section_integrity() failed, don't tamper with the program.
                                            • API String ID: 2765164163-3085296333
                                            • Opcode ID: dbc6a34358edf015fdd5a397761274142b1365d3841517b9439bd518cf2b0785
                                            • Instruction ID: 1f47b1ee9ec3be01c84302f710944a22197094be731c704e9f6eaae5e9a9308f
                                            • Opcode Fuzzy Hash: dbc6a34358edf015fdd5a397761274142b1365d3841517b9439bd518cf2b0785
                                            • Instruction Fuzzy Hash: 42A19E32A19782C9EB00EF62D455ABDB7B0FB45B49F804538DA4D1BA99DF3CD209C325

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1367 7ff76c329400-7ff76c32943c GetLastError _errno 1368 7ff76c32943e-7ff76c329440 1367->1368 1369 7ff76c329445-7ff76c32944e 1367->1369 1370 7ff76c3299d3-7ff76c3299f0 call 7ff76c3784d0 1368->1370 1371 7ff76c32986e-7ff76c329874 1369->1371 1372 7ff76c329454 1369->1372 1374 7ff76c329898-7ff76c3298a1 1371->1374 1375 7ff76c329876 1371->1375 1376 7ff76c32945a-7ff76c329463 1372->1376 1377 7ff76c329862-7ff76c329869 1372->1377 1382 7ff76c329920-7ff76c32992d 1374->1382 1383 7ff76c3298a3-7ff76c3298bb 1374->1383 1380 7ff76c329878-7ff76c32987a 1375->1380 1381 7ff76c32988c-7ff76c329893 1375->1381 1376->1382 1384 7ff76c329469-7ff76c329479 1376->1384 1378 7ff76c329485-7ff76c329508 call 7ff76c32e190 FormatMessageA strchr 1377->1378 1390 7ff76c32950e-7ff76c329519 1378->1390 1391 7ff76c329950-7ff76c329972 1378->1391 1380->1382 1386 7ff76c329880-7ff76c329887 1380->1386 1381->1378 1382->1378 1387 7ff76c329933-7ff76c32994b call 7ff76c32e190 1382->1387 1383->1382 1384->1378 1386->1378 1397 7ff76c3299aa-7ff76c3299b3 _errno 1387->1397 1393 7ff76c32994d 1390->1393 1394 7ff76c32951f-7ff76c329523 1390->1394 1395 7ff76c329997-7ff76c3299a5 strncpy 1391->1395 1396 7ff76c329974-7ff76c329995 call 7ff76c32e190 1391->1396 1393->1391 1394->1393 1398 7ff76c329529-7ff76c32952d 1394->1398 1395->1397 1396->1397 1400 7ff76c3299be-7ff76c3299c6 GetLastError 1397->1400 1401 7ff76c3299b5-7ff76c3299bb _errno 1397->1401 1398->1391 1402 7ff76c3299c8-7ff76c3299ca SetLastError 1400->1402 1403 7ff76c3299d0 1400->1403 1401->1400 1402->1403 1403->1370
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno
                                            • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                            • API String ID: 3939687465-1752685260
                                            • Opcode ID: d1cd40ccc3b4c734d3b50056bbea7e2c8efc7a7ceefb2c843091186e0d6d3f74
                                            • Instruction ID: ab83a41ccf26345b83fd4de492a6bfffe01216459128ea0a08f01161b71811ed
                                            • Opcode Fuzzy Hash: d1cd40ccc3b4c734d3b50056bbea7e2c8efc7a7ceefb2c843091186e0d6d3f74
                                            • Instruction Fuzzy Hash: 6651C121A0C782C9FB60AF22A445BBAF765FB85796FC44539CA4D06695CF3CE404C632

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,00000000,00007FF76C36B70A,?,?,?,?,00007FF76C34293B), ref: 00007FF76C3425C4
                                            • GetProcAddress.KERNEL32(?,?,?,?,00007FF76C34293B), ref: 00007FF76C3425E9
                                            • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00007FF76C34293B), ref: 00007FF76C3425FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                            • API String ID: 27745253-3327535076
                                            • Opcode ID: 315b0eebd0cc31cdeae7e4329cee2aba8adf1212ef2c096617c568d4166ec44f
                                            • Instruction ID: 5bc3f62950d12a33333216e696a1571bc72be3be8bfcc5e10e33f783e04f1c03
                                            • Opcode Fuzzy Hash: 315b0eebd0cc31cdeae7e4329cee2aba8adf1212ef2c096617c568d4166ec44f
                                            • Instruction Fuzzy Hash: 5341FC12B0A642C1FB05AF17A904539B7A1EF46BE2F888138CE0D4B790DE3DD48AC731

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1433 7ff76c34ddf0-7ff76c34de3e socket 1434 7ff76c34de45-7ff76c34de9e htonl setsockopt 1433->1434 1435 7ff76c34de40 1433->1435 1437 7ff76c34dfcb-7ff76c34dfe7 closesocket * 3 1434->1437 1438 7ff76c34dea4-7ff76c34deb9 bind 1434->1438 1436 7ff76c34dff4-7ff76c34e012 call 7ff76c3784d0 1435->1436 1439 7ff76c34dfec 1437->1439 1438->1437 1440 7ff76c34debf-7ff76c34ded5 getsockname 1438->1440 1439->1436 1440->1437 1442 7ff76c34dedb-7ff76c34deea listen 1440->1442 1442->1437 1444 7ff76c34def0-7ff76c34df05 socket 1442->1444 1444->1437 1445 7ff76c34df0b-7ff76c34df20 connect 1444->1445 1445->1437 1446 7ff76c34df26-7ff76c34df3c accept 1445->1446 1446->1437 1447 7ff76c34df42-7ff76c34df5e call 7ff76c32e190 1446->1447 1450 7ff76c34df65-7ff76c34df6c 1447->1450 1450->1450 1451 7ff76c34df6e-7ff76c34df88 send 1450->1451 1451->1437 1452 7ff76c34df8a-7ff76c34dfa6 recv 1451->1452 1452->1437 1453 7ff76c34dfa8-7ff76c34dfbc call 7ff76c37963e 1452->1453 1453->1437 1456 7ff76c34dfbe-7ff76c34dfc9 closesocket 1453->1456 1456->1439
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenrecvsendsetsockopt
                                            • String ID:
                                            • API String ID: 168862445-0
                                            • Opcode ID: d63aad0e708308e9982271fd4dfb771163dbcc6aadaa09a663a9854ceda95677
                                            • Instruction ID: d100117b0c7db6e17c71c865b2a2f858dc0ed31eface30fc6b32197ffd396296
                                            • Opcode Fuzzy Hash: d63aad0e708308e9982271fd4dfb771163dbcc6aadaa09a663a9854ceda95677
                                            • Instruction Fuzzy Hash: 7E51C831618A81C1D720AF26E844969B361FF45BB6F905738EA7E0BAE4DF3CD449C721

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1457 7ff76c3408e0-7ff76c34092d 1458 7ff76c340938-7ff76c340973 call 7ff76c346b40 1457->1458 1459 7ff76c34092f-7ff76c340933 1457->1459 1465 7ff76c340978-7ff76c34097b 1458->1465 1466 7ff76c340975 1458->1466 1460 7ff76c340e56-7ff76c340e74 call 7ff76c3784d0 1459->1460 1467 7ff76c340998 1465->1467 1468 7ff76c34097d-7ff76c340980 1465->1468 1466->1465 1471 7ff76c34099b-7ff76c3409c7 call 7ff76c346bd0 1467->1471 1469 7ff76c340982-7ff76c340985 1468->1469 1470 7ff76c340993-7ff76c340996 1468->1470 1469->1471 1472 7ff76c340987-7ff76c340991 1469->1472 1470->1471 1475 7ff76c3409c9-7ff76c3409dd call 7ff76c33f8d0 1471->1475 1476 7ff76c3409e2-7ff76c3409ea 1471->1476 1472->1471 1483 7ff76c340e46-7ff76c340e4e 1475->1483 1478 7ff76c340a19-7ff76c340a37 1476->1478 1479 7ff76c3409ec-7ff76c3409fe call 7ff76c341ab0 1476->1479 1482 7ff76c340a40-7ff76c340a55 1478->1482 1488 7ff76c340a12-7ff76c340a14 1479->1488 1489 7ff76c340a00-7ff76c340a02 1479->1489 1485 7ff76c340cda 1482->1485 1486 7ff76c340a5b-7ff76c340a6f call 7ff76c34f370 1482->1486 1483->1460 1487 7ff76c340cde-7ff76c340cef 1485->1487 1494 7ff76c340bf0-7ff76c340bf3 1486->1494 1495 7ff76c340a75-7ff76c340aa0 call 7ff76c346bd0 1486->1495 1487->1482 1491 7ff76c340cf5-7ff76c340cf7 1487->1491 1488->1483 1489->1488 1492 7ff76c340a04-7ff76c340a0d call 7ff76c341bc0 1489->1492 1496 7ff76c340cfd-7ff76c340d14 call 7ff76c3421e0 1491->1496 1497 7ff76c340e3c 1491->1497 1492->1488 1499 7ff76c340bf5-7ff76c340bfc 1494->1499 1500 7ff76c340c64-7ff76c340caa SleepEx getsockopt 1494->1500 1511 7ff76c340ab9-7ff76c340abc 1495->1511 1512 7ff76c340aa2-7ff76c340ab4 call 7ff76c33fa50 1495->1512 1513 7ff76c340d1a-7ff76c340d21 1496->1513 1514 7ff76c340dc7-7ff76c340dc9 1496->1514 1503 7ff76c340e3e 1497->1503 1499->1500 1504 7ff76c340bfe-7ff76c340c00 1499->1504 1507 7ff76c340cac-7ff76c340cb4 WSAGetLastError 1500->1507 1508 7ff76c340cb6 1500->1508 1503->1483 1509 7ff76c340b0f-7ff76c340b11 1504->1509 1510 7ff76c340c06-7ff76c340c4c SleepEx getsockopt 1504->1510 1515 7ff76c340cba-7ff76c340cbc 1507->1515 1508->1515 1509->1485 1525 7ff76c340b17-7ff76c340b2c WSASetLastError 1509->1525 1516 7ff76c340c4e-7ff76c340c56 WSAGetLastError 1510->1516 1517 7ff76c340c5b-7ff76c340c5f 1510->1517 1521 7ff76c340abe-7ff76c340ac5 1511->1521 1522 7ff76c340b0b 1511->1522 1512->1511 1519 7ff76c340d27-7ff76c340d2e 1513->1519 1520 7ff76c340dcb-7ff76c340dd2 1513->1520 1514->1503 1523 7ff76c340cbe-7ff76c340cc4 1515->1523 1524 7ff76c340d33-7ff76c340d81 1515->1524 1516->1509 1517->1509 1530 7ff76c340df6-7ff76c340e39 call 7ff76c329bf0 call 7ff76c33f8d0 1519->1530 1527 7ff76c340ddd-7ff76c340de4 1520->1527 1528 7ff76c340dd4-7ff76c340ddb 1520->1528 1521->1522 1531 7ff76c340ac7-7ff76c340af3 call 7ff76c346bd0 1521->1531 1522->1509 1523->1524 1534 7ff76c340cc6-7ff76c340cd5 call 7ff76c33fa50 1523->1534 1532 7ff76c340d96-7ff76c340dab call 7ff76c341ab0 1524->1532 1533 7ff76c340d83-7ff76c340d8b call 7ff76c340530 1524->1533 1525->1485 1526 7ff76c340b32-7ff76c340b9c call 7ff76c347f30 call 7ff76c329bf0 call 7ff76c33fa50 1525->1526 1560 7ff76c340bbe-7ff76c340bd4 call 7ff76c3421e0 1526->1560 1561 7ff76c340b9e-7ff76c340ba5 1526->1561 1536 7ff76c340def 1527->1536 1537 7ff76c340de6-7ff76c340ded 1527->1537 1528->1530 1530->1497 1531->1522 1551 7ff76c340af5-7ff76c340b06 call 7ff76c3421e0 1531->1551 1532->1503 1552 7ff76c340db1-7ff76c340db3 1532->1552 1533->1532 1534->1485 1536->1530 1537->1530 1551->1522 1552->1503 1556 7ff76c340db9-7ff76c340dc2 call 7ff76c341bc0 1552->1556 1556->1514 1567 7ff76c340be7-7ff76c340beb 1560->1567 1568 7ff76c340bd6-7ff76c340be1 1560->1568 1561->1560 1562 7ff76c340ba7-7ff76c340bae 1561->1562 1564 7ff76c340bb0-7ff76c340bb3 1562->1564 1564->1560 1566 7ff76c340bb5-7ff76c340bbc 1564->1566 1566->1560 1566->1564 1567->1487 1568->1485 1568->1567
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                            • API String ID: 0-3307081561
                                            • Opcode ID: 35ddda60072be1b82066e66c520409bd8b5c02298e670ff7c99eea46cb2c83e1
                                            • Instruction ID: 9e372e973942a89ae3459c49769db6b0440342b1c9ddd73871d4fce90778a1f2
                                            • Opcode Fuzzy Hash: 35ddda60072be1b82066e66c520409bd8b5c02298e670ff7c99eea46cb2c83e1
                                            • Instruction Fuzzy Hash: C1E10331B08AC2C2EB54AB26D944ABDB7A0FB45795F808239EA5D0B7D1DF3CE458C711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freerecv
                                            • String ID:
                                            • API String ID: 2032557106-0
                                            • Opcode ID: cbf2f302d8d5cbd4e250dcd541a8e96e372b699c05a7429feaa5665b8696d7b8
                                            • Instruction ID: 9b374ff76163412c4385f682bc0c429ab34c9cd581caf4c98f02e01f7eb17dbb
                                            • Opcode Fuzzy Hash: cbf2f302d8d5cbd4e250dcd541a8e96e372b699c05a7429feaa5665b8696d7b8
                                            • Instruction Fuzzy Hash: 28C10836A086D2C6EB759B26D440BBAB2A0FF487A9F844239DE9E437C4DF3CD4418751

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 879 7ff76c353de0-7ff76c353e4e 880 7ff76c353e70 879->880 881 7ff76c353e50-7ff76c353e65 879->881 883 7ff76c353e77-7ff76c353e91 880->883 881->880 882 7ff76c353e67-7ff76c353e6e 881->882 882->883 884 7ff76c35455b 883->884 885 7ff76c353e97-7ff76c353e9c 883->885 885->884 886 7ff76c353ea2-7ff76c353eb0 885->886 887 7ff76c353ef2-7ff76c353ef6 886->887 888 7ff76c353eb2-7ff76c353eec malloc 886->888 890 7ff76c353ef8-7ff76c353f3d malloc 887->890 891 7ff76c353f43-7ff76c353f54 887->891 888->887 889 7ff76c35454f 888->889 889->884 890->889 890->891 892 7ff76c353fc8-7ff76c353fca 891->892 893 7ff76c353f56-7ff76c353f70 realloc 891->893 894 7ff76c353fcc-7ff76c353ff0 call 7ff76c33fc50 892->894 895 7ff76c35402a-7ff76c3540d1 call 7ff76c342310 malloc 892->895 896 7ff76c353fb0-7ff76c353fc6 893->896 897 7ff76c353f72-7ff76c353f7c call 7ff76c33f8d0 893->897 901 7ff76c353ff5-7ff76c353ff8 894->901 895->889 906 7ff76c3540d7-7ff76c3540f1 memmove 895->906 896->892 903 7ff76c353f81 897->903 904 7ff76c353ffe-7ff76c354000 901->904 905 7ff76c35426f-7ff76c354276 901->905 907 7ff76c353f86-7ff76c353faf call 7ff76c3784d0 903->907 908 7ff76c354256-7ff76c35426a call 7ff76c33f8d0 904->908 909 7ff76c354006-7ff76c35400e 904->909 910 7ff76c35427c-7ff76c354288 905->910 911 7ff76c354548-7ff76c35454a 905->911 906->903 912 7ff76c3540f7-7ff76c354163 free 906->912 908->907 909->908 916 7ff76c354014-7ff76c354026 909->916 910->907 911->907 919 7ff76c354169-7ff76c354170 912->919 920 7ff76c354533-7ff76c35453a 912->920 916->895 921 7ff76c3544dc-7ff76c3544e8 919->921 922 7ff76c354176-7ff76c35417d 919->922 923 7ff76c35453e 920->923 926 7ff76c35451b-7ff76c35452e 921->926 927 7ff76c3544ea-7ff76c3544fa call 7ff76c329400 921->927 924 7ff76c354188-7ff76c35418f 922->924 925 7ff76c35417f-7ff76c354182 922->925 923->911 929 7ff76c354190-7ff76c354194 924->929 925->924 928 7ff76c35428d-7ff76c354294 925->928 926->907 933 7ff76c3544ff-7ff76c354516 call 7ff76c33f8d0 927->933 934 7ff76c3542d4-7ff76c3542fd call 7ff76c329400 call 7ff76c33f8d0 928->934 935 7ff76c354296-7ff76c35429d 928->935 931 7ff76c3541d3-7ff76c3541da 929->931 932 7ff76c354196-7ff76c35419a 929->932 939 7ff76c3541dc 931->939 940 7ff76c3541e9-7ff76c3541f2 931->940 932->931 937 7ff76c35419c-7ff76c3541c2 call 7ff76c340190 932->937 933->907 934->903 935->927 941 7ff76c3542a3-7ff76c3542cf call 7ff76c329400 call 7ff76c33f8d0 935->941 954 7ff76c3541c8-7ff76c3541cd 937->954 955 7ff76c354302-7ff76c354323 call 7ff76c33f8d0 937->955 939->940 940->929 946 7ff76c3541f4-7ff76c3541f8 940->946 941->907 950 7ff76c3541fe-7ff76c354203 946->950 951 7ff76c354328-7ff76c35432f 946->951 950->951 952 7ff76c354209-7ff76c35421a 950->952 956 7ff76c354337-7ff76c35433e 951->956 952->956 958 7ff76c354220-7ff76c354244 memmove 952->958 954->931 954->955 955->907 956->923 960 7ff76c354344-7ff76c354347 956->960 958->960 962 7ff76c35424a-7ff76c35424f 958->962 964 7ff76c354349 960->964 965 7ff76c354353-7ff76c35435b 960->965 962->908 964->965 966 7ff76c35435d-7ff76c354377 965->966 967 7ff76c354383 965->967 966->967 969 7ff76c354379-7ff76c354381 966->969 968 7ff76c35438b-7ff76c35438e 967->968 970 7ff76c354394-7ff76c3543c5 968->970 971 7ff76c3544b0-7ff76c3544b8 968->971 969->968 976 7ff76c3543cb-7ff76c3543d3 970->976 977 7ff76c354483-7ff76c3544ae call 7ff76c329400 call 7ff76c33f8d0 970->977 971->911 972 7ff76c3544be-7ff76c3544c9 971->972 972->911 973 7ff76c3544cb-7ff76c3544d7 call 7ff76c36ed20 972->973 973->907 976->977 979 7ff76c3543d9-7ff76c3543dc 976->979 982 7ff76c354455-7ff76c354458 977->982 981 7ff76c3543de-7ff76c3543e5 979->981 979->982 986 7ff76c3543e7-7ff76c35440e memset call 7ff76c371700 981->986 987 7ff76c354450 981->987 984 7ff76c35445a CertFreeCertificateContext 982->984 985 7ff76c354460-7ff76c354462 982->985 984->985 985->971 989 7ff76c354464-7ff76c354475 call 7ff76c33f8d0 985->989 995 7ff76c35444b 986->995 996 7ff76c354410-7ff76c35441a 986->996 987->982 989->907 995->987 997 7ff76c35441c-7ff76c354426 996->997 998 7ff76c35447a-7ff76c354481 996->998 997->998 1000 7ff76c354428-7ff76c35443a call 7ff76c339040 997->1000 999 7ff76c354443-7ff76c354446 call 7ff76c33f8d0 998->999 999->995 1000->995 1004 7ff76c35443c 1000->1004 1004->999
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: malloc$memmove$CertCertificateContextFreefreememsetrealloc
                                            • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                            • API String ID: 3540109735-3059304359
                                            • Opcode ID: 01a8396fcf8a8984c2b0b77adef490cd8866a73293fdb215e71c9c8c00139fae
                                            • Instruction ID: cb2f96bd85774b4158801cb00d96b93126435d3715f91347e17a7ee6567d7ace
                                            • Opcode Fuzzy Hash: 01a8396fcf8a8984c2b0b77adef490cd8866a73293fdb215e71c9c8c00139fae
                                            • Instruction Fuzzy Hash: 0212BF72A08B81C5EB64DB2AD840BAEBBA4FB44B86F90013ADB5D47794DF3CE451C711

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1005 7ff76c353000-7ff76c353070 1006 7ff76c35308f 1005->1006 1007 7ff76c353072-7ff76c353084 1005->1007 1009 7ff76c353096-7ff76c3530b0 call 7ff76c342750 1006->1009 1007->1006 1008 7ff76c353086-7ff76c35308d 1007->1008 1008->1009 1012 7ff76c3530c1-7ff76c3530c8 1009->1012 1013 7ff76c3530b2-7ff76c3530bc call 7ff76c33fa50 1009->1013 1015 7ff76c353108 1012->1015 1016 7ff76c3530ca-7ff76c3530ea GetModuleHandleA GetProcAddress 1012->1016 1013->1012 1017 7ff76c35310a-7ff76c35311b 1015->1017 1016->1015 1018 7ff76c3530ec-7ff76c353102 call 7ff76c342750 1016->1018 1019 7ff76c35311d-7ff76c353135 1017->1019 1020 7ff76c353140 1017->1020 1018->1015 1025 7ff76c353104-7ff76c353106 1018->1025 1019->1020 1023 7ff76c353137-7ff76c35313e 1019->1023 1024 7ff76c353147-7ff76c35314a 1020->1024 1023->1024 1026 7ff76c35318b-7ff76c353192 1024->1026 1027 7ff76c35314c-7ff76c353163 call 7ff76c342750 1024->1027 1025->1017 1028 7ff76c353196-7ff76c3531a7 1026->1028 1035 7ff76c353165-7ff76c353170 1027->1035 1036 7ff76c353172-7ff76c353186 call 7ff76c33f8d0 1027->1036 1030 7ff76c3531cc 1028->1030 1031 7ff76c3531a9-7ff76c3531c1 1028->1031 1034 7ff76c3531d3-7ff76c3531d5 1030->1034 1031->1030 1033 7ff76c3531c3-7ff76c3531ca 1031->1033 1033->1034 1037 7ff76c3531d7-7ff76c3531f3 call 7ff76c33a2c0 call 7ff76c339ce0 1034->1037 1038 7ff76c353218-7ff76c353222 1034->1038 1035->1028 1048 7ff76c353d8d-7ff76c353db6 call 7ff76c3784d0 1036->1048 1067 7ff76c3531f5-7ff76c35320d 1037->1067 1068 7ff76c353210-7ff76c353213 call 7ff76c33a2f0 1037->1068 1041 7ff76c353a97-7ff76c353aae call 7ff76c350c90 1038->1041 1042 7ff76c353228-7ff76c353253 1038->1042 1055 7ff76c353ac3-7ff76c353acd call 7ff76c33fa50 1041->1055 1056 7ff76c353ab0-7ff76c353ac1 call 7ff76c350c90 1041->1056 1046 7ff76c35328b 1042->1046 1047 7ff76c353255-7ff76c35326c 1042->1047 1052 7ff76c353290-7ff76c35329a 1046->1052 1049 7ff76c35326e-7ff76c353273 1047->1049 1050 7ff76c353275-7ff76c35327c 1047->1050 1049->1052 1058 7ff76c35327e-7ff76c353283 1050->1058 1059 7ff76c353285-7ff76c353289 1050->1059 1060 7ff76c35329c-7ff76c35329f 1052->1060 1061 7ff76c3532a2-7ff76c3532ad 1052->1061 1070 7ff76c353ad2-7ff76c353add 1055->1070 1056->1055 1056->1070 1058->1052 1059->1052 1060->1061 1065 7ff76c3532b3-7ff76c3532c8 1061->1065 1066 7ff76c353a7f-7ff76c353a8e call 7ff76c33f8d0 1061->1066 1065->1066 1078 7ff76c353d88 1066->1078 1067->1068 1068->1038 1073 7ff76c353ae3-7ff76c353b64 call 7ff76c33fa50 call 7ff76c3422e0 1070->1073 1074 7ff76c353b66-7ff76c353b78 1070->1074 1077 7ff76c353b7d-7ff76c353bd5 calloc 1073->1077 1074->1077 1080 7ff76c353bd7-7ff76c353be1 call 7ff76c33f8d0 1077->1080 1081 7ff76c353bf0-7ff76c353bf3 1077->1081 1078->1048 1083 7ff76c353be6-7ff76c353beb 1080->1083 1082 7ff76c353bf5-7ff76c353c53 1081->1082 1081->1083 1088 7ff76c353cfc-7ff76c353d18 call 7ff76c340190 1082->1088 1089 7ff76c353c59-7ff76c353c88 free 1082->1089 1083->1048 1096 7ff76c353d1d-7ff76c353d3a 1088->1096 1090 7ff76c353c8a-7ff76c353c90 1089->1090 1091 7ff76c353cd6-7ff76c353cf7 call 7ff76c329400 call 7ff76c33f8d0 1089->1091 1094 7ff76c353cb0-7ff76c353cd1 call 7ff76c329400 call 7ff76c33f8d0 1090->1094 1095 7ff76c353c92-7ff76c353cab call 7ff76c329400 call 7ff76c33f8d0 1090->1095 1091->1048 1094->1048 1095->1078 1106 7ff76c353d3c-7ff76c353d3f 1096->1106 1107 7ff76c353d79-7ff76c353d83 call 7ff76c33f8d0 1096->1107 1106->1107 1110 7ff76c353d41-7ff76c353d77 1106->1110 1107->1078 1110->1048
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                            • API String ID: 1646373207-2477831187
                                            • Opcode ID: ebe7249b8a623ee0adaacdaa9af966c55755f1c81da76e672cad530d957ca62b
                                            • Instruction ID: 196fac7203bf3bdecadde02b565af7431d39cbec18949d36731a87dd927e8999
                                            • Opcode Fuzzy Hash: ebe7249b8a623ee0adaacdaa9af966c55755f1c81da76e672cad530d957ca62b
                                            • Instruction Fuzzy Hash: F702D172A08B81CAEB90AB26D840BEDBBA4FB44786F804139DB4D47791DF3CE545C751

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1113 7ff76c335210-7ff76c33525b calloc 1114 7ff76c33539e-7ff76c3353a7 _errno 1113->1114 1115 7ff76c335261-7ff76c3352ea malloc 1113->1115 1118 7ff76c3353a9-7ff76c3353c5 1114->1118 1116 7ff76c335327-7ff76c33532e 1115->1116 1117 7ff76c3352ec-7ff76c335311 InitializeCriticalSectionEx call 7ff76c34ddf0 1115->1117 1120 7ff76c335340-7ff76c335351 free 1116->1120 1121 7ff76c335330-7ff76c33533a DeleteCriticalSection free 1116->1121 1125 7ff76c335317-7ff76c33531f 1117->1125 1126 7ff76c3353c6-7ff76c3353da _strdup 1117->1126 1123 7ff76c335358-7ff76c335360 1120->1123 1124 7ff76c335353 call 7ff76c351a10 1120->1124 1121->1120 1128 7ff76c335368-7ff76c335398 free 1123->1128 1129 7ff76c335362 closesocket 1123->1129 1124->1123 1125->1116 1126->1116 1130 7ff76c3353e0-7ff76c335400 free _strdup 1126->1130 1128->1114 1129->1128 1131 7ff76c33542e-7ff76c335438 1130->1131 1132 7ff76c335402-7ff76c335411 call 7ff76c3520e0 1130->1132 1134 7ff76c33543a-7ff76c335462 EnterCriticalSection LeaveCriticalSection 1131->1134 1135 7ff76c3354b1-7ff76c3354cc free 1131->1135 1136 7ff76c335416-7ff76c33541c 1132->1136 1137 7ff76c335475-7ff76c335478 1134->1137 1138 7ff76c335464-7ff76c33546c CloseHandle 1134->1138 1135->1114 1139 7ff76c33546e-7ff76c335470 1136->1139 1140 7ff76c33541e-7ff76c33542b _errno 1136->1140 1142 7ff76c33547a-7ff76c33547d call 7ff76c352130 1137->1142 1143 7ff76c335482-7ff76c335492 call 7ff76c335090 free 1137->1143 1141 7ff76c335498-7ff76c33549b 1138->1141 1139->1118 1140->1131 1146 7ff76c3354a8-7ff76c3354ab closesocket 1141->1146 1147 7ff76c33549d-7ff76c3354a3 call 7ff76c32fa60 1141->1147 1142->1143 1143->1141 1146->1135 1147->1146
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                            • String ID:
                                            • API String ID: 259767416-0
                                            • Opcode ID: 3cea796c4ab6d43bb44ebccbaba82a4bb8b4cab9e88935d4d37f5a9545faa07b
                                            • Instruction ID: 5e5c046bc69af685bf82a1aff555da3ba940078f937d7a97c887404e6de1ec54
                                            • Opcode Fuzzy Hash: 3cea796c4ab6d43bb44ebccbaba82a4bb8b4cab9e88935d4d37f5a9545faa07b
                                            • Instruction Fuzzy Hash: 8D815B26E09B81C2E624EF22E450669B370FB99B65F445239CB9E037A1DF78E4D48311
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                            • API String ID: 0-760484938
                                            • Opcode ID: a4ee3c226da19ac9b3bfc119dafb89bea3250f5e273201e9c10916868d071bb9
                                            • Instruction ID: bb986652e40e33c38dbfba7af99dbcae924b1dd76d75aca35cc1a316ea5b1617
                                            • Opcode Fuzzy Hash: a4ee3c226da19ac9b3bfc119dafb89bea3250f5e273201e9c10916868d071bb9
                                            • Instruction Fuzzy Hash: 0C42B322A09BC2D1EB98AB26D540BF9B3A0FB45B85F844139CE5D47795DF3CE461C322

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1569 7ff76c320410-7ff76c3204aa GetModuleFileNameA 1570 7ff76c3204b1-7ff76c3204b8 1569->1570 1570->1570 1571 7ff76c3204ba-7ff76c320507 call 7ff76c31feb0 call 7ff76c323bc0 1570->1571 1576 7ff76c320509-7ff76c32050c 1571->1576 1577 7ff76c320524-7ff76c3205aa call 7ff76c31feb0 call 7ff76c323bc0 1571->1577 1579 7ff76c320510-7ff76c32051e 1576->1579 1584 7ff76c3205ac-7ff76c3205be 1577->1584 1585 7ff76c3205e2-7ff76c320636 _popen 1577->1585 1579->1579 1580 7ff76c320520 1579->1580 1580->1577 1586 7ff76c3205dc-7ff76c3205e1 call 7ff76c378774 1584->1586 1587 7ff76c3205c0-7ff76c3205d3 1584->1587 1588 7ff76c32063c-7ff76c320651 fgets 1585->1588 1589 7ff76c3207a3-7ff76c3207e1 call 7ff76c31ea10 call 7ff76c31db90 _CxxThrowException 1585->1589 1586->1585 1587->1586 1590 7ff76c3205d5-7ff76c3205db _invalid_parameter_noinfo_noreturn 1587->1590 1593 7ff76c32069d-7ff76c3206b0 _pclose 1588->1593 1594 7ff76c320653-7ff76c320657 1588->1594 1590->1586 1595 7ff76c3206e7-7ff76c320702 1593->1595 1596 7ff76c3206b2-7ff76c3206c4 1593->1596 1599 7ff76c320660-7ff76c32066b 1594->1599 1603 7ff76c32073a-7ff76c320742 1595->1603 1604 7ff76c320704-7ff76c320716 1595->1604 1601 7ff76c3206e2 call 7ff76c378774 1596->1601 1602 7ff76c3206c6-7ff76c3206d9 1596->1602 1600 7ff76c320670-7ff76c320678 1599->1600 1600->1600 1606 7ff76c32067a-7ff76c32069b call 7ff76c31feb0 fgets 1600->1606 1601->1595 1602->1601 1609 7ff76c3206db-7ff76c3206e1 _invalid_parameter_noinfo_noreturn 1602->1609 1607 7ff76c320778-7ff76c3207a2 call 7ff76c3784d0 1603->1607 1608 7ff76c320744-7ff76c320755 1603->1608 1611 7ff76c320718-7ff76c32072b 1604->1611 1612 7ff76c320734-7ff76c320739 call 7ff76c378774 1604->1612 1606->1593 1606->1599 1615 7ff76c320757-7ff76c32076a 1608->1615 1616 7ff76c320773 call 7ff76c378774 1608->1616 1609->1601 1611->1612 1618 7ff76c32072d-7ff76c320733 _invalid_parameter_noinfo_noreturn 1611->1618 1612->1603 1615->1616 1622 7ff76c32076c-7ff76c320772 _invalid_parameter_noinfo_noreturn 1615->1622 1616->1607 1618->1612 1622->1616
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$fgets$ExceptionFileModuleNameThrow__std_exception_copy_pclose_popen
                                            • String ID: >$certutil -hashfile "
                                            • API String ID: 2652878437-631556956
                                            • Opcode ID: 42e81e09b282e3ce56ef6d79b2f5cfc8eb907fe3127405b72f82002261537153
                                            • Instruction ID: 36518cf0929d4239c9c3a83192f9e9c4590ff9e65257455beac7d85c0923a8aa
                                            • Opcode Fuzzy Hash: 42e81e09b282e3ce56ef6d79b2f5cfc8eb907fe3127405b72f82002261537153
                                            • Instruction Fuzzy Hash: 8AB1E232A18B81C5FB109B25E4407ADB771FB857A8F905239EA9D13AE9DF3CD184C721

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnogetpeernamegetsockname
                                            • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                            • API String ID: 2911674258-670633250
                                            • Opcode ID: dfd64f3e4ee894f2a2cd0aee9ce05e39984ea76269b8298c7e1ada0bd8398cfe
                                            • Instruction ID: 6a272b5d2c71c30a93a880c1f272af6f1047a3dcdfb08cb26bd467f4ded79a2f
                                            • Opcode Fuzzy Hash: dfd64f3e4ee894f2a2cd0aee9ce05e39984ea76269b8298c7e1ada0bd8398cfe
                                            • Instruction Fuzzy Hash: AD91B032A19BC1C2D710DF26D4446E9B3A0FB99B88F84923ADE4C4B715DF39E195CB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1660 7ff76c351a60-7ff76c351a8d getaddrinfo 1661 7ff76c351a93-7ff76c351aa5 1660->1661 1662 7ff76c351c24-7ff76c351c31 1660->1662 1663 7ff76c351aab 1661->1663 1664 7ff76c351c04-7ff76c351c0d WSASetLastError 1661->1664 1666 7ff76c351ab0-7ff76c351ab6 1663->1666 1665 7ff76c351c13-7ff76c351c20 1664->1665 1665->1662 1667 7ff76c351abd-7ff76c351ac0 1666->1667 1668 7ff76c351ab8-7ff76c351abb 1666->1668 1669 7ff76c351ac6 1667->1669 1670 7ff76c351b71-7ff76c351b78 1667->1670 1671 7ff76c351ac9-7ff76c351acd 1668->1671 1669->1671 1670->1666 1673 7ff76c351b7e 1670->1673 1671->1670 1672 7ff76c351ad3-7ff76c351ada 1671->1672 1672->1670 1674 7ff76c351ae0-7ff76c351ae3 1672->1674 1675 7ff76c351bb2-7ff76c351bbf 1673->1675 1674->1670 1678 7ff76c351ae9-7ff76c351afa malloc 1674->1678 1676 7ff76c351bc7-7ff76c351bca 1675->1676 1677 7ff76c351bc1 freeaddrinfo 1675->1677 1679 7ff76c351bcc-7ff76c351bcf 1676->1679 1680 7ff76c351bff-7ff76c351c02 1676->1680 1677->1676 1681 7ff76c351bac 1678->1681 1682 7ff76c351b00-7ff76c351b35 malloc 1678->1682 1683 7ff76c351bfa-7ff76c351bfd 1679->1683 1684 7ff76c351bd1-7ff76c351bf8 free * 3 1679->1684 1680->1664 1680->1665 1681->1675 1685 7ff76c351b9b-7ff76c351baa free 1682->1685 1686 7ff76c351b37-7ff76c351b4d memmove 1682->1686 1683->1665 1684->1683 1684->1684 1685->1675 1687 7ff76c351b5e-7ff76c351b68 1686->1687 1688 7ff76c351b4f-7ff76c351b5c _strdup 1686->1688 1690 7ff76c351b6e 1687->1690 1691 7ff76c351b6a 1687->1691 1688->1687 1689 7ff76c351b80-7ff76c351b99 free * 2 1688->1689 1689->1675 1690->1670 1691->1690
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemmove
                                            • String ID:
                                            • API String ID: 2030585312-0
                                            • Opcode ID: c73a1ddb93678955e96ed9fe8250f35de1f3267e0c47f90d42628c61896ab2c1
                                            • Instruction ID: fad6d731346d073dcbf68c7f0694d90c917fd534efbe0210fae2674721383a55
                                            • Opcode Fuzzy Hash: c73a1ddb93678955e96ed9fe8250f35de1f3267e0c47f90d42628c61896ab2c1
                                            • Instruction Fuzzy Hash: 5C513F36A09B41C2EA65AF13A540939FBA0FF48B91F844139CF4E17750EF3CE8448761
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: 6c89998b3861bb271573c33cc10dd2f140672442e4191bc457384d7c51f1ad03
                                            • Instruction ID: 9e7350ac1837eed07692edd0a74f345451359554a75fd47c03d760d6586d2c5b
                                            • Opcode Fuzzy Hash: 6c89998b3861bb271573c33cc10dd2f140672442e4191bc457384d7c51f1ad03
                                            • Instruction Fuzzy Hash: 4D910E31B0C682C6E765AE26AC409B9F291FF4C35AF98813DD91D8EBC4DE3CD9448625
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: FileHandle$Close$CreateProcessProtectUnmapViewVirtual$CurrentFullImageMappingModuleNameQuery
                                            • String ID: @$MZ
                                            • API String ID: 1757686097-1266540735
                                            • Opcode ID: 38d93b1ba382539a941b458f15fcb31aec6d553212edffd4774a9d6343df3541
                                            • Instruction ID: 98a7f37057286532e70d8bcd184cf4b1e2fa849e810ce263cbd2ba8ee1b4edd1
                                            • Opcode Fuzzy Hash: 38d93b1ba382539a941b458f15fcb31aec6d553212edffd4774a9d6343df3541
                                            • Instruction Fuzzy Hash: E251B232A08682C3EE64AB169590A7DB7A1FF85B59F844139DB8D03785DF3CE449C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                            • API String ID: 600764987-1502336670
                                            • Opcode ID: 2ce5276a5cc664a886a814e98f296c9e857e3f15d8c7c5f5c118684607e67c7c
                                            • Instruction ID: 3f7c86c64c711b2e31b7700f5aa0b74187e16379db8da9abb65ec87261b0b2aa
                                            • Opcode Fuzzy Hash: 2ce5276a5cc664a886a814e98f296c9e857e3f15d8c7c5f5c118684607e67c7c
                                            • Instruction Fuzzy Hash: EE31812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A95CF3CD544CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                            • API String ID: 600764987-3862749013
                                            • Opcode ID: 91b5616460a0af12a7406937b79b1e441725fa28e22edcf4789f462d657d5b44
                                            • Instruction ID: 415d2112e7c51eae321eb3536685a195e5975bf50abb4d660e99540075ee4a8f
                                            • Opcode Fuzzy Hash: 91b5616460a0af12a7406937b79b1e441725fa28e22edcf4789f462d657d5b44
                                            • Instruction Fuzzy Hash: B731812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A55CF3CD544CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                            • API String ID: 600764987-1381340633
                                            • Opcode ID: 72fe8ae3f33d2f7f43d5b5c9da451da30333587a853f2dbec50f57c52d1a1a92
                                            • Instruction ID: 7732f7456ee098455bcfa93520e4f74b4f07c659ec50a9c29a2ef18f979f1676
                                            • Opcode Fuzzy Hash: 72fe8ae3f33d2f7f43d5b5c9da451da30333587a853f2dbec50f57c52d1a1a92
                                            • Instruction Fuzzy Hash: 8B31832260D7C1C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A95CF3CD544CB35
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                            • API String ID: 600764987-2710416593
                                            • Opcode ID: f1a8deda9fbddce59cbbdb6f4da1c785ec9d58355b47cd71b992628e989ea143
                                            • Instruction ID: 93041bd6927f8343fad259691e60a117df970b0b28159477fba5be38ae51960b
                                            • Opcode Fuzzy Hash: f1a8deda9fbddce59cbbdb6f4da1c785ec9d58355b47cd71b992628e989ea143
                                            • Instruction Fuzzy Hash: 9F31812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A55CF3CD544CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                            • API String ID: 600764987-1052566392
                                            • Opcode ID: 8acdbdbfed93b79d10794a5d665c971d4e5c62445efd2b0aad0b461d1cb45db7
                                            • Instruction ID: 70ce0c60b05524a983e9f8e800795fc7bd25cb33f6ff027e9e04ad4fa0c7b2b7
                                            • Opcode Fuzzy Hash: 8acdbdbfed93b79d10794a5d665c971d4e5c62445efd2b0aad0b461d1cb45db7
                                            • Instruction Fuzzy Hash: 3E31812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A95CF3CD544CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                            • API String ID: 600764987-1965992168
                                            • Opcode ID: 1c94952b2ef98d388dcd44bc1db4b84b1386a3b0077bf35b840c8f961d3d9a83
                                            • Instruction ID: 786d9390a3774e0be9111c01816191fca822fe361f54512cf30ba7f83daa0cb7
                                            • Opcode Fuzzy Hash: 1c94952b2ef98d388dcd44bc1db4b84b1386a3b0077bf35b840c8f961d3d9a83
                                            • Instruction Fuzzy Hash: F431A12260D7C2C9EA21AF22E4457AEF7A4FB85756F80043DCA8D02A95CF3CD404CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                            • API String ID: 600764987-2628789574
                                            • Opcode ID: d97066d4d0c1a1f2873a3f8222b0199b54bff4b53b2eaa110a41c85ed0f2070e
                                            • Instruction ID: 33067ed337be8752a2761c0c956821b07e168cfedf500ace37a77f0ce33bb611
                                            • Opcode Fuzzy Hash: d97066d4d0c1a1f2873a3f8222b0199b54bff4b53b2eaa110a41c85ed0f2070e
                                            • Instruction Fuzzy Hash: 4D31812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A55CF3CD544CB36
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                            • API String ID: 600764987-618797061
                                            • Opcode ID: 34a37ceff78000e0dda867f7041e27dbdc954633bffdabb9c6f23139e263810f
                                            • Instruction ID: 0b50b741c3f57259dfc1cfd5efa925519c013448aefe106a17baa8df3d75a46b
                                            • Opcode Fuzzy Hash: 34a37ceff78000e0dda867f7041e27dbdc954633bffdabb9c6f23139e263810f
                                            • Instruction Fuzzy Hash: 5831812260D7C2C9EA21AF22E4557AEF7A4FB85756F80053DCA8D02A55CF3CD544CB35
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C32A7B1,?,?,?,?,00007FF76C326FF0), ref: 00007FF76C33B828
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C33B871
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: callocfree
                                            • String ID:
                                            • API String ID: 306872129-0
                                            • Opcode ID: 4cbf1edf0252ae1ad2dd9c0472ac3c4b217a9908fb37d5f9a56c7cecaddf4659
                                            • Instruction ID: 9320623cd8579c788839a684a9b1b81ef4cd9e59d42ffb3cfac6ea26f070aee6
                                            • Opcode Fuzzy Hash: 4cbf1edf0252ae1ad2dd9c0472ac3c4b217a9908fb37d5f9a56c7cecaddf4659
                                            • Instruction Fuzzy Hash: 43915872909BC1C6E3009F25D4443E877A0FB99B5CF485239CE9D1E39ADFBAA094C721
                                            APIs
                                            • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF76C312F0A
                                            • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF76C312F29
                                            • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF76C312F5D
                                            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C312F7C
                                              • Part of subcall function 00007FF76C315AD0: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF76C315B07
                                              • Part of subcall function 00007FF76C315AD0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C315B24
                                              • Part of subcall function 00007FF76C315AD0: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C315B4D
                                              • Part of subcall function 00007FF76C315AD0: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF76C315B98
                                              • Part of subcall function 00007FF76C315AD0: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF76C315BAD
                                            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF76C312FC0
                                            • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF76C313002
                                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C313062
                                            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C31307E
                                            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C3130AB
                                            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF76C3130DC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$?setstate@?$basic_ios@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?widen@?$basic_ios@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@_get_stream_buffer_pointersfclose
                                            • String ID:
                                            • API String ID: 3580038112-0
                                            • Opcode ID: 0eb18120dffc8427e000f1e7bb9ed03decf0b92471f0fec08224aee13d6305ac
                                            • Instruction ID: ce1a078bd182a9c78ee7fafcad7de9084563cc5283142d66d9d1bedb2fbebc25
                                            • Opcode Fuzzy Hash: 0eb18120dffc8427e000f1e7bb9ed03decf0b92471f0fec08224aee13d6305ac
                                            • Instruction Fuzzy Hash: C1616A32A18B81CAEB11DF61E484BADB7B4FB85749F904039DA8E53B68DF38D415CB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                            • API String ID: 2635317215-3812100122
                                            • Opcode ID: fc39e735afd21a233c7accef9b052feb2157579c17906b7cf8e5ffbf85187e34
                                            • Instruction ID: b314030a373fa7400be6836a3364eb55936668babca8e51534cbdaa9969c5f55
                                            • Opcode Fuzzy Hash: fc39e735afd21a233c7accef9b052feb2157579c17906b7cf8e5ffbf85187e34
                                            • Instruction Fuzzy Hash: 4351E532A0DB82C2FA59AB2AD440BB9B790EB88791F940039DF4D47391DF3DE8548761
                                            APIs
                                              • Part of subcall function 00007FF76C317300: memmove.VCRUNTIME140(?,?,00000008,?,?,?,?,00007FF76C321ACD), ref: 00007FF76C31740B
                                              • Part of subcall function 00007FF76C317300: memmove.VCRUNTIME140(?,?,00000008,?,?,?,?,00007FF76C321ACD), ref: 00007FF76C31741A
                                            • memmove.VCRUNTIME140 ref: 00007FF76C321B0C
                                            • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C321B6B
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C321BA5
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C321BF7
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C321C6E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturnmemmove$system
                                            • String ID: && timeout /t 5"$start cmd /C "color b && title Error && echo
                                            • API String ID: 1752041281-3357973498
                                            • Opcode ID: 7b9ca40bc73603f3bb408701a9eb25cfb5a84f1d58a45754d0f194109f0e8143
                                            • Instruction ID: acee2a64e950d6744cc18a772aa2d95751c871e80fd43146084bf3212d9c8e1c
                                            • Opcode Fuzzy Hash: 7b9ca40bc73603f3bb408701a9eb25cfb5a84f1d58a45754d0f194109f0e8143
                                            • Instruction Fuzzy Hash: 3B51AF72A18B89C1EE00AB26E54476DB321FB46BD5F904239DB9D03BA5DF7DD480C721
                                            APIs
                                            • ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF76C315B07
                                            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C315B24
                                            • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C315B4D
                                            • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF76C315B98
                                              • Part of subcall function 00007FF76C316360: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,00007FF76C3148B5,?,?,?,?,?,?,?,00007FF76C3154DB), ref: 00007FF76C316376
                                              • Part of subcall function 00007FF76C316360: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,00007FF76C3148B5,?,?,?,?,?,?,?,00007FF76C3154DB), ref: 00007FF76C316390
                                              • Part of subcall function 00007FF76C316360: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,00007FF76C3148B5,?,?,?,?,?,?,?,00007FF76C3154DB), ref: 00007FF76C3163C2
                                              • Part of subcall function 00007FF76C316360: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,00007FF76C3148B5,?,?,?,?,?,?,?,00007FF76C3154DB), ref: 00007FF76C3163ED
                                              • Part of subcall function 00007FF76C316360: std::_Facet_Register.LIBCPMT ref: 00007FF76C316406
                                              • Part of subcall function 00007FF76C316360: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,00007FF76C3148B5,?,?,?,?,?,?,?,00007FF76C3154DB), ref: 00007FF76C316425
                                            • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF76C315BAD
                                            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C315BC4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                            • String ID: C:\Windows\keyspoofer.txt
                                            • API String ID: 3911317180-140772259
                                            • Opcode ID: 8a0f4ddd246f5943024a9039051c79a83b026ab09755d7c5fde9eecff730277d
                                            • Instruction ID: 4ecbce534b0f809675c706d49da1b987def8a23f41cd2b54d8204a57e5210803
                                            • Opcode Fuzzy Hash: 8a0f4ddd246f5943024a9039051c79a83b026ab09755d7c5fde9eecff730277d
                                            • Instruction Fuzzy Hash: 65316632609B81C6EB50AF26F844629B3B4FB89F89F840139DA8D47B68DF3CD594C750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                            • String ID:
                                            • API String ID: 1133592946-0
                                            • Opcode ID: 560487b49758e7811f71a7fa1aa8e16bf24763dedb573d0d6273195996342808
                                            • Instruction ID: 3391eb459bc7cc485c99aa6b1528fd53d112e2e8e2f01de2d608a38f7f2ac47e
                                            • Opcode Fuzzy Hash: 560487b49758e7811f71a7fa1aa8e16bf24763dedb573d0d6273195996342808
                                            • Instruction Fuzzy Hash: F9316C21A0C243C1FA54BB279557BB9B291AF47796FC0413ED64D2B2D3DE2CA804867B
                                            APIs
                                              • Part of subcall function 00007FF76C351A60: getaddrinfo.WS2_32 ref: 00007FF76C351A82
                                              • Part of subcall function 00007FF76C351A60: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351AEE
                                              • Part of subcall function 00007FF76C351A60: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351B28
                                              • Part of subcall function 00007FF76C351A60: memmove.VCRUNTIME140(?,?,?,00007FF76C335155), ref: 00007FF76C351B41
                                              • Part of subcall function 00007FF76C351A60: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351B4F
                                              • Part of subcall function 00007FF76C351A60: freeaddrinfo.WS2_32(?,?,?,00007FF76C335155), ref: 00007FF76C351BC1
                                              • Part of subcall function 00007FF76C351A60: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351BD5
                                              • Part of subcall function 00007FF76C351A60: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351BDF
                                              • Part of subcall function 00007FF76C351A60: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C335155), ref: 00007FF76C351BEC
                                            • WSAGetLastError.WS2_32 ref: 00007FF76C33515B
                                            • WSAGetLastError.WS2_32 ref: 00007FF76C335165
                                            • EnterCriticalSection.KERNEL32 ref: 00007FF76C335180
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF76C33518F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3351A0
                                            • send.WS2_32 ref: 00007FF76C3351C3
                                            • WSAGetLastError.WS2_32 ref: 00007FF76C3351CD
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF76C3351E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemmovesend
                                            • String ID:
                                            • API String ID: 3577680466-0
                                            • Opcode ID: fc2c5a681f9e38949678be65599ab0e84eb98308ef84f758d0073a105ae9d2bb
                                            • Instruction ID: 9bf08569dc4cb772465321bab6f67c7a18952e330804a2f78bf6a1468e1f5172
                                            • Opcode Fuzzy Hash: fc2c5a681f9e38949678be65599ab0e84eb98308ef84f758d0073a105ae9d2bb
                                            • Instruction Fuzzy Hash: 5A31B931A08642C1EB40AF26D455A69B7B0FF44F9AF801139D94E87694DF3CD445C7A2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: c2201ef84f1469e825e22acc8bee876f0231f9a4b4c355a8423869777bf9ad38
                                            • Instruction ID: f8e840efc051dcfe980b07dfb9bf803dcdb0a3b61fd878da426722b8c61bc4b7
                                            • Opcode Fuzzy Hash: c2201ef84f1469e825e22acc8bee876f0231f9a4b4c355a8423869777bf9ad38
                                            • Instruction Fuzzy Hash: 63A16B35A18651C6EB696A26DC00BB9B295FF4C756F88823CED1D4B7C4DF3CD8058322
                                            APIs
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C3271C1
                                              • Part of subcall function 00007FF76C315550: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C3155A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: ANUL$EZZ
                                            • API String ID: 3668304517-3347727684
                                            • Opcode ID: 17b08860ac0d795205c49af8ecce8c45f755290064b7e1a07427b66776b3e6a7
                                            • Instruction ID: 2162631b56947ea15e187277019db2d8fc41bc87d51538cafbd0e0abd3530f9d
                                            • Opcode Fuzzy Hash: 17b08860ac0d795205c49af8ecce8c45f755290064b7e1a07427b66776b3e6a7
                                            • Instruction Fuzzy Hash: 3491BF32B04782CAFB10EB66D4057AD7362AB02B99F804538DE5D17BCACF3CD55483A6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                            • API String ID: 1294909896-116363806
                                            • Opcode ID: 4555a0a7d86c6f60568588da6ac00a0257dcbd78f45fe19e0092576b48bd8d7a
                                            • Instruction ID: b586378fc24c29541e9775db0ff90742c75c7cb6702d4da82a11e1104202a3fd
                                            • Opcode Fuzzy Hash: 4555a0a7d86c6f60568588da6ac00a0257dcbd78f45fe19e0092576b48bd8d7a
                                            • Instruction Fuzzy Hash: 3E916772609B81C6EB10DF26D894AADBBB4FB48B86F840139CE4D47768DF38D445CB51
                                            APIs
                                              • Part of subcall function 00007FF76C312ED0: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF76C312F0A
                                              • Part of subcall function 00007FF76C312ED0: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF76C312F29
                                              • Part of subcall function 00007FF76C312ED0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF76C312F5D
                                              • Part of subcall function 00007FF76C312ED0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF76C312F7C
                                              • Part of subcall function 00007FF76C312ED0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF76C312FC0
                                              • Part of subcall function 00007FF76C312ED0: ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF76C313002
                                              • Part of subcall function 00007FF76C312ED0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C313062
                                              • Part of subcall function 00007FF76C322B00: CreateThread.KERNELBASE ref: 00007FF76C322B5F
                                              • Part of subcall function 00007FF76C322B00: UuidCreate.RPCRT4 ref: 00007FF76C322BB0
                                              • Part of subcall function 00007FF76C322B00: UuidToStringA.RPCRT4 ref: 00007FF76C322BCB
                                              • Part of subcall function 00007FF76C322B00: RpcStringFreeA.RPCRT4 ref: 00007FF76C322C00
                                              • Part of subcall function 00007FF76C312D10: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C312D20
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312D2B
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312D39
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312D5C
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312D6A
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312D81
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312D8F
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312DA6
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312DB4
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312DD6
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312DE4
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312DFB
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312E09
                                              • Part of subcall function 00007FF76C312D10: GetStdHandle.KERNEL32 ref: 00007FF76C312E20
                                              • Part of subcall function 00007FF76C312D10: SetConsoleTextAttribute.KERNEL32 ref: 00007FF76C312E2E
                                            • Sleep.KERNEL32 ref: 00007FF76C31367F
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C31369E
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C313719
                                            • Sleep.KERNEL32 ref: 00007FF76C31372A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C313763
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AttributeConsoleHandleTextU?$char_traits@$D@std@@@std@@$_invalid_parameter_noinfo_noreturn$CreateSleepStringUuid$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?setstate@?$basic_ios@?widen@?$basic_ios@D@std@@@1@_FreeInit@?$basic_streambuf@ThreadV?$basic_streambuf@fclosesystem
                                            • String ID: valorant tpm
                                            • API String ID: 1726691479-2065167152
                                            • Opcode ID: a3e552ea481289e06771e0388e34eaeaebb21b447971fce1f61716ef0726cf18
                                            • Instruction ID: 318cdf84df825b9f26a861fbe313b5d934c2be80acb3b6597117e821d2d252fd
                                            • Opcode Fuzzy Hash: a3e552ea481289e06771e0388e34eaeaebb21b447971fce1f61716ef0726cf18
                                            • Instruction Fuzzy Hash: 54519161F18642C8FB41BB76D8917BCB720AF4576AF940239DA1D17AD6DE2CA481C322
                                            APIs
                                              • Part of subcall function 00007FF76C3784F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3157CA,?,?,?,?,?,?,?,00007FF76C31118E), ref: 00007FF76C37850A
                                            • ?_Random_device@std@@YAIXZ.MSVCP140 ref: 00007FF76C31299B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Random_device@std@@malloc
                                            • String ID: 456789$>$?
                                            • API String ID: 2115826380-3395382736
                                            • Opcode ID: f6316a32dc5ad1a96f886e62bd89d608c8076d3b0713c5a646cccbc348894fbd
                                            • Instruction ID: b81886d018846322a4f9d98cf00c70630a79344e2916886205fb9328362322de
                                            • Opcode Fuzzy Hash: f6316a32dc5ad1a96f886e62bd89d608c8076d3b0713c5a646cccbc348894fbd
                                            • Instruction Fuzzy Hash: B6510632D18B81CAE310AF21E8447A9B7A1FB99744F545239EA8C47BA5EF7CE1C0C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s$Connection #%ld to host %s left intact
                                            • API String ID: 1294909896-118628944
                                            • Opcode ID: 10131e2cb1aa6f22e2ee3b146201c522d287f8f42c78b94e51c4eb1dad2d3d36
                                            • Instruction ID: 610b52b9d30ec51c888b783de65440d1a382aba2e332f86775c377b792f8e0c7
                                            • Opcode Fuzzy Hash: 10131e2cb1aa6f22e2ee3b146201c522d287f8f42c78b94e51c4eb1dad2d3d36
                                            • Instruction Fuzzy Hash: 5D914372B08AC1C2EB59BB26D540BFDB391EB44B86F844439DE4E0B795CF38E4648761
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C33B11B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C33B131
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF4D
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF6A
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF7E
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF9A
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFB7
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFDA
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFEE
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B002
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B028
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B03C
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B050
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B09F
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B0AC
                                              • Part of subcall function 00007FF76C33AED0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B0D5
                                            • memset.VCRUNTIME140 ref: 00007FF76C33B165
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$memset
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 2717317152-3248832348
                                            • Opcode ID: 43e8a476d1e9a08a3144ffeb7185b141074180460611bf871d67cb668cbabf4e
                                            • Instruction ID: 8232db2b065107d0acdc33095aa71960edc35b878a82bf4273f28062ae17b24a
                                            • Opcode Fuzzy Hash: 43e8a476d1e9a08a3144ffeb7185b141074180460611bf871d67cb668cbabf4e
                                            • Instruction Fuzzy Hash: EA717F2290CBC2C1E751EF26D4507BDB760EB85B99F884239DA9D4F295DF38E4818362
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: File$CreateProcess$CloseCurrentFullHandleImageMappingNameQueryView
                                            • String ID:
                                            • API String ID: 1024061024-0
                                            • Opcode ID: 06fda7f3e68c2c3f3cea317f2c6b0cfd4844cc8cb5b8532ea46a47707e4afbf9
                                            • Instruction ID: daa3a7e271eeb8e29693177adacccf905475b9fbe02726ddd68f7a2eabfca79b
                                            • Opcode Fuzzy Hash: 06fda7f3e68c2c3f3cea317f2c6b0cfd4844cc8cb5b8532ea46a47707e4afbf9
                                            • Instruction Fuzzy Hash: AB215E32608B81C2E7209F12F859B5AB3A4FB88B99F804239DA9D07B54DF3CD445CB51
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastmallocrecvsend
                                            • String ID: Send failure: %s
                                            • API String ID: 25851408-857917747
                                            • Opcode ID: b646754a63c242f285528627dd3e449bf7f1e4516c86649b32f59f149c96bf92
                                            • Instruction ID: 0be551dbaad6da106727a2eb34f4f8f2f78ee31dad283a2f7b1fdfa9c74f070e
                                            • Opcode Fuzzy Hash: b646754a63c242f285528627dd3e449bf7f1e4516c86649b32f59f149c96bf92
                                            • Instruction Fuzzy Hash: 0941A03270AB8185EB64AF26E840B79B2A0AF49BEAFC44239DE5D47394DF3CD451C711
                                            APIs
                                              • Part of subcall function 00007FF76C3425B0: GetModuleHandleA.KERNEL32(?,?,00000000,00007FF76C36B70A,?,?,?,?,00007FF76C34293B), ref: 00007FF76C3425C4
                                            • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF76C34293B), ref: 00007FF76C36B720
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AddressCallerHandleModuleProc
                                            • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                            • API String ID: 2084706301-3788156360
                                            • Opcode ID: 5f9ba379c3d9fc8f413ad3dcf5974fedc70beb2deca750b73fe5729b4a75610e
                                            • Instruction ID: eef33bd5c74497460c40fa378b377d4bedd4c9237f5c65009d8aad1db60f38aa
                                            • Opcode Fuzzy Hash: 5f9ba379c3d9fc8f413ad3dcf5974fedc70beb2deca750b73fe5729b4a75610e
                                            • Instruction Fuzzy Hash: C8F01960E0AB03C0FE54BB17A985BB0F2A06F1434AFC5403CD40D9A291FE3CA5899B72
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C34A760
                                              • Part of subcall function 00007FF76C34ACF0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C34AD4A
                                              • Part of subcall function 00007FF76C34AAA0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C34AB38
                                              • Part of subcall function 00007FF76C34AAA0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C34AB41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$calloc
                                            • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                            • API String ID: 3095843317-1242256665
                                            • Opcode ID: 827c2aa87ce17e0013e05fd712a68a9dd3230884c9ea86d0e45197574c2b49c9
                                            • Instruction ID: f6f6d12fb45e1d043021541a66d7dcead0243f78f81120e733fd20b423fd31d2
                                            • Opcode Fuzzy Hash: 827c2aa87ce17e0013e05fd712a68a9dd3230884c9ea86d0e45197574c2b49c9
                                            • Instruction Fuzzy Hash: C141BE31A0C682C5F760EB66E8007BAB7A1EF85785F94803ADA4D4B695DF3CD448C712
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: closesocket$calloc
                                            • String ID:
                                            • API String ID: 2958813939-0
                                            • Opcode ID: a05756b925b676b2f5eddd10200ae43443ab68b5a084b8e1e1ee587c463db630
                                            • Instruction ID: 943a33cb43da6580081674d1862c6f6780bf6ad9788bc7478001c5cbaa60be32
                                            • Opcode Fuzzy Hash: a05756b925b676b2f5eddd10200ae43443ab68b5a084b8e1e1ee587c463db630
                                            • Instruction Fuzzy Hash: C7416131608A92C1E750FF32D8406E9B360EF88759FC48639DE5D8A2D6EF3CD5498362
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                            • API String ID: 0-3791222319
                                            • Opcode ID: 51d7f8d5dc6845581baafe3fd4c405b6984cf48231267efa5bc797a584dc4db0
                                            • Instruction ID: 3f2b5f61e5ae4583c2b3ec6ecff98f2036e1f9bb87ab6785823b668780401dfd
                                            • Opcode Fuzzy Hash: 51d7f8d5dc6845581baafe3fd4c405b6984cf48231267efa5bc797a584dc4db0
                                            • Instruction Fuzzy Hash: DF51A721A09682C5EB54AB13A648A79BB91EF447A9FD48239DF1D473D4DF3EE041C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 1294909896-3248832348
                                            • Opcode ID: b3abda95d4842e6979c77852f044f7e7c33953268195e6f6111f5e5a8aa4b6e6
                                            • Instruction ID: f24ae69e182a6cf2305f07bb4bad0b905beb616a45634c6085d916e70c720e10
                                            • Opcode Fuzzy Hash: b3abda95d4842e6979c77852f044f7e7c33953268195e6f6111f5e5a8aa4b6e6
                                            • Instruction Fuzzy Hash: 69517062A08AC1C1E7419F2AD4407ADB7A0EB84B9DF485139DF8C4B39ADF7CD495C721
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastrecv
                                            • String ID:
                                            • API String ID: 2514157807-0
                                            • Opcode ID: 23d35c8dc031321845488c5a0f8de9bde46f9af8990e6a04dc0b523b5a353112
                                            • Instruction ID: 77de9b6603a2325f6ea1e445fcef46a6242899a64490f3ba7bf77a21a44cd8bc
                                            • Opcode Fuzzy Hash: 23d35c8dc031321845488c5a0f8de9bde46f9af8990e6a04dc0b523b5a353112
                                            • Instruction Fuzzy Hash: 85E0DF21F0450982FF286772E855B7921A0CF88777F846338CA3A8A7C0CA2C44D28321
                                            APIs
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C3128D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 6c7e0b4c6c98e4680503481da4b43372955a089c43a8a3f83a3351b47374b09e
                                            • Instruction ID: 89f5b883b88cb00696e0a292535a7b6da926f9a720d521b4c50033226832a1b9
                                            • Opcode Fuzzy Hash: 6c7e0b4c6c98e4680503481da4b43372955a089c43a8a3f83a3351b47374b09e
                                            • Instruction Fuzzy Hash: 6E516362A046C9C5DB45EB26D5583BC7352FB02FC9F94403ADA4D0AA6ADF6AC4C4C321
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: closesocket
                                            • String ID:
                                            • API String ID: 2781271927-0
                                            • Opcode ID: 0d1bf1fb7a2dacee2398b3ec2e74f674ac83464c917e10b2ef8acc80dbb8198f
                                            • Instruction ID: e8b21234904c0566a51301c427e707f13973c86ad9fdfd503a467df1dd992470
                                            • Opcode Fuzzy Hash: 0d1bf1fb7a2dacee2398b3ec2e74f674ac83464c917e10b2ef8acc80dbb8198f
                                            • Instruction Fuzzy Hash: CE018052B095C1C1EF44EB2BE58876DB3A0EF88B85F489135DB0E4B296CF2CD4958752
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: socket
                                            • String ID:
                                            • API String ID: 98920635-0
                                            • Opcode ID: b96352ea3a50238ed1975b8a8e8f3d2b95264ea245a5395ea7beb32c57450c63
                                            • Instruction ID: 59d413ee2ac459fd0e63b6649825306308d30f3785f8e76c1865ac678aa8ca73
                                            • Opcode Fuzzy Hash: b96352ea3a50238ed1975b8a8e8f3d2b95264ea245a5395ea7beb32c57450c63
                                            • Instruction Fuzzy Hash: 33E06D26E06645C2DE08A7368892AB97360AB51725FC48779C63D0A3D0DE2C965A9B20
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _beginthreadex
                                            • String ID:
                                            • API String ID: 3014514943-0
                                            • Opcode ID: 3db009872c8f4d40c76b5c2b2c72ed268fe907ed1841dcdbb931e42fdbfba48b
                                            • Instruction ID: dd73c1b3b61993454bd47260d25b5007b6ecc2f34ccc281263c0e782b5773879
                                            • Opcode Fuzzy Hash: 3db009872c8f4d40c76b5c2b2c72ed268fe907ed1841dcdbb931e42fdbfba48b
                                            • Instruction Fuzzy Hash: 66D02B63718A04839F10DF72A881029F251F789774B88433CAE7D837E0DB3CD1414A04
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Cnd_do_broadcast_at_thread_exit
                                            • String ID:
                                            • API String ID: 2632783013-0
                                            • Opcode ID: 4dfc203e525642a0fb965529a17836da1f3f79d63cf12ee4ef218f93b00fb93d
                                            • Instruction ID: 8e90d1a0835e2786ed742b5249c1cf6bef527928b6da6e004320b2f9b8e9f449
                                            • Opcode Fuzzy Hash: 4dfc203e525642a0fb965529a17836da1f3f79d63cf12ee4ef218f93b00fb93d
                                            • Instruction Fuzzy Hash: 35C08C40B20202C2EB5437B3A80B5B962A0AF4EF22F985038C95649351CD3D84DA8726
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ioctlsocket
                                            • String ID:
                                            • API String ID: 3577187118-0
                                            • Opcode ID: 4febc3c8d7f5aed8233ee5d24087e21b0bbc05b5b2815716bdc9645dd1b00dbb
                                            • Instruction ID: 36a81a58961490f3c465b9cf28fec2d411ce1896c7da9f503cbe53e2ebddfff0
                                            • Opcode Fuzzy Hash: 4febc3c8d7f5aed8233ee5d24087e21b0bbc05b5b2815716bdc9645dd1b00dbb
                                            • Instruction Fuzzy Hash: 56C08056F145C1C3C3446F725885087B771FFC4205FD5643DD14741124DD3CC2A58B54
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdup$callocmemmovestrstr
                                            • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                            • API String ID: 3050856829-4264080130
                                            • Opcode ID: 6391a40f627db0bb6010f84a819358c4fdba3e5b4bf572a4ba6bff6913ed97cf
                                            • Instruction ID: 66b916cf910c177369eb3f0235d0b5587066a161ae2c6d3502c9312af1d58bc5
                                            • Opcode Fuzzy Hash: 6391a40f627db0bb6010f84a819358c4fdba3e5b4bf572a4ba6bff6913ed97cf
                                            • Instruction Fuzzy Hash: 1F03C221A09782C5FB54BF239940AB9B7A4AF45B86F848039CE0D5B795DF3CE449C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                            • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                            • API String ID: 3939785054-690044944
                                            • Opcode ID: 705ee5aeba5fc1df9a6f88bafb3aeaff7a9893b70d81290ff0ac56fe8684f09f
                                            • Instruction ID: 454d410abfc5b2d0d4d9f8bf4c7fdbe6cc83520f887c5e57845e02f4bcc21395
                                            • Opcode Fuzzy Hash: 705ee5aeba5fc1df9a6f88bafb3aeaff7a9893b70d81290ff0ac56fe8684f09f
                                            • Instruction Fuzzy Hash: 2DC29671A08682C5FB50BF279904BF9B791EB45B8AF848139CE4D4F295DE2DA44CC732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemmovestrrchr
                                            • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                            • API String ID: 1480346526-3844637060
                                            • Opcode ID: 0ccbd0169f4b0ff4825d33c0f4ede31d96c845e13c4baf141d7dd962c627e433
                                            • Instruction ID: d8d1e24dfe7d5df477d6c69f819c079990e26308ad4240acfa49862b998aa6e0
                                            • Opcode Fuzzy Hash: 0ccbd0169f4b0ff4825d33c0f4ede31d96c845e13c4baf141d7dd962c627e433
                                            • Instruction Fuzzy Hash: 2D720121A0CBC2C5FB61AB23D544BB9B7A0EF05796F844139CA8E426D6DF3DE445C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$#211$fwrite$#217calloc
                                            • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                            • API String ID: 2742731861-78870445
                                            • Opcode ID: c4fa293890821b9014b5e3bf5da57906fb6f97ba27b4b3abdc5a7683c1d28741
                                            • Instruction ID: cea5a500c1df50addb8e310a93296e6ea83bfa4cf9a18492bcc5aa5e8ac72ef4
                                            • Opcode Fuzzy Hash: c4fa293890821b9014b5e3bf5da57906fb6f97ba27b4b3abdc5a7683c1d28741
                                            • Instruction Fuzzy Hash: 5D428D75B09A42C6EB10AB63D454AB9B3B1FF49BC9F814039CE0E67794DE3CE4098361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                            • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                            • API String ID: 561913010-2037819326
                                            • Opcode ID: bc3d470d67b8c6f26bf1a52cddf1d089605b5e228c222f1a0e36e97f5b24815e
                                            • Instruction ID: bb433251f7968f85b7e19a905a6dee2d476ff1af59e95dda868372077e83f799
                                            • Opcode Fuzzy Hash: bc3d470d67b8c6f26bf1a52cddf1d089605b5e228c222f1a0e36e97f5b24815e
                                            • Instruction Fuzzy Hash: 2A42BE32A09B42C5EB10AB17E440BB9B3A1FB48B96F914139DE5D17798DF3CE844C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastcallocfreegetsockname
                                            • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                            • API String ID: 2454324209-2383553807
                                            • Opcode ID: 1eeeab696e3d791c9bf331c78a868181a07cadec384da2eacbb8ae0852a43e07
                                            • Instruction ID: 6f91109219348e7e8c92fc5b4b7e1bf861cf3e4bfbac4ddf3518fe0d5fe3c67f
                                            • Opcode Fuzzy Hash: 1eeeab696e3d791c9bf331c78a868181a07cadec384da2eacbb8ae0852a43e07
                                            • Instruction Fuzzy Hash: 6A22B361A0C782C1EB50BB23D440ABABBA1FB45786FC4503AEA4E47785DF3CE545C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemallocstrncmp
                                            • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                            • API String ID: 1436789207-471711153
                                            • Opcode ID: b43ae07099be95f4639f7f5e7bee081ca5bc71f2c6de42ad2eded526886e1f03
                                            • Instruction ID: c4870131cb07cc92dd00ee0260c6a66e2f2bed6075b47fd7670081f12ab656e6
                                            • Opcode Fuzzy Hash: b43ae07099be95f4639f7f5e7bee081ca5bc71f2c6de42ad2eded526886e1f03
                                            • Instruction Fuzzy Hash: 27A18F61A0D782C1FA50AF23D455A79F7A0AF49BE2FC84139DD0E4B794EE3CE4458722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateFile_errnofree
                                            • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                            • API String ID: 1377488173-902404565
                                            • Opcode ID: 7f311b7e71c6f1d1298a73c1e19e7cb2c25d99a9beccf30fe3e55696d5328150
                                            • Instruction ID: 7e6e516b5b6c8165a8852cee7902c715a9e563084faf1cde1894587f6229031b
                                            • Opcode Fuzzy Hash: 7f311b7e71c6f1d1298a73c1e19e7cb2c25d99a9beccf30fe3e55696d5328150
                                            • Instruction Fuzzy Hash: 7AB1A221F18742C2EA10AB27E400BA9B6A1BF49786FC1413ADD4D6B794DF7CE504CB62
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                            • API String ID: 2190258309-2223379150
                                            • Opcode ID: 762747e3dd0d6dc23d47ce4e052777f3f2dcd9bd673a44f06668da85d425ee35
                                            • Instruction ID: d90212c10240736f3d0442c3046e4d95eec936756250c6ad93f67d5da14e38f3
                                            • Opcode Fuzzy Hash: 762747e3dd0d6dc23d47ce4e052777f3f2dcd9bd673a44f06668da85d425ee35
                                            • Instruction Fuzzy Hash: 8D129D72A09B56CAEB50EF23E444AA9B7B4FB44B8AF910039DE4E53B94DF38D405C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strncmp$memset
                                            • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                            • API String ID: 3268688168-2769131373
                                            • Opcode ID: 1e0d4f6515f6bf4db3e575e4e8632aa774591cfb3602211e1656b23fdfbbb5ae
                                            • Instruction ID: bf8c6f0d242426d59e31388b1e9adb246727b0662ade2bb317a8fc39252104c5
                                            • Opcode Fuzzy Hash: 1e0d4f6515f6bf4db3e575e4e8632aa774591cfb3602211e1656b23fdfbbb5ae
                                            • Instruction Fuzzy Hash: 0DE1D432E18B82C5E710EB22D840AB9B760FB89789F80913AEE4E4B755DF6CD554C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup$fclosefgetsfopen
                                            • String ID: $default$login$machine$password
                                            • API String ID: 431015889-155862542
                                            • Opcode ID: 0666d7a69f5a3d087a33b176ed23337d280181dd53fdf0eee873212d8639e86b
                                            • Instruction ID: d243ee9cd0e857876a797180696946ddeae1de010d96656bc1f7d62b12ea5383
                                            • Opcode Fuzzy Hash: 0666d7a69f5a3d087a33b176ed23337d280181dd53fdf0eee873212d8639e86b
                                            • Instruction Fuzzy Hash: 36A1B322A0D782C5FA61BF23D540B7AF6E0AF85786F894039DE4E56794DE3CE4448732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _errno$strtol
                                            • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                            • API String ID: 3596500743-988243589
                                            • Opcode ID: 43dd529dc28cfafc5e78a4d5ffc7bb8958316a3aaea1f1d2542b836935997550
                                            • Instruction ID: 99272a706615683e04be2e9012afd1df00c60bf2dee71767b86750dda76d1801
                                            • Opcode Fuzzy Hash: 43dd529dc28cfafc5e78a4d5ffc7bb8958316a3aaea1f1d2542b836935997550
                                            • Instruction Fuzzy Hash: 6FF1F272F08511CAEB24AF6A94009BCBBB1AB4475AFD04239DF1E977C4DE38E9058751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                            • String ID: @
                                            • API String ID: 2041421932-2766056989
                                            • Opcode ID: dd68ff11af13008f035dc987d9aeec5544f0d6030b669bc89ad29880cb7134dc
                                            • Instruction ID: 1ac77129d6e2455f5663c2235ef6a65e17a8e9c791eb677ad97c530de140f6ae
                                            • Opcode Fuzzy Hash: dd68ff11af13008f035dc987d9aeec5544f0d6030b669bc89ad29880cb7134dc
                                            • Instruction Fuzzy Hash: 4E319236608682C6E760DF22E548AAAB7B4FBC5B85F844139DF8D57B14CF3CD4058B14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                            • API String ID: 0-2774518510
                                            • Opcode ID: 06262a617c1d5cc64fa05beb9c8d9c87a130ac8c9bbb3e9d2f95238eaa44d340
                                            • Instruction ID: 6e0dcc2d1fc46324ee5c17a3535babe22ce8300ed1aa203b73467a5d90c7a1b2
                                            • Opcode Fuzzy Hash: 06262a617c1d5cc64fa05beb9c8d9c87a130ac8c9bbb3e9d2f95238eaa44d340
                                            • Instruction Fuzzy Hash: 6F42FA62A0C7C2C5EF9AAAAAC154BB9B7A1FF41747F84403DCA5D47285DF2CA450C732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                            • String ID: @
                                            • API String ID: 3016261861-2766056989
                                            • Opcode ID: 7c4d4c2105dac821a974f8275c4e737bb47a2d390b2f6b484e47d0f81788c90e
                                            • Instruction ID: 45ade3b7cfd2c0f80da5b69ee69a39542a218e5b95c46edb5d51aa7790343ff5
                                            • Opcode Fuzzy Hash: 7c4d4c2105dac821a974f8275c4e737bb47a2d390b2f6b484e47d0f81788c90e
                                            • Instruction Fuzzy Hash: C141BD22A046A0CEF7108BB6E4557EE7BB0FB4A349F444025DE9D57A4ACB3CC11AD764
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF76C355958,?,?,?,?,?,?,00007FF76C36CA5E), ref: 00007FF76C3559D6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF76C355958,?,?,?,?,?,?,00007FF76C36CA5E), ref: 00007FF76C355B3D
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C355C9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                            • API String ID: 3985033223-3943651191
                                            • Opcode ID: e6d497f4e9d8cf3d787a12f0ecc3c7fd30026ee7bd3c9da48e127d890584b040
                                            • Instruction ID: 92b26605970bf3ecd28960b2e8cea8a5c1d50429c5e87205749c759b735014ab
                                            • Opcode Fuzzy Hash: e6d497f4e9d8cf3d787a12f0ecc3c7fd30026ee7bd3c9da48e127d890584b040
                                            • Instruction Fuzzy Hash: CA910572A086D1C5E721AB26A400BBABFA0EB45796FC84239DBAD477D5DF3CE4008711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: calloc$ErrorLastbind
                                            • String ID: bind() failed; %s
                                            • API String ID: 2604820300-1141498939
                                            • Opcode ID: 2ab2b724ac8a5d716146213e00084d423a1857bb837b2ec39420f5dff8d0a031
                                            • Instruction ID: 722c9cc9e2ce3e45651ec4754e34f308054d40e344a9135252d359e69ff0c609
                                            • Opcode Fuzzy Hash: 2ab2b724ac8a5d716146213e00084d423a1857bb837b2ec39420f5dff8d0a031
                                            • Instruction Fuzzy Hash: 5D51A172A08782D6EB15EF27D4607B9B2A1FB44B89F844038DA4D57785EF3CE4618362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: calloc$ErrorLastbind
                                            • String ID: bind() failed; %s
                                            • API String ID: 2604820300-1141498939
                                            • Opcode ID: 4350c40aa74f367b8e7769cb97430262adb1528d0f8f2e38291eeba2e77620e5
                                            • Instruction ID: abf4a09f23329083855a5ac8dc36cf3de466eb2cb0048196799e7c258df95fa8
                                            • Opcode Fuzzy Hash: 4350c40aa74f367b8e7769cb97430262adb1528d0f8f2e38291eeba2e77620e5
                                            • Instruction Fuzzy Hash: 3A51D472B08B85D6EB15DB23D4547A8B3A0FB44B85F850039CA4D5B781EF7CE464C762
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                            • API String ID: 0-2102732564
                                            • Opcode ID: c44bcfe33980ef3a0f1d971bf3190cdbc9de0a4f7c438327ea66066fda808475
                                            • Instruction ID: 444a4c6817a4b975be4152483943afc631df11f4ef16b23a80696808477612cf
                                            • Opcode Fuzzy Hash: c44bcfe33980ef3a0f1d971bf3190cdbc9de0a4f7c438327ea66066fda808475
                                            • Instruction Fuzzy Hash: F621A750E49B4AC3FE18E797AA14FF4E2505B44B82FC0843AEC0E0A7D1DE6D6549C1A3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Crypt$Context$Release$AcquireRandom
                                            • String ID: @
                                            • API String ID: 2916321625-2766056989
                                            • Opcode ID: 1f384798deb8f8ca1f5c4a1ab48fd3a1020f6e2f3c7e5064afbcf50612595059
                                            • Instruction ID: 29c8c1fcbf77ff847ad552dbc2338456bd19d26d9af96fc4262439bfaf75e07c
                                            • Opcode Fuzzy Hash: 1f384798deb8f8ca1f5c4a1ab48fd3a1020f6e2f3c7e5064afbcf50612595059
                                            • Instruction Fuzzy Hash: 60F08666B08681C2E7009B22F44976AF760FF897E5F844034DF9C4B669DF7DC0858B19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                            • API String ID: 0-1379995092
                                            • Opcode ID: 9deb1b9577f49ba21a346aa79a883c1ce45ba1e35fd4efc707b3a565828952a4
                                            • Instruction ID: 9627cda7aadc3d7748fc941cccb1b19c1ec17ce63e2186ff1ae0b88fb41ede27
                                            • Opcode Fuzzy Hash: 9deb1b9577f49ba21a346aa79a883c1ce45ba1e35fd4efc707b3a565828952a4
                                            • Instruction Fuzzy Hash: 9F422A32908AA3C5EF246A269400B7AF791FF49796FD14638DE5E477C4DF3CE8018662
                                            APIs
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF76C3795BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: DebugDebuggerErrorLastOutputPresentString
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 389471666-631824599
                                            • Opcode ID: 2c6b95d41a77ba3a3599d5c3fc017d9d2231307e7b7061d113b98fedc1d41e58
                                            • Instruction ID: 5e46731b636549de7d80286d2dd6324e6ea947ac1365c7b10b7f22ed148244f7
                                            • Opcode Fuzzy Hash: 2c6b95d41a77ba3a3599d5c3fc017d9d2231307e7b7061d113b98fedc1d41e58
                                            • Instruction Fuzzy Hash: E2118F32608B92D7E744AB23D6557B9B2A0FF05356F804239C64D46A50EF3CE074C775
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                            • String ID:
                                            • API String ID: 2110207923-0
                                            • Opcode ID: 66c61ba7b73b83539a3b08911e90df6eeb6efa10a922950d407ccf2b734cdc51
                                            • Instruction ID: ba5c35fe549bf7877e44b71945d4a3a9cb9f223cd5b370a2301e76dd3c25a415
                                            • Opcode Fuzzy Hash: 66c61ba7b73b83539a3b08911e90df6eeb6efa10a922950d407ccf2b734cdc51
                                            • Instruction Fuzzy Hash: 24015E36609681C6EB109F22E459B6AF770FB85B89F944139DB4D06A68CF3CD4488B25
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Crypt$AcquireContextCreateHash
                                            • String ID: @
                                            • API String ID: 1914063823-2766056989
                                            • Opcode ID: 7ff71ec8e4c1874b63cb0a23044fd854c3ca10547940388fb3e5fedb972fe85a
                                            • Instruction ID: 3c45305d8caa48e3ebd9a55445fcecae935a8fa7c0889f13049551902de8d25b
                                            • Opcode Fuzzy Hash: 7ff71ec8e4c1874b63cb0a23044fd854c3ca10547940388fb3e5fedb972fe85a
                                            • Instruction Fuzzy Hash: 6EE09221B1465282F7205B62E405F56B361FB88B49F8440348B8C0BA14DF3CC0458B28
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _getpidhtons
                                            • String ID:
                                            • API String ID: 3416910171-0
                                            • Opcode ID: b37bdbeda7a57138afcfd5a137ed18c61444f6927a4934071a14dd94ea03c48a
                                            • Instruction ID: bde74d35d928ece8262c6717341e4523059f063dabb18123bb26b6fbe5873c51
                                            • Opcode Fuzzy Hash: b37bdbeda7a57138afcfd5a137ed18c61444f6927a4934071a14dd94ea03c48a
                                            • Instruction Fuzzy Hash: AF117C22A247D0CAD304CF36E4001AD7770FB58B88F44962AFB8987B18EB78D6D0C705
                                            APIs
                                            • GetProcessHeap.KERNEL32 ref: 00007FF76C311AF3
                                              • Part of subcall function 00007FF76C378A88: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF76C311AD3), ref: 00007FF76C378A98
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AcquireExclusiveHeapLockProcess
                                            • String ID:
                                            • API String ID: 3110430671-0
                                            • Opcode ID: 7560b114f0a385840403cfbc50c5e3af2c217ed3d4dec2e3c2772d2b301649dd
                                            • Instruction ID: cd90e0b0712fad66c940e119216eb634b0b8cc471f445aa664d98594e74c28da
                                            • Opcode Fuzzy Hash: 7560b114f0a385840403cfbc50c5e3af2c217ed3d4dec2e3c2772d2b301649dd
                                            • Instruction Fuzzy Hash: BC31E471D1AA02C5EA80BB16E8819B0B3B4EF55352FD0517EC44D822A0EF3CA894C3B7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16e4efab93c6ab704ad5aff1c2f387911547288a6c84c4b6456d7d387cab398a
                                            • Instruction ID: 8485d14eecfef51f85330845c333aed576f074ad152542b94eca87dabb3fb3ff
                                            • Opcode Fuzzy Hash: 16e4efab93c6ab704ad5aff1c2f387911547288a6c84c4b6456d7d387cab398a
                                            • Instruction Fuzzy Hash: A8026EB2A181A04AD36DCB2EA465639BFE1F389741B04912EE7A7C3781D93CC955DF10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d6493d6e35529629c397c204590ddb3bde36fd56b60c7bb670539de328662dbf
                                            • Instruction ID: 58a8795b3cbab8c6abd072bb06b7f0d3afa4411fcd6dc3abcbc9cf26c046caed
                                            • Opcode Fuzzy Hash: d6493d6e35529629c397c204590ddb3bde36fd56b60c7bb670539de328662dbf
                                            • Instruction Fuzzy Hash: 82418433B155548BE78CDF2AC825AAD73A2F7D8304F85C23DEA0AC7785DA399905CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction ID: 3229d07800f2bc6543b1ea3408e93a3b664117935dd35b9b83b99e76ad098a7d
                                            • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction Fuzzy Hash: 4FF08C25324767BEFE00853B4624FBD6E409BC1701FA369798C80020CB869E54D3D724
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7d970218e3aa96889e2f23fa12dc07f649a3e20bed6a2250d26d7c1d68203ed
                                            • Instruction ID: 142b4b2c7a260132be1c6a8ea12e491b193c148fe097494af5e194119df2aef8
                                            • Opcode Fuzzy Hash: a7d970218e3aa96889e2f23fa12dc07f649a3e20bed6a2250d26d7c1d68203ed
                                            • Instruction Fuzzy Hash: 8DA01261605945C092004701E154D106320EB847093404020880C058108E2480418214
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strcmp$strncpy$strchr
                                            • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                            • API String ID: 1395212091-3550120021
                                            • Opcode ID: fd9132446598627dac80f3361285ecd42b717152dc9d498104ac5f675495c2f5
                                            • Instruction ID: 71c31a9c941caab9b864d1eed83c28dde430ebb23507d7977049620bdf7ffb8e
                                            • Opcode Fuzzy Hash: fd9132446598627dac80f3361285ecd42b717152dc9d498104ac5f675495c2f5
                                            • Instruction Fuzzy Hash: C4021C50F1C613D1FB50BB26DE859B8B6A5EF11386FC0013AEA1E96196EE1EE505C332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$CounterPerformanceQuery
                                            • String ID: Closing connection %ld
                                            • API String ID: 3490100708-2599090834
                                            • Opcode ID: 90f4a61b890676859e828e6c98ff77484596098afe6d505de62526d5a9d4fae4
                                            • Instruction ID: 77f4fb7af5e17610e591623db8322bccbdb871321ae14e5659a3ab58b854fb58
                                            • Opcode Fuzzy Hash: 90f4a61b890676859e828e6c98ff77484596098afe6d505de62526d5a9d4fae4
                                            • Instruction Fuzzy Hash: 1FC17135908B81C2E740AF22E4905EC7374FF89F69F480139DE5E4B359DF3895898762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree$strpbrk
                                            • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                            • API String ID: 2737852498-2994854565
                                            • Opcode ID: b81f58161addea24da3c0a21f3837032f9f7d46342d51fc4cf5e3eea1c814e60
                                            • Instruction ID: c21e28ea04be2452ff7ebe4452c1707695d002e8ef7a6ce85384ad75bd1a205a
                                            • Opcode Fuzzy Hash: b81f58161addea24da3c0a21f3837032f9f7d46342d51fc4cf5e3eea1c814e60
                                            • Instruction Fuzzy Hash: 87D1A361F09B52C4FA51EB23D454AB9B7A0AF45B86FC40039DE4E07795EF3CA44AC362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: AttributeConsoleHandleText$__acrt_iob_func__stdio_common_vfprintfsystem
                                            • String ID: Inserir Key: $ Status: %s$##########################################################$##########################################################$[ Selecione uma opcao: ]$cls
                                            • API String ID: 2136955776-2655065097
                                            • Opcode ID: d1894e2e81ccde057fc62d3ef3cf9512dbb5fb357acd08f42121dc7579dbd44f
                                            • Instruction ID: 90f2c141cd7fbbc0545542ce4ab471abe3f0221e92dd9333b6af5e4e90b26792
                                            • Opcode Fuzzy Hash: d1894e2e81ccde057fc62d3ef3cf9512dbb5fb357acd08f42121dc7579dbd44f
                                            • Instruction Fuzzy Hash: 1A417D20A08947C6FA017772D829AB4B3649F95F67F94023CD52E46AF1DE2CA5898333
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc$memmove$htonl
                                            • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                            • API String ID: 3024061003-242323837
                                            • Opcode ID: 8a77d108d3d81cbf765f7fcfb8f3fceda42594ed8a172e8db7c841c8ad7d5d90
                                            • Instruction ID: 45a67339c17970cf3fe5fcd6d0f642302bcdaae5626ca45d070a6489e5bf0b50
                                            • Opcode Fuzzy Hash: 8a77d108d3d81cbf765f7fcfb8f3fceda42594ed8a172e8db7c841c8ad7d5d90
                                            • Instruction Fuzzy Hash: 8EC19171A08B42C6EB50EB66E441AADB7B0FB49B95F804039DE4E43B54DF3CD449CB61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove
                                            • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                            • API String ID: 2162964266-857957974
                                            • Opcode ID: 1d7c2344a95f1c6f2a349fae617218c31eb6dfd67b8cd673fe08b3da0b9f986d
                                            • Instruction ID: 458d6be9c50b2160c0979b72e2a3d9f85e77ad0c564ea7d4b50821d0265b3682
                                            • Opcode Fuzzy Hash: 1d7c2344a95f1c6f2a349fae617218c31eb6dfd67b8cd673fe08b3da0b9f986d
                                            • Instruction Fuzzy Hash: D502DF32A08B81C5EB64EB0BD444BA9BBA4FB44B96FD0513ADE4D877A0DF38D451C712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: calloc$_strdupfreehtonsmemset
                                            • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                            • API String ID: 130798683-4053692942
                                            • Opcode ID: 788a240145cf897ad6ab0afcb193bec081d91315be595ad5a54b3b3c1ff8ea53
                                            • Instruction ID: 56ebd8c4f602175e0e1f67d12622c6ad88e0feb80b88bcb0923b1d000e4e6245
                                            • Opcode Fuzzy Hash: 788a240145cf897ad6ab0afcb193bec081d91315be595ad5a54b3b3c1ff8ea53
                                            • Instruction Fuzzy Hash: 3BE1C432A08682C6EB60AF23E5407BDB7A0FB48B85F85413ADA4D57754DF3CE544C762
                                            APIs
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C366F26
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C366F4C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C366F5D
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C366FCB
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C366FFC
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C36701C
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C36702E
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C367090
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C367101
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C367118
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C3671D3
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C367247
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF76C36665F), ref: 00007FF76C367250
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$free$_strdupcalloc
                                            • String ID: LDAP$base$one$onetree$sub$subtree
                                            • API String ID: 112326314-884163498
                                            • Opcode ID: c03d76c78a62b4c3c2ba51b0664dc36608633aa4495fc0907f3d7f15cd726f22
                                            • Instruction ID: 7f894b1a968446d4cf8d99a604c6a6c2e408eb869d9a9eb3a899382b717f3533
                                            • Opcode Fuzzy Hash: c03d76c78a62b4c3c2ba51b0664dc36608633aa4495fc0907f3d7f15cd726f22
                                            • Instruction Fuzzy Hash: 1EB1E322A09B82C2EA51BF179540A79B7A0FF4AB82FC54139DE4D57780EF3CE445C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memchrstrtol
                                            • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                            • API String ID: 1626215102-895336422
                                            • Opcode ID: 049c3e20deb10b40dcfedbf3c704b7037e8846cd2ba8692fe0c3ac57ed0f1f9d
                                            • Instruction ID: 9cbd54054b38294d1a5fe3f4dd2585071660e1d244eb506a2c434b2acb1902fb
                                            • Opcode Fuzzy Hash: 049c3e20deb10b40dcfedbf3c704b7037e8846cd2ba8692fe0c3ac57ed0f1f9d
                                            • Instruction Fuzzy Hash: 2561F261B09686C1EA14EB17E940AB9B351AF45BD2FD14239ED2E5B2D6CE3CE105C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                            • API String ID: 1294909896-1595554923
                                            • Opcode ID: 314a10f2e5c8186c1d427718dbc50ec86cb0a5be25892002fca901ac904fcbc2
                                            • Instruction ID: 0ece8986220610e6d2468445499595847cd253c042b758af2385fb8b48e3cb13
                                            • Opcode Fuzzy Hash: 314a10f2e5c8186c1d427718dbc50ec86cb0a5be25892002fca901ac904fcbc2
                                            • Instruction Fuzzy Hash: 91E18222B096D2D5EA65AB13D540AB9B7E0FF05B86FC84439CE4D87781DF3CE8548362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                            • API String ID: 1294909896-115817326
                                            • Opcode ID: cb668218b851a7c89985f250c35be2df344c9f620ae442767e53e00dea676c27
                                            • Instruction ID: 4ca308b9a56a8d9ff37ff4df13800cca540f8eb096eee70575c4a4b068df8134
                                            • Opcode Fuzzy Hash: cb668218b851a7c89985f250c35be2df344c9f620ae442767e53e00dea676c27
                                            • Instruction Fuzzy Hash: 2691B422E0D692C1FB50AB17D950BB9B390EF44796F84803EDA5D4B794DF2CE449C722
                                            APIs
                                              • Part of subcall function 00007FF76C3348D0: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00000000,?,00007FF76C33434E,?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019), ref: 00007FF76C3348F3
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334949
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334953
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33495D
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334967
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334971
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33497B
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334985
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33498F
                                              • Part of subcall function 00007FF76C3348D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C334998
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333A77
                                            • strchr.VCRUNTIME140 ref: 00007FF76C333A91
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333ABB
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333AC8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333AF2
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333B06
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333B13
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333B2C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333B3A
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333B48
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333B63
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333B7F
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333B9B
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333BB7
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333BD3
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333BEF
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333C0B
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C333C23
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333CBB
                                            • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF76C333CF2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C333D33
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                            • String ID:
                                            • API String ID: 1087521380-0
                                            • Opcode ID: 089a5a03bc5c3338f5f14f5c61e106f0461a9d0fa56a305af5125a8979fe0107
                                            • Instruction ID: d41daee46b77dfb3e41ebceb5255ea1ca20b17f60e8c5eac2c54b7b739f61bbf
                                            • Opcode Fuzzy Hash: 089a5a03bc5c3338f5f14f5c61e106f0461a9d0fa56a305af5125a8979fe0107
                                            • Instruction Fuzzy Hash: BDB1A461A0E7C2C5EA95BB27D550A78B7A0AF45B96F884138CE4D07781DF3CE4968322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchrstrrchr$_strdupstrstr
                                            • String ID: .$/$/$/$?
                                            • API String ID: 2325335452-1821401756
                                            • Opcode ID: 459753924c62641f8fb549a96d81a01b7a5a798043c7beb83318c9593b7683b2
                                            • Instruction ID: e4c77472f31497abee4fc94c7c0858d4c13203dc78582928c8a144b23d3f0044
                                            • Opcode Fuzzy Hash: 459753924c62641f8fb549a96d81a01b7a5a798043c7beb83318c9593b7683b2
                                            • Instruction Fuzzy Hash: 9D81C112A0C382C5FB656B239501B79FA91AF56796FCA4138C98D173C6EE3CE445C732
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 0e191e237b70b5de089bd44c49aaa087385d8131f2c93037b7c4796d17c08956
                                            • Instruction ID: 2feb778664535aed6873a8d4af5924b530a9c3856f3bb020f398f21fab8f18a3
                                            • Opcode Fuzzy Hash: 0e191e237b70b5de089bd44c49aaa087385d8131f2c93037b7c4796d17c08956
                                            • Instruction Fuzzy Hash: 0B91E676A09BC1D3E7499F21D9902A8B3A8FB48F59F040139EF9D47354DF34A6A98321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmovestrchrtolower$__stdio_common_vsscanfstrtoul
                                            • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                            • API String ID: 2189764445-1753329177
                                            • Opcode ID: 54f609b40ce6f50ec157beb48a3f024865b6beca4a3427429f88ed561e560bf3
                                            • Instruction ID: fd48c141eb72aa94eb3458803bce0468734a3e116dfd43ea60ee2585d69b2410
                                            • Opcode Fuzzy Hash: 54f609b40ce6f50ec157beb48a3f024865b6beca4a3427429f88ed561e560bf3
                                            • Instruction Fuzzy Hash: FED1D422A18682C5EB10AB22D800BF9B760FB46799FC48239DA5D1B7C5DF3CD509C361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                            • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                            • API String ID: 3103143820-2414412286
                                            • Opcode ID: cebc4c8935ab1215365148924880485d93f75f34bc06cfdadf451f7eefc6623a
                                            • Instruction ID: 16ffb3e9d4f0f5f50163d07ea6fe6c1d3849a79b3e199adfb93b8c04be31b775
                                            • Opcode Fuzzy Hash: cebc4c8935ab1215365148924880485d93f75f34bc06cfdadf451f7eefc6623a
                                            • Instruction Fuzzy Hash: 50D1A722B08682D2EA58BB22E540AB9FBA0FF45786FD0003ADB4D47B55DF3CE555C712
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                            • API String ID: 0-3760664348
                                            • Opcode ID: ffe0b0e7e9d5baa33c1f922b1d54f1c39b7d1a67fb1929564115e9779a9269e0
                                            • Instruction ID: 1b5a15ae5e631750a7f65a5377b04819ff2085a369cbb8bd81bd9ec2153658a2
                                            • Opcode Fuzzy Hash: ffe0b0e7e9d5baa33c1f922b1d54f1c39b7d1a67fb1929564115e9779a9269e0
                                            • Instruction Fuzzy Hash: 24E1F56290C6C1C9EB54EF16D944BB9B790FB4A785F88813ADA4D4B795CF3CE048C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$Token$InformationProcess$CloseCurrentErrorHandleLastOpenProfileUnloadUsercallocmallocmemmove
                                            • String ID: none
                                            • API String ID: 3698963424-2140143823
                                            • Opcode ID: 952d9d2b3e7ddd6734957dbd48fe98856ba79dd73a982d36d3fc39ff0bd1b752
                                            • Instruction ID: a2425d04b5012db26470c960d6c3fc4b230031847a3699d2f08092d964202c13
                                            • Opcode Fuzzy Hash: 952d9d2b3e7ddd6734957dbd48fe98856ba79dd73a982d36d3fc39ff0bd1b752
                                            • Instruction Fuzzy Hash: 8CD15E22A05BC1CAEB60AF26D8407E873A0FF45B69F844639DA6D0BB95DF3CD554C321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                            • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                            • API String ID: 2572311694-3353508759
                                            • Opcode ID: 0d90e1c2379848367334fa5f61495e5cd12c10ce09739530cd6b62b3d29912c2
                                            • Instruction ID: 7ebdf0d20cbf7356c5b5b0e8aacff7b08b38d1c404d3aaf8699c37777a5d5877
                                            • Opcode Fuzzy Hash: 0d90e1c2379848367334fa5f61495e5cd12c10ce09739530cd6b62b3d29912c2
                                            • Instruction Fuzzy Hash: 31B1E422A08A82C5EB24AB17D814BB9B7A0FF85B86FC44139DA4D47794DF3CD445CB22
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdup
                                            • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                            • API String ID: 1922034842-2519073162
                                            • Opcode ID: b632471b7bfe1b8db0ec65ac282cd283094596eff89572a7bbe89724531a34d2
                                            • Instruction ID: 17b24b43e67f9a8afba8eb5967c8539ee9a52793b940cee9c59040e328604f84
                                            • Opcode Fuzzy Hash: b632471b7bfe1b8db0ec65ac282cd283094596eff89572a7bbe89724531a34d2
                                            • Instruction Fuzzy Hash: 6291CC61A0D682C5FB61AA139D00BB9F790AF05B87FC48039DA5D4F695EF2DE5488332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                            • API String ID: 111713529-3006446216
                                            • Opcode ID: 5e5fd73917bfed335e978ba5693303ace8c963d875601bf886e273a219d58a4f
                                            • Instruction ID: b14d2e86046e2dca9a4c25d9749098304d51de8950ab69a5cc943c3f59d1f2ea
                                            • Opcode Fuzzy Hash: 5e5fd73917bfed335e978ba5693303ace8c963d875601bf886e273a219d58a4f
                                            • Instruction Fuzzy Hash: 0A71E7A7E0D7C1C5FB11AB2690516B9BBA0EF4674AFD8407ACA8E03751DE2CD449C336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                            • API String ID: 2190258309-1086287758
                                            • Opcode ID: fe064cbe4e5935a4964878d0c04b49044c0648fa1a26e6cb31ad0e121d9d0226
                                            • Instruction ID: 406ac9acdfcdc551ab587983faf12c5f6868475d5b63b90034b5811aeb3d88b5
                                            • Opcode Fuzzy Hash: fe064cbe4e5935a4964878d0c04b49044c0648fa1a26e6cb31ad0e121d9d0226
                                            • Instruction Fuzzy Hash: 1DB17072A09B42C6EB50AB27E8806ADB7B0FB48B99F800039DE4D57B54DF3CD549CB51
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                            • API String ID: 1294909896-1220118048
                                            • Opcode ID: c8939b9a31850f9bbc219c3703b908ed85a4c5248cfd8eadb0983f64d119b1ef
                                            • Instruction ID: 08b6b2207914d0428fa1bddbd4020066abd2ac97f441261923406aa12e130aae
                                            • Opcode Fuzzy Hash: c8939b9a31850f9bbc219c3703b908ed85a4c5248cfd8eadb0983f64d119b1ef
                                            • Instruction Fuzzy Hash: 0E719062A08B82C1EA25FB5391619F9B391FF8ABC5FC4403AED4D03789DE3CD505C662
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID:
                                            • API String ID: 111713529-0
                                            • Opcode ID: 59445d0a83eb10703d2531457c3031a4930f1781522a2d573ceddfd4c256b715
                                            • Instruction ID: 2a387d7f23405006ed671ad828f4d36abd1febab132252e1a351ba6555d4eeb4
                                            • Opcode Fuzzy Hash: 59445d0a83eb10703d2531457c3031a4930f1781522a2d573ceddfd4c256b715
                                            • Instruction Fuzzy Hash: 16616B76A09B41C2EA65EF12E444969B7B4FF48B92B854039CF4E43750EF3CE898C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                            • API String ID: 1294909896-2312071747
                                            • Opcode ID: c6071a72ecdd265040bc78c05ad51c5bf2b018dc7c54eb9651d3a9928b24266d
                                            • Instruction ID: adfa86f96f073b926ba7ac97c8b74a80610544c141527a02152ffd335fdd2d14
                                            • Opcode Fuzzy Hash: c6071a72ecdd265040bc78c05ad51c5bf2b018dc7c54eb9651d3a9928b24266d
                                            • Instruction Fuzzy Hash: 97D1C461A0C686C5EA64BB329550BB9FA50FF45396FC00239DB6E0B6C2DF7CE4449372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                            • API String ID: 4109794434-4095489131
                                            • Opcode ID: c741b65d53c61d4e980e3ecfad5369e6e0788e9c97940574e1061d66af24bd58
                                            • Instruction ID: c0a2fe7013be2ade68c94d0e6fea34eca52470e60f10536a4dff1d24364a8bd0
                                            • Opcode Fuzzy Hash: c741b65d53c61d4e980e3ecfad5369e6e0788e9c97940574e1061d66af24bd58
                                            • Instruction Fuzzy Hash: 0061D721E0DBC2C1EA50AB23D505AB9BB94BF56B86FC84038DE8D07795DF3ED4059362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                            • String ID: Unknown error %d (%#x)
                                            • API String ID: 4262108436-2414550090
                                            • Opcode ID: 7835c0da5a7f6f6b75ee3b1f093b2fc2dc03dd2039c79966addc4d66b7e5ec91
                                            • Instruction ID: 4dd1ac626ee16c37891bd92406a250d0256b1ca28afc72a24d942529d61597f8
                                            • Opcode Fuzzy Hash: 7835c0da5a7f6f6b75ee3b1f093b2fc2dc03dd2039c79966addc4d66b7e5ec91
                                            • Instruction Fuzzy Hash: 75318D61A08752C6FE157F23A815679F6A1AF86B86F88043DCE4E0B795DE3CE4018732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$calloc$malloc
                                            • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                            • API String ID: 3103867982-1477229593
                                            • Opcode ID: 27d9c10037ddf4088466da6341d33baf144ae8f5d3b01d9b706f534e7aa47616
                                            • Instruction ID: 773f3080e964296f226a2cc1fcdffb16df529186ac381cb892e5fccb69c4541e
                                            • Opcode Fuzzy Hash: 27d9c10037ddf4088466da6341d33baf144ae8f5d3b01d9b706f534e7aa47616
                                            • Instruction Fuzzy Hash: A0C18A72A09B41C6EB10EF26E4406ACB7B4FB48B89F90003ADE4D97B58DF38D845C791
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                            • API String ID: 2190258309-1457932261
                                            • Opcode ID: 487756b31ff12c1712ac9d65f99dc5b4cddb0488aa562ff7160057ed26db9bf7
                                            • Instruction ID: 5976e8c2355dda42d432291e1e833519e81fa5d35ec078acfbe6133bdd6f4e55
                                            • Opcode Fuzzy Hash: 487756b31ff12c1712ac9d65f99dc5b4cddb0488aa562ff7160057ed26db9bf7
                                            • Instruction Fuzzy Hash: 9B61B062A097C2C1EB11AB279458BF9B3A1BF49795F84053ACD1E17795DF3CE045C322
                                            APIs
                                            • memset.VCRUNTIME140 ref: 00007FF76C36311B
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C363245
                                              • Part of subcall function 00007FF76C32F690: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C339C90), ref: 00007FF76C32F6B7
                                              • Part of subcall function 00007FF76C32F690: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C339C90), ref: 00007FF76C32F6C3
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C3631FF
                                              • Part of subcall function 00007FF76C32F5F0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C32F600
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freestrncpy$_strdupmemset
                                            • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                            • API String ID: 3826632026-748038847
                                            • Opcode ID: 5c4c5efeb709bc279ff3fef4cd355d0e0eb1053cf8fb5e78e2b6ebfcf8a075db
                                            • Instruction ID: 16ee4ce013dc4563f8967fd588e18c9511b70eefe3efc85e4a5ef0a65cedaa68
                                            • Opcode Fuzzy Hash: 5c4c5efeb709bc279ff3fef4cd355d0e0eb1053cf8fb5e78e2b6ebfcf8a075db
                                            • Instruction Fuzzy Hash: 30717B32A0CAC2D4EB61AF12D541BE9B3A0FF85785FC4403AEA8D57254EF38D545C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                            • API String ID: 1294909896-3837278924
                                            • Opcode ID: 31af0c23b1c83e95bb4df4e5cc642392c2e180e1a70c236c58b594a03b6466c0
                                            • Instruction ID: fc552e6ae084d9741426156f0ed7d143c7c518500f753138e818a983b5950f9d
                                            • Opcode Fuzzy Hash: 31af0c23b1c83e95bb4df4e5cc642392c2e180e1a70c236c58b594a03b6466c0
                                            • Instruction Fuzzy Hash: F2D1AF72A08A82C1EB11DF26D0807B9BBA1FB45B8AFC58136CA4E57786DF7CD505C321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastsend
                                            • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                            • API String ID: 1802528911-931584821
                                            • Opcode ID: 98570612f845681cb8316dc2d0c57f7f06436b9f54ffb9af636fe21cdc89713c
                                            • Instruction ID: 84e16ab3900de025fef70d6d0402a76c11eec608626972e59b651e43e783c6af
                                            • Opcode Fuzzy Hash: 98570612f845681cb8316dc2d0c57f7f06436b9f54ffb9af636fe21cdc89713c
                                            • Instruction Fuzzy Hash: 5191AC22A08AC1D5F721AF26E405BEAB3B0FB847A9F840235EE5907A85DF3DD145C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: sendto$_time64
                                            • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                            • API String ID: 2327272419-1785996722
                                            • Opcode ID: a739396e22cd55185f4be898eb8fd48355b2566d1c1e031c5d5e86705a1defe6
                                            • Instruction ID: e4748b52ebc628f5b81150dc3abe2eb4e0d4c47724a551f3e2aa52f2ebd1cfd8
                                            • Opcode Fuzzy Hash: a739396e22cd55185f4be898eb8fd48355b2566d1c1e031c5d5e86705a1defe6
                                            • Instruction Fuzzy Hash: E4915C32608781C6D711DF2AD440BA9BBB0FB88F89F95813ADA4D4B769DF39D406C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup$freestrchrstrncmpstrtol
                                            • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                            • API String ID: 2070079882-2404041592
                                            • Opcode ID: 0db6145b29768de6e00a555748d2aafb62e82f84911b03186957fec727471a82
                                            • Instruction ID: fb820b17dc1bbb20215c89b59502cafa0629f4ffcb341603a35b6ceda61034eb
                                            • Opcode Fuzzy Hash: 0db6145b29768de6e00a555748d2aafb62e82f84911b03186957fec727471a82
                                            • Instruction Fuzzy Hash: FF513621A0D6C2C5FB52BB27D860B75BBD1AF15B96FC84039DA4D0B2C5EE2CE445C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$none
                                            • API String ID: 4109794434-3629594122
                                            • Opcode ID: 017d048edd16c6ec0247f245313d718386d122e255efc9ac15ff4b89fa50d49c
                                            • Instruction ID: e73c6960482e7e7f6a3362f3e888a020c694c62bfe5729be836a508b9b23199a
                                            • Opcode Fuzzy Hash: 017d048edd16c6ec0247f245313d718386d122e255efc9ac15ff4b89fa50d49c
                                            • Instruction Fuzzy Hash: 1D518B22A0D7C2C1FA95A7139550A79F6A0AF45B86FC48438DE4E077D1DF3CE4478762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove
                                            • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                            • API String ID: 2162964266-1652449680
                                            • Opcode ID: 15b28ee0dc7afdc99876186d2639be1097c43ea825e2f286f394cd46f71f9380
                                            • Instruction ID: ed333513a6a56e6da2f11f546bf9525cda828138785ba82e7167652f1c2af33d
                                            • Opcode Fuzzy Hash: 15b28ee0dc7afdc99876186d2639be1097c43ea825e2f286f394cd46f71f9380
                                            • Instruction Fuzzy Hash: 6EA18336A08A82C1E750EF22D840BF9B350EF45B9AF848139DD5E4F295DE7CE449C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                            • API String ID: 1294909896-3146291949
                                            • Opcode ID: 29a20cc696259e2f022ba711c8fc5fc43b02f55b293fb6f7c1f8397749bff4f3
                                            • Instruction ID: a9c4b037430fdd41b988b0905cee203f96d9c7e1e5d5d14dcd6ce80c90ca0ab7
                                            • Opcode Fuzzy Hash: 29a20cc696259e2f022ba711c8fc5fc43b02f55b293fb6f7c1f8397749bff4f3
                                            • Instruction Fuzzy Hash: BB919221B09A82C5EA64AB23D590BB9B7E4EF45786FC4403DDB4E87785DF2CE4448362
                                            APIs
                                              • Part of subcall function 00007FF76C31FEB0: memmove.VCRUNTIME140 ref: 00007FF76C31FEE1
                                              • Part of subcall function 00007FF76C325AB0: memmove.VCRUNTIME140 ref: 00007FF76C325C6A
                                            • memmove.VCRUNTIME140 ref: 00007FF76C320AA3
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320C07
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320C5A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320CAB
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320CEA
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320D39
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320D78
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320DF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                            • String ID: parse error$parse_error
                                            • API String ID: 15630516-1820534363
                                            • Opcode ID: 8957c1c4e1c2b83c3f31169acd024aeb7252b41b26b3387584ab1cd50cd49b87
                                            • Instruction ID: f0c440b13fa2e92caed682ad38738db1ec670de96e108f6588edadd2893d5e94
                                            • Opcode Fuzzy Hash: 8957c1c4e1c2b83c3f31169acd024aeb7252b41b26b3387584ab1cd50cd49b87
                                            • Instruction Fuzzy Hash: 95C1C172A18B85C5EB00EB26D44576DB721FB857A8F804239EA6D07BE5DF7CE084C311
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF4D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF6A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF7E
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AF9A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFB7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFDA
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33AFEE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B002
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B028
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B03C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B050
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B09F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B0AC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33B555), ref: 00007FF76C33B0D5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 478daf218b1f896e38bb4ca9f995d36e0b085d091a18a161c911cd5f318e8abe
                                            • Instruction ID: 3af50a38e48756302eb8420335a6b0490aa68eefb0e7111298c82df4a68c24d3
                                            • Opcode Fuzzy Hash: 478daf218b1f896e38bb4ca9f995d36e0b085d091a18a161c911cd5f318e8abe
                                            • Instruction Fuzzy Hash: 8B51EE75A09A81C1EB44BF22D8916FDB7A0EF88F96F884039DE0E4B755CE3994498371
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                            • API String ID: 2190258309-1670639106
                                            • Opcode ID: 02b77d5e6935b5c7a31a4f020e58492768025473db3337dfa4a92050bc84e8a5
                                            • Instruction ID: 1af256dcc8b1f89d437d54eefe56db65b05f791bd6d26e44eda079a9bf558d99
                                            • Opcode Fuzzy Hash: 02b77d5e6935b5c7a31a4f020e58492768025473db3337dfa4a92050bc84e8a5
                                            • Instruction Fuzzy Hash: FBA17362909A86C5EB50AF23D550BB8BFB0EB44785FC45039DB4E87B85DF38E495C322
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C36848B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3684F1
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3684FF
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3685FD
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C368666
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C36867E
                                              • Part of subcall function 00007FF76C3675D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF76C3675E0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3686A6
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3686BD
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C3686E2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C36872F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C368744
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C36888C
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C368896
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688A0
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688AA
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688B4
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688BE
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688C8
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688D2
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688DC
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688E6
                                              • Part of subcall function 00007FF76C368880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688F0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$calloc$_strdup
                                            • String ID: ,$:
                                            • API String ID: 2460172880-4193410690
                                            • Opcode ID: 191a193e223222a0de7a5df7a0ca04a47fec74119bf7e16bd5ea21dbbb06f29f
                                            • Instruction ID: 2caa43d0d553f740228e30ad379b55984045660b79192f2243a5d907aaac3b17
                                            • Opcode Fuzzy Hash: 191a193e223222a0de7a5df7a0ca04a47fec74119bf7e16bd5ea21dbbb06f29f
                                            • Instruction Fuzzy Hash: FD51B452E0D686C2F721AB3795006B9B360BF5A789F859139CF8E21652EF2CF5C48353
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup$free$strrchr$_access_stat64
                                            • String ID:
                                            • API String ID: 2557200964-0
                                            • Opcode ID: 8415e43d844da1d1ae3a42dabc1986ed7e08fe7686cfa6c9b0dd07b624fc7d84
                                            • Instruction ID: ac03dbcfe561c7af666086abbbf45bc51c659a901b1bf873f1cba724c73e6e18
                                            • Opcode Fuzzy Hash: 8415e43d844da1d1ae3a42dabc1986ed7e08fe7686cfa6c9b0dd07b624fc7d84
                                            • Instruction Fuzzy Hash: 51415461709B42C9FA50AB13E490A75B2B0FF48B92F844138DE5E87791EF3CE4558721
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove$strchr
                                            • String ID:
                                            • API String ID: 666779114-0
                                            • Opcode ID: 37c2857792015e2703bb74e976d0383ffc375ac6723a0de92d407b196625c29f
                                            • Instruction ID: 1a018dde50b97184474a9cd259d303f74506d45685518f690098ce33ce065fc8
                                            • Opcode Fuzzy Hash: 37c2857792015e2703bb74e976d0383ffc375ac6723a0de92d407b196625c29f
                                            • Instruction Fuzzy Hash: E751A025B0ABC5C1EA65AF17E500A79F294BF84BC9F884538DE4E4B744EF3CE8058321
                                            APIs
                                            Strings
                                            • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF76C33DC69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Couldn't find host %s in the .netrc file; using defaults
                                            • API String ID: 2653869212-3983049644
                                            • Opcode ID: 4d1e6b0f68293bb7fe892e01b5799d75cda67b82eb617e7538b18242f9299537
                                            • Instruction ID: f1e050d36a61e0a58e0cddbbc727b513b52c0fd79554d6160b39e35169f6cd4b
                                            • Opcode Fuzzy Hash: 4d1e6b0f68293bb7fe892e01b5799d75cda67b82eb617e7538b18242f9299537
                                            • Instruction Fuzzy Hash: 4C71C221A29BC2C6EB65AB26D454BA9B7A0FF84786F440039DB4D47390DF7DE854C322
                                            APIs
                                            Strings
                                            • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF76C33DC69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Couldn't find host %s in the .netrc file; using defaults
                                            • API String ID: 2653869212-3983049644
                                            • Opcode ID: 7bf59007d463cf5a9d5fc79b1630f18c9d65b001c381e53cd09b4e649f9bc08c
                                            • Instruction ID: d85c5b7d70da50ca67ffe665e20c1a3157daf348f4d676d0cf492b5cfce73097
                                            • Opcode Fuzzy Hash: 7bf59007d463cf5a9d5fc79b1630f18c9d65b001c381e53cd09b4e649f9bc08c
                                            • Instruction Fuzzy Hash: 4551E462A19BC2C6E755AB26D4547ADB7B0FB84B86F454039CB4D43350DF7CE454C322
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                            • API String ID: 0-1262176364
                                            • Opcode ID: 2f331b1f740c486ac4bbee9f459dc41859cce29cd31bde03c17c654d2e876e61
                                            • Instruction ID: 00ce3d1319ffb71159bebdcd076ffdf62a7e3e95f2afb50c87cbb0de2c1ddad6
                                            • Opcode Fuzzy Hash: 2f331b1f740c486ac4bbee9f459dc41859cce29cd31bde03c17c654d2e876e61
                                            • Instruction Fuzzy Hash: 3141D426B0D682C5FB14BB17E6809BAF760AF44B92FC44039DB4E07651DF7CE9448762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                            • API String ID: 2653869212-571364039
                                            • Opcode ID: 53394fd86cc2f81c5ef2061a62f0e4f3ca19e482debb28b2988e149469eb7063
                                            • Instruction ID: 141a31a31236fce0dbd434b1a704b8cc35b8f50a6c07559e5e15dffc0d0184c3
                                            • Opcode Fuzzy Hash: 53394fd86cc2f81c5ef2061a62f0e4f3ca19e482debb28b2988e149469eb7063
                                            • Instruction Fuzzy Hash: 4441BD66A087C2C4EB11AB639545AF9B760BB0A78AFC80439DE4E1B755DF3CE044C326
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchr
                                            • String ID: Unknown error %u (0x%08X)
                                            • API String ID: 1897771742-1058733786
                                            • Opcode ID: e39e39cea46f1d575da9a0d4c5f6be07848d54757560fa3e54bbb459c6790418
                                            • Instruction ID: 0c1d97e9d4630a84f10ee325e27f79fc84df3da12e53ae25f2fe605cc6b91437
                                            • Opcode Fuzzy Hash: e39e39cea46f1d575da9a0d4c5f6be07848d54757560fa3e54bbb459c6790418
                                            • Instruction Fuzzy Hash: FA219332A0C782C6EB216F23A405A2AFAA0AF95BD6F844438CE4D07754CE3CE4408776
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C360D98
                                              • Part of subcall function 00007FF76C33F7A0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF76C34A9E5,?,?,00000000,00007FF76C34AD45), ref: 00007FF76C33F7B5
                                              • Part of subcall function 00007FF76C33F7A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF76C34A9E5,?,?,00000000,00007FF76C34AD45), ref: 00007FF76C33F7CB
                                            • memmove.VCRUNTIME140 ref: 00007FF76C360BB8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C360D09
                                            • memmove.VCRUNTIME140 ref: 00007FF76C360DD2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C360DDE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$memmove$realloc
                                            • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                            • API String ID: 1952216613-1165944077
                                            • Opcode ID: e1aa8db3ee0169baacf5268ea3da9d393f745f783bc48944b6770cead240aa2e
                                            • Instruction ID: de557a23efb3680fbfb9f4089a9fd829b1e906d55f70fddba14c7989e4fb7b73
                                            • Opcode Fuzzy Hash: e1aa8db3ee0169baacf5268ea3da9d393f745f783bc48944b6770cead240aa2e
                                            • Instruction Fuzzy Hash: 8471AD22B09BC5C6EA58EB23D401BA9B7A4FB49B81F854139DE9D47750EF3CE460C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 1169197092-2292467869
                                            • Opcode ID: 0604ac387c47867efe6ecd100851125aefa0580466ae69b23f0e88760cce4a05
                                            • Instruction ID: 2d7d2b8e1e166b5ef06e3de39f75665431ef81253478c5ea553ad6e987f442dc
                                            • Opcode Fuzzy Hash: 0604ac387c47867efe6ecd100851125aefa0580466ae69b23f0e88760cce4a05
                                            • Instruction Fuzzy Hash: 8191B22190D7C2C5FBB1AB13D544B79B7E0EF05756FC88139CA8E47691EE2CE4868322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                            • API String ID: 1169197092-907567932
                                            • Opcode ID: f200e0fbc4da2265812e5dff5ffd755b78f680c6d77b3d3a302b0ae15985897f
                                            • Instruction ID: 030e30609702225c394ef116b42819f765c6a80b93c63942e42e9b3f51467e9f
                                            • Opcode Fuzzy Hash: f200e0fbc4da2265812e5dff5ffd755b78f680c6d77b3d3a302b0ae15985897f
                                            • Instruction Fuzzy Hash: A871C57190C682C6FB14AA279941A7DF6D1AB0178AFC4C03CDA9A4E6D1DF2CE51D8732
                                            APIs
                                              • Part of subcall function 00007FF76C3156F0: memmove.VCRUNTIME140(?,?,?,?,?,?,?,00007FF76C31118E), ref: 00007FF76C3157DF
                                              • Part of subcall function 00007FF76C3156F0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF76C315803
                                              • Part of subcall function 00007FF76C3156F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF76C31118E), ref: 00007FF76C3157B9
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00000000,?,0000006E00000006,00000000,00000000,00000000,00007FF76C3119C5), ref: 00007FF76C3120F7
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00000000,?,0000006E00000006,00000000,00000000,00000000,00007FF76C3119C5), ref: 00007FF76C3120FE
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00000000,?,0000006E00000006,00000000,00000000,00000000,00007FF76C3119C5), ref: 00007FF76C312105
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00000000,?,0000006E00000006,00000000,00000000,00000000,00007FF76C3119C5), ref: 00007FF76C31210C
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00000000,?,0000006E00000006,00000000,00000000,00000000,00007FF76C3119C5), ref: 00007FF76C312113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemmove
                                            • String ID: 1.5$9WIvTVJa9m$valorant tpm
                                            • API String ID: 1322690092-3997688753
                                            • Opcode ID: c11c69f48ffd987e91e4297476de64ab12b0176dac25a9b557b445d78c8f973a
                                            • Instruction ID: 9380f5c4b7f24943ee9cabb0c5bdc438081327fa4062284930761aa91787379a
                                            • Opcode Fuzzy Hash: c11c69f48ffd987e91e4297476de64ab12b0176dac25a9b557b445d78c8f973a
                                            • Instruction Fuzzy Hash: 2971A572A08785C8EA01EB16E458B7DB361FB12BC6FC14139DA4D07AA1DF7DD490C366
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$strchrstrtol
                                            • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                            • API String ID: 137861075-1224060940
                                            • Opcode ID: 590598b28f8c1fbaf7895b767723792dd2f80375b8d066322f6f576a8c5a7c0e
                                            • Instruction ID: d1ace7c62d3c0333ff1b26515ee4ab8f0a28f4fd3bf8b54b078968b5db76cec2
                                            • Opcode Fuzzy Hash: 590598b28f8c1fbaf7895b767723792dd2f80375b8d066322f6f576a8c5a7c0e
                                            • Instruction Fuzzy Hash: CA51D622A09BC2D0EB31AB17E840BA9B7A0FB45B9AF844139DE9D07794CF3DD545C352
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfreestrpbrk
                                            • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                            • API String ID: 1812939018-2300960079
                                            • Opcode ID: d85e068c52626e2becebf8ba538184e34bf1e3aa1de3e62cbfebed318853bf19
                                            • Instruction ID: b635f99a4f0af3cd7c03839e12c8cfc05d8e8f0a3244e34f41ebd484eed2e0bb
                                            • Opcode Fuzzy Hash: d85e068c52626e2becebf8ba538184e34bf1e3aa1de3e62cbfebed318853bf19
                                            • Instruction Fuzzy Hash: B151B262E1DB81C1EB51EB16E440BB9BBA0EB86B85FC44139DB4E07791DF2CE545C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup$callocfreestrrchr
                                            • String ID: Wildcard - Parsing started
                                            • API String ID: 2641349667-2274641867
                                            • Opcode ID: ca505822f849fdc0b9fabbad51af24541adc8441d8566da4c1303b5dd021b71c
                                            • Instruction ID: 60826740abda2bf85d08558d5be59480ce58b5cf12bf405bb28a226778e24e58
                                            • Opcode Fuzzy Hash: ca505822f849fdc0b9fabbad51af24541adc8441d8566da4c1303b5dd021b71c
                                            • Instruction Fuzzy Hash: F3515032A09B42C5EB55EF12E4405B8BBA5FB88B86FC54039CB4E47354EF38E445C361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                            • API String ID: 2653869212-3672398475
                                            • Opcode ID: b19e4c9eb90a2fb6c6239b2f4bb1b50117ad651abad7024177c18b6a8718cb4d
                                            • Instruction ID: e71e0cd86c74394a2b74937c767e21391dfce160ef6b35f2f2f3b8fe8c5b6676
                                            • Opcode Fuzzy Hash: b19e4c9eb90a2fb6c6239b2f4bb1b50117ad651abad7024177c18b6a8718cb4d
                                            • Instruction Fuzzy Hash: 2341B066A097C2C4EB11AB679445AF9B7A0BF4A78AFC80439CE0E17755DF3CE044C326
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33362D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C333657
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C333661
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33366B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C333675
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33367F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C333689
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C333693
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C33369D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3336A6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C3342C9,?,?,00000000,00007FF76C33B019,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3336C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 3afa285faba232c223ab18476255f4c04fa1794b148b09435039080cc4694a75
                                            • Instruction ID: f09713adc869ca6698ca40dc47e6aabac1704e11cbea2ba1c6f52db556cc018c
                                            • Opcode Fuzzy Hash: 3afa285faba232c223ab18476255f4c04fa1794b148b09435039080cc4694a75
                                            • Instruction Fuzzy Hash: 8A21FC7AA09A41C2D790AF12E895568B770FF88FA2F444075DE4F43724DE3CD8898751
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C36888C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C368896
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688A0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688AA
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688B4
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688BE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688C8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688D2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688DC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688E6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3678B2,?,?,00000000,00007FF76C33F58B,?,?,00000000,00007FF76C33AFD3,?,?,00000000,00007FF76C33B555), ref: 00007FF76C3688F0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: f256fccd3fbba7d3d475af8563feb0cf41aa9f7cc68f0edff93953a7cebf999b
                                            • Instruction ID: 1c28e8d08df1d903849b2a4a06922d72a51b83cc0c40ea8ec53e5940dff6f90d
                                            • Opcode Fuzzy Hash: f256fccd3fbba7d3d475af8563feb0cf41aa9f7cc68f0edff93953a7cebf999b
                                            • Instruction Fuzzy Hash: 1201E76AA19901C2D744AF26D8954687770FF8CF66B401075CE0F82324EE28DC9DC791
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: mallocmemmove
                                            • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                            • API String ID: 2759278013-1832275178
                                            • Opcode ID: f83ba9c6c0a59426b62aa210c43bf338795b64d1c3cf7cf804955902c77166d7
                                            • Instruction ID: 5aec222ded9b6d8cdc27fb9731d5f0db528fd9fde84cd15fa9fd380cdbe09a28
                                            • Opcode Fuzzy Hash: f83ba9c6c0a59426b62aa210c43bf338795b64d1c3cf7cf804955902c77166d7
                                            • Instruction Fuzzy Hash: 7AA18E62A09B82C4EB65AF13E500BA9B3A4FB45B85FD54139DE4D137A4DF3CE814C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$freemalloc
                                            • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                            • API String ID: 1763039611-1003742340
                                            • Opcode ID: 4b3eaf214663c0e15994a5d7d670ef4aa194f5f58535bc580583f53b3a9ff4c4
                                            • Instruction ID: 4ba6347c342b41787338d319887f6a72d529e743f8c1d0ed6c6aed43babe9bbf
                                            • Opcode Fuzzy Hash: 4b3eaf214663c0e15994a5d7d670ef4aa194f5f58535bc580583f53b3a9ff4c4
                                            • Instruction Fuzzy Hash: 2481E47260CB81D1DA94AB17D046BA9B7A0FB4AB81F84443ADF8E47741DF3CD4A0C365
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1934541353-2901970132
                                            • Opcode ID: 3605ade58dd182b879f0f08e3f744ac8765769d641ba167dfb9487f9b7e14367
                                            • Instruction ID: 030f4f190da9db4fe39ebe7c59f4d02695c4eeeca06d750c423d5663c8a5938d
                                            • Opcode Fuzzy Hash: 3605ade58dd182b879f0f08e3f744ac8765769d641ba167dfb9487f9b7e14367
                                            • Instruction Fuzzy Hash: 1F611561A097C2C5EB18BB2385169F8B791AF06796F88453DCA5F0B7C5DE2CE0448336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1934541353-517259162
                                            • Opcode ID: f8484b79bede0465543583ba1237f2788175fa362c04aae621cdef81670d914c
                                            • Instruction ID: 4111fbd79f0eb1541acd20af876423891281d462bf29c01adf96245da616cdbf
                                            • Opcode Fuzzy Hash: f8484b79bede0465543583ba1237f2788175fa362c04aae621cdef81670d914c
                                            • Instruction Fuzzy Hash: 50613665E093C2C5FB18A723855AAF9B7A1AF06796F84413DCA0F07B85DE3DE0448336
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF76C34D878), ref: 00007FF76C36A260
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF76C34D878), ref: 00007FF76C36A297
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF76C34D878), ref: 00007FF76C36A2BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                            • API String ID: 1294909896-3948863929
                                            • Opcode ID: 3471edee3426cbe981f74471daa6985c5f6dafc7be6e636632d0d46a76f0ca45
                                            • Instruction ID: 39d7daa5d808b6e1fbeafeb06570db94f88c795f00310622fc688759d62905a9
                                            • Opcode Fuzzy Hash: 3471edee3426cbe981f74471daa6985c5f6dafc7be6e636632d0d46a76f0ca45
                                            • Instruction Fuzzy Hash: 59619D32A09B85C5EBA0EF07E448BAAB7A4FB44B85F91003ADA4D47754DF3CD545C712
                                            APIs
                                            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF76C316A45
                                            • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF76C316A65
                                            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF76C316A75
                                            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF76C316ABC
                                            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF76C316AE9
                                            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF76C316B0A
                                            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF76C316B50
                                            • ?uncaught_exceptions@std@@YAHXZ.MSVCP140 ref: 00007FF76C316B57
                                            • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF76C316B64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
                                            • String ID:
                                            • API String ID: 4121003011-0
                                            • Opcode ID: d55efdaead8d4f964f3329cd71a1c3c9bc3c5ae0c5aa83b81490cba9b08d0f96
                                            • Instruction ID: 1736144b774ec62d90e70a9fa3ab5b4e9d34f4017c35d0510a12a9737483263c
                                            • Opcode Fuzzy Hash: d55efdaead8d4f964f3329cd71a1c3c9bc3c5ae0c5aa83b81490cba9b08d0f96
                                            • Instruction Fuzzy Hash: 72516D32608A41C6EB21AF5BD494A38FBB0EB85F96B55C539CE4E87B60CE3DD4428311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: __stdio_common_vsscanfmallocmemmovestrncmp
                                            • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                            • API String ID: 4288564248-1168109407
                                            • Opcode ID: 3210e0860e4ed88976e58978891a773554cf488ac705ca43d078d8d6cafbe205
                                            • Instruction ID: 11d889b80c6bcdfb9b0a2ca69b048a0964cc66a73860b224ae8cb23c84cb5e19
                                            • Opcode Fuzzy Hash: 3210e0860e4ed88976e58978891a773554cf488ac705ca43d078d8d6cafbe205
                                            • Instruction Fuzzy Hash: 5A41DB61A086C2C1EB50AB239640AB9B7B0EF457C6FC44139EA5D5B3C5DF2CE405C736
                                            APIs
                                            • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF76C35F9A7
                                              • Part of subcall function 00007FF76C35FF50: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C35FF86
                                              • Part of subcall function 00007FF76C35FF50: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C35FFDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _fstat64_openstrchr
                                            • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                            • API String ID: 3410096895-1509146019
                                            • Opcode ID: d9d7867e8ccf4e272d4c4b119c60ecfd43a34f53d57c01d8327b6aa61e3e4333
                                            • Instruction ID: 97add5ef755cf64d443c9e6b15dff2e679125c766d8cbff7952d0ced368c1338
                                            • Opcode Fuzzy Hash: d9d7867e8ccf4e272d4c4b119c60ecfd43a34f53d57c01d8327b6aa61e3e4333
                                            • Instruction Fuzzy Hash: 4EB19431A08782C5EA21BB23A510BBAB791FF487C6FD44039DE4D47759EE3CE4058762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$mallocrealloc
                                            • String ID: 0123456789-$<DIR>$APM0123456789:
                                            • API String ID: 359134164-4291660576
                                            • Opcode ID: 804a13a2bd57bd790e79ecebc12e878e8b6444001c93cce5a5cb3f15121d3ee2
                                            • Instruction ID: e81083ed855a0a9f512b5321d8109e5230440c0923c2a257e5b9bd16d3e3d2dc
                                            • Opcode Fuzzy Hash: 804a13a2bd57bd790e79ecebc12e878e8b6444001c93cce5a5cb3f15121d3ee2
                                            • Instruction Fuzzy Hash: A9B18F36A09745C6EB68AF26D051779B7A0FB06B5AF94403DCA4E03394CF38E444C7B6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: malloc$Ioctlsetsockopt
                                            • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                            • API String ID: 3352517165-607151321
                                            • Opcode ID: 4da8ea7b6e38b7bea43f957f2dfb2ab707105471132a78fb99ab60b79481d29f
                                            • Instruction ID: 3f8d03824407624240bd072aea1ba4abb8749aa96357e5fce47e46afb024a6bb
                                            • Opcode Fuzzy Hash: 4da8ea7b6e38b7bea43f957f2dfb2ab707105471132a78fb99ab60b79481d29f
                                            • Instruction Fuzzy Hash: CFB1A632A08BC1C5EB65AF26D8447F877B0EB44B99F488139CE4D4A785DF3C9499C721
                                            APIs
                                            • memmove.VCRUNTIME140 ref: 00007FF76C326C88
                                              • Part of subcall function 00007FF76C319180: memmove.VCRUNTIME140(?,?,?,?,?,?,00007FF76C31FE98), ref: 00007FF76C319273
                                              • Part of subcall function 00007FF76C319180: memmove.VCRUNTIME140(?,?,?,?,?,?,00007FF76C31FE98), ref: 00007FF76C319281
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C326D1C
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C326D5B
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C326DA9
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C326DF7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                            • String ID: at line $, column
                                            • API String ID: 15630516-191570568
                                            • Opcode ID: 5e4d8d85a8d54d54532ebc7b1e5869757041f05c7f486f1e3ba87bc0a8d4ea7e
                                            • Instruction ID: 3ca84aba10d4317854875500debaae116eefb5178ec2ec63aa5dfe0c7e9d87b9
                                            • Opcode Fuzzy Hash: 5e4d8d85a8d54d54532ebc7b1e5869757041f05c7f486f1e3ba87bc0a8d4ea7e
                                            • Instruction Fuzzy Hash: 5F91AD62F18B8589FB00EBB6D0017EC7771EB45B98F80422ADA5C17A9ADF3CD046C361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freeisupper$mallocmemmove
                                            • String ID: TRUE
                                            • API String ID: 2733518094-3412697401
                                            • Opcode ID: f2018e842f5031247ae58c59ff1c54d847c529beee07d2226cbc78392c24967b
                                            • Instruction ID: f90770176d167e7b863d840ae641ef047557a0289ffb46046f5130a2d12a6476
                                            • Opcode Fuzzy Hash: f2018e842f5031247ae58c59ff1c54d847c529beee07d2226cbc78392c24967b
                                            • Instruction Fuzzy Hash: AF518A11E0C693C5FF19AA27425E778BB92EB177A2F84423DC65F066C1DE2E9041C33A
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C35FF86
                                            • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C35FFDB
                                            • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C36004C
                                            • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C360059
                                            • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF76C36016B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _close$_fstat64_openstrchr
                                            • String ID: Can't get the size of %s$Can't open %s for writing
                                            • API String ID: 423814720-3544860555
                                            • Opcode ID: ba70c184324fb380c2274616c21f2951f4d9364325d0ff2c2947b8fa208ef5e7
                                            • Instruction ID: f1b9a9e6866a6a1b04e3cb98f8547f659d0b8a080a0a14491b19dd348f9ef1f6
                                            • Opcode Fuzzy Hash: ba70c184324fb380c2274616c21f2951f4d9364325d0ff2c2947b8fa208ef5e7
                                            • Instruction Fuzzy Hash: 6851C921B08A82C2EA54AB27D801BFDB391BF85BD5F85813DDE4E57391DE3CE4458326
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLasthtonssend
                                            • String ID: Sending data failed (%d)
                                            • API String ID: 2027122571-2319402659
                                            • Opcode ID: 971336197add8dea3a6e41dd1de948a17abbced9218e037f20148f5db3cb34f3
                                            • Instruction ID: ce57a21b6d39c77a4cd07b76fb66323342cd0840bcadf2c8f5d5d5fce167c5db
                                            • Opcode Fuzzy Hash: 971336197add8dea3a6e41dd1de948a17abbced9218e037f20148f5db3cb34f3
                                            • Instruction Fuzzy Hash: 0641BD32608A86C0E7006F77D414AA8B720FB55F8AF844636EB9917798CF7CE005C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 111713529-517259162
                                            • Opcode ID: 4e4574fd784bfdf734f25b284c174d0d41fadfb325ff7ce69e49df849e7243d1
                                            • Instruction ID: 806319110cd4de06b76df75a9cdda983ca5f2276ad9cd2f8ecc07a08a91e6765
                                            • Opcode Fuzzy Hash: 4e4574fd784bfdf734f25b284c174d0d41fadfb325ff7ce69e49df849e7243d1
                                            • Instruction Fuzzy Hash: F831BE66E097C2C4FA00AB6794559F9B7A06F4678AFC8043DCE0E17756DE3CE0048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3805148269
                                            • Opcode ID: dddf6fcedf62ebd13ab9d4630b91c60f29e39eeeec8e2356d479b4a9fbe108a7
                                            • Instruction ID: 32097244bd327bd2aacfd33dff3045a50917cdedb6f798c19a192db30d302c67
                                            • Opcode Fuzzy Hash: dddf6fcedf62ebd13ab9d4630b91c60f29e39eeeec8e2356d479b4a9fbe108a7
                                            • Instruction Fuzzy Hash: 8671EC72A097C2C4EB50AB2695059F9B7A1BB06786FC4443ADA8E17B84DF3DE104C336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-599393795
                                            • Opcode ID: 6fa430d6cdd12601f7fc54e33da1bca16401ca5aae213aea72113c6be35d4e9e
                                            • Instruction ID: 0cb221dac2a0a24ebbdd2dc9e201d9af08d828a5f31387075f2baa14cf3ed011
                                            • Opcode Fuzzy Hash: 6fa430d6cdd12601f7fc54e33da1bca16401ca5aae213aea72113c6be35d4e9e
                                            • Instruction Fuzzy Hash: 3961B262A097C2C4EB10AB2795549F8F7A0AB06786FC4443DDA4E17B55DF3CE545C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                            • API String ID: 1294909896-1642401773
                                            • Opcode ID: 71836d0c5b4c893e36aec097646d4504248d8facce54a8b88e2725fb6a8f6396
                                            • Instruction ID: 3aa5c13c595de1204902b438d9adc5c5f341b157571476a8ead154401eb6eeca
                                            • Opcode Fuzzy Hash: 71836d0c5b4c893e36aec097646d4504248d8facce54a8b88e2725fb6a8f6396
                                            • Instruction Fuzzy Hash: B851BD62A09BC2C4EB10AB62D5419F9F7A1BB46B86FC80439DA4E1B755DF3CE104C336
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID:
                                            • API String ID: 1169197092-0
                                            • Opcode ID: 0dcf26cef58ed434e5489d037f5e3efd57c7930541e7d7f213b6419931548259
                                            • Instruction ID: 4fc207a3c8a8ef14ce5f5ffb9b1354cdb13ac1518d16082efa94e872ce64f090
                                            • Opcode Fuzzy Hash: 0dcf26cef58ed434e5489d037f5e3efd57c7930541e7d7f213b6419931548259
                                            • Instruction Fuzzy Hash: 02516F26A1AB80C2EB95DF56F040528B7B4FF48B85B48117AEF9D43B44EF38D8E18711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-3876350232
                                            • Opcode ID: 0cea19f0728d0b9a80d7c0eb0302881a578b6c5b734276fdf301f3f9d6a046a1
                                            • Instruction ID: aab82c356ff0df1f8df94f7394be628e16d2bf8722b3195e73b800c06ce13e45
                                            • Opcode Fuzzy Hash: 0cea19f0728d0b9a80d7c0eb0302881a578b6c5b734276fdf301f3f9d6a046a1
                                            • Instruction Fuzzy Hash: 5B51B565A097C1C4EB10AB6394419F9F7A1AB46B86FC8003DCA4E17756DF3CE544C376
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF76C32D854,?,?,?,?,?,?,00000000,00007FF76C32DCAD), ref: 00007FF76C32D760
                                            • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF76C32DCAD), ref: 00007FF76C32D7B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _errno_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2959964966-0
                                            • Opcode ID: 6c6b1d87d7b96f9c37bd5a0b2ad56376e2ab98a7df9225afbc54f3dbbf3f16b7
                                            • Instruction ID: 5360dd9159272aa36d28e0989ab1fa48a683525866561fbcc74948a900a1fdc0
                                            • Opcode Fuzzy Hash: 6c6b1d87d7b96f9c37bd5a0b2ad56376e2ab98a7df9225afbc54f3dbbf3f16b7
                                            • Instruction Fuzzy Hash: A3419A66A08642C5EF10AF2BE445A7DB3A1AF89B96F94403DDE4D0B791DF3CE440C662
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1934541353-2901970132
                                            • Opcode ID: 59689c72c398520cceb71ddbe514866db61d7b748caaaeca86e30acf2a38e0f6
                                            • Instruction ID: 0c89af9691c3d739ee04cb81c418227767e78fd111bfc9004741f3539d61495c
                                            • Opcode Fuzzy Hash: 59689c72c398520cceb71ddbe514866db61d7b748caaaeca86e30acf2a38e0f6
                                            • Instruction Fuzzy Hash: E541D165A087C2C4EB15BB6395119F8B7A1BF0A78AFC80539DD0E1BB95DE3CE1048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                            • API String ID: 2190258309-1780565354
                                            • Opcode ID: 30a322698a9d09478b754f702a82bd86244d7fb4837aa4ad5e8932c45f6b731e
                                            • Instruction ID: 7acca10425ada6e7919a2481b9effa0c59d720aee750604b53eaf9e7a802d7c5
                                            • Opcode Fuzzy Hash: 30a322698a9d09478b754f702a82bd86244d7fb4837aa4ad5e8932c45f6b731e
                                            • Instruction Fuzzy Hash: 37418161E0D7C2C1EB61BB26E450AF8BBA0BB45786FD04079CB8E03795DE3CE4558362
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 76e4ced6efe5993853b689da704464f040d55abe684b7370d22794f6957231d4
                                            • Instruction ID: 642cd2a402c59227d0572bb601aabd4a55ff2cfbaf2aa2f6c4d517e7f24054c4
                                            • Opcode Fuzzy Hash: 76e4ced6efe5993853b689da704464f040d55abe684b7370d22794f6957231d4
                                            • Instruction Fuzzy Hash: FE418F36908B42C2E761AF22D440678BBE4FB48B55F844539DA4E93314DF38E894C792
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8158889cb29fd38473596d94e225671dce0e76901f8fc4407870a4919f581520
                                            • Instruction ID: 4b3db65265de804f5f6c145e5437f742612f692e8a7a380c7d0ad54e59c73320
                                            • Opcode Fuzzy Hash: 8158889cb29fd38473596d94e225671dce0e76901f8fc4407870a4919f581520
                                            • Instruction Fuzzy Hash: 53314D36A09A41C2D750AF12E840569B7B0FB88FE5F484035DE4E47B58DF3CD88AC751
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 550e382d495c99fc32b2c98eafc5e0ca5608ca31e3ed4da35b8a7b9c0454bc5e
                                            • Instruction ID: 6fc0df5423ff6c0d78e591e1f33bd7eea4634e792def450dbcce225df82bd74b
                                            • Opcode Fuzzy Hash: 550e382d495c99fc32b2c98eafc5e0ca5608ca31e3ed4da35b8a7b9c0454bc5e
                                            • Instruction Fuzzy Hash: 4B21307AA09A41C2D750AF22E844469B7B4FF88FA5F440035DE8E43728DF3CD889CB51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fgetc
                                            • String ID:
                                            • API String ID: 2807381905-0
                                            • Opcode ID: b085a21d5389157d7061ce8cc78af9b0672339c5200693612f92dbb5c630c96a
                                            • Instruction ID: c87126f28384bd897ecde067e736ec7aea2d770c303c6244caa623808887bc43
                                            • Opcode Fuzzy Hash: b085a21d5389157d7061ce8cc78af9b0672339c5200693612f92dbb5c630c96a
                                            • Instruction Fuzzy Hash: 9E818932B14A41CDEB01DFA6D4806AC77B0FB48B69F84123ADA1E53B98DF38D494C361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcmpmemmove
                                            • String ID: signature
                                            • API String ID: 2239884541-2928148801
                                            • Opcode ID: 72458893b83f609d9a8682c1ae0190f1711e869a3893d19b75e7d545dcc2098d
                                            • Instruction ID: baa25deb92904e27394e6bc0f8450729a14eccb98d87e5c8de30b6bf9a18a750
                                            • Opcode Fuzzy Hash: 72458893b83f609d9a8682c1ae0190f1711e869a3893d19b75e7d545dcc2098d
                                            • Instruction Fuzzy Hash: F761E362F24A41C9FF10EBB6D9447AC7372AB057A9F800239DE2D26AD9DE3C9045C325
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemallocmemmove
                                            • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                            • API String ID: 2537350866-3891197721
                                            • Opcode ID: 19f4af89ea3a163fc73a4692305ffa0db9f14222e287f541bf38973cd1b63144
                                            • Instruction ID: 8172bd8482b36db77a6d7c66917af3edc811ffe0b010f749a24ceb2e8144d529
                                            • Opcode Fuzzy Hash: 19f4af89ea3a163fc73a4692305ffa0db9f14222e287f541bf38973cd1b63144
                                            • Instruction Fuzzy Hash: 7E71AD72B09B41CAEB10DBA6D440AAD77B1BB48BA9F804239DF2D477C4EE38E405C750
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF76C33488A,?,?,?,?,?,?,?,00007FF76C334657), ref: 00007FF76C350CA1
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF76C350E43
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF76C350E60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                            • API String ID: 2644425738-1191287149
                                            • Opcode ID: 3b573b260ddd7ca5a8817779604e515f03929ca240b76e371b5a1f31363573ab
                                            • Instruction ID: 09b71a645079cd070041dda8f005fda9c9c92d9fad719b82ce54ade491393e15
                                            • Opcode Fuzzy Hash: 3b573b260ddd7ca5a8817779604e515f03929ca240b76e371b5a1f31363573ab
                                            • Instruction Fuzzy Hash: E8513552B0D7C6C1EE21AB169640ABAFA90EF55B8DFD84139DB4D47344EE3EE441C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 1169197092-2292467869
                                            • Opcode ID: bab21091afe017e8973dd3309c6b02328d3587dad2db310ce13ef567e396e3a7
                                            • Instruction ID: c3a359e0b2651622ad37f2b6fefe0db3cecb0ceca6de0a3ee4e6769e612ad6cf
                                            • Opcode Fuzzy Hash: bab21091afe017e8973dd3309c6b02328d3587dad2db310ce13ef567e396e3a7
                                            • Instruction Fuzzy Hash: F261626190D7C2C5FBB1AB13D544B79B7A0EF05756F88813ACA8E47691DF2CE4468322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                            • API String ID: 573759493-910067264
                                            • Opcode ID: c7214adef2910220f718c2d4d9852b648ad839830488b95bca1a4c9ba923e21f
                                            • Instruction ID: 87d80553f51dfcfb3bf6724f70c99ff675f2b118bfad5fd5c9bf1a46485865b6
                                            • Opcode Fuzzy Hash: c7214adef2910220f718c2d4d9852b648ad839830488b95bca1a4c9ba923e21f
                                            • Instruction Fuzzy Hash: 0161F421E0C6D7C4EB11AF26960AA79FBA5EB07782FC44039C58D46A94CF3ED541C73A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freememmove$malloc
                                            • String ID: Failed to alloc scratch buffer!
                                            • API String ID: 531908557-1446904845
                                            • Opcode ID: d695b4d04139a3570055bfdf4ca63a6ecd44feb537e5054aa7e59ff4ebd879f7
                                            • Instruction ID: f723a80bea43c2df9eb936877107125f415749bd1af0766bb855a0d03962ca15
                                            • Opcode Fuzzy Hash: d695b4d04139a3570055bfdf4ca63a6ecd44feb537e5054aa7e59ff4ebd879f7
                                            • Instruction Fuzzy Hash: 7E51CFA2A087C0CAE621DF26E500AEABBA4FB09785F840139DF8D07751DF3CE165C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strstr
                                            • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                            • API String ID: 1392478783-2096918210
                                            • Opcode ID: 123b2d35c3ea4ac656270c1ed99f737452bda4ffd71de9e555080de5036ada98
                                            • Instruction ID: e57c23c3bc1c3d7669e6b33940ce0a8cf984227e6e9e567f802d0ead5b5f856b
                                            • Opcode Fuzzy Hash: 123b2d35c3ea4ac656270c1ed99f737452bda4ffd71de9e555080de5036ada98
                                            • Instruction Fuzzy Hash: 24510762A08786C2FA24B726B444AB8F690EF49369FC44239DF5D026D1DF7CD4868712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                            • API String ID: 2190258309-3231818857
                                            • Opcode ID: 9367be8770f101fd28b0e4e688c7a0aa615af9804f2b8475d161bcc8592d60f6
                                            • Instruction ID: 2bd08e221329463d87a639eb1c2bc73c1ad69fd2be0948790517108dfca8402a
                                            • Opcode Fuzzy Hash: 9367be8770f101fd28b0e4e688c7a0aa615af9804f2b8475d161bcc8592d60f6
                                            • Instruction Fuzzy Hash: 8F51E372A1C7C2C5EA119B22A459AF9F7A4FB46792FC4003ACA8D03B54CF3CD105C725
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastfreememmove
                                            • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                            • API String ID: 1540152464-2335292235
                                            • Opcode ID: 7bd36aaeb32bbb67d860a0046e63ca6d6d446e533c6632c40ca3cd37de852fe5
                                            • Instruction ID: 4921a5eecd67fc3a4b9580e3205c80243032fea933849d30196a2e9b226f15c2
                                            • Opcode Fuzzy Hash: 7bd36aaeb32bbb67d860a0046e63ca6d6d446e533c6632c40ca3cd37de852fe5
                                            • Instruction Fuzzy Hash: 4E510821B08683C5FB64BA17A500BB9B790AF4978AFC85139DF4D872D5EF2CE545C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                            • API String ID: 1294909896-1255959952
                                            • Opcode ID: 4dc1b605df474de0ff6f147fd77f147bfe006571b0e01af67f719ab21d3ae2b7
                                            • Instruction ID: 8a5af23854d71845a5a612f3f4ae2d6043a289ba3fd2ced02a1b25814516c847
                                            • Opcode Fuzzy Hash: 4dc1b605df474de0ff6f147fd77f147bfe006571b0e01af67f719ab21d3ae2b7
                                            • Instruction Fuzzy Hash: C151BD22A0C742D2FB11EF23D480ABCBB90EB40B96F860039DA4D57681DF39E455C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _time64
                                            • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                            • API String ID: 1670930206-870032562
                                            • Opcode ID: e2a123b1e21a331dc6722c7a1f716035e36cfdaf94d9580f5ff64b73ca5f2fca
                                            • Instruction ID: 0d14557ae78b0988e31fa3e4e6264fb4ae697e2755e6b593ec1d02f57c4890a9
                                            • Opcode Fuzzy Hash: e2a123b1e21a331dc6722c7a1f716035e36cfdaf94d9580f5ff64b73ca5f2fca
                                            • Instruction Fuzzy Hash: 05411872B14615C6DB20DF2BE000968B7B0FB98F88F915035EE0C8B785DE39E541CB41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fseek
                                            • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                            • API String ID: 623662203-959247533
                                            • Opcode ID: b9165f8a2ea9ace5ef2b69f4e2bb295e2a4c0164fe58ca27e075647b17577575
                                            • Instruction ID: ac9289defa58b3b9815307e937664c80142806db9830c69ee7e0781a55e4ca02
                                            • Opcode Fuzzy Hash: b9165f8a2ea9ace5ef2b69f4e2bb295e2a4c0164fe58ca27e075647b17577575
                                            • Instruction Fuzzy Hash: F541C472F14682C1EB54AB2BD840BB87391EF88B85F885039DD0E4F39ADE3DD4848761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3155708153
                                            • Opcode ID: c4ebdc808cf4486b95878a08a45e668fffcafed25245ce7b2ce85abbd950441c
                                            • Instruction ID: cbc2d1dac1d57fbb06c4f50be81e2174207aa17651d77fef45453120598520bb
                                            • Opcode Fuzzy Hash: c4ebdc808cf4486b95878a08a45e668fffcafed25245ce7b2ce85abbd950441c
                                            • Instruction Fuzzy Hash: A841B162A097C2C4EF11AB6795519F8B7A1AF0A78AFC44439DE4E1B746DE3CE0048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                            • API String ID: 2190258309-3662781045
                                            • Opcode ID: 43a396351ca0d7fdc4e3b95c2e661a6cd862c9d7fd046da0c36266a74565a95a
                                            • Instruction ID: 3bd151d726e32727031c38433914a6b55815a1f921e78cfae2ab14240a533e8f
                                            • Opcode Fuzzy Hash: 43a396351ca0d7fdc4e3b95c2e661a6cd862c9d7fd046da0c36266a74565a95a
                                            • Instruction Fuzzy Hash: B441C662A08BC6C1EB10AF26E5415E9F3A0FB45B86FC4003ADA8E17B55DF3CD545C725
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-659367561
                                            • Opcode ID: f18a14ee928358fa0cb2869a8fadee714043e3fbdd4f12c2765b12ca5e103c30
                                            • Instruction ID: ece1cb72c62b15c0a4a41f7fcb098993741506b33be9cd2236e1c51a27d4d7f5
                                            • Opcode Fuzzy Hash: f18a14ee928358fa0cb2869a8fadee714043e3fbdd4f12c2765b12ca5e103c30
                                            • Instruction Fuzzy Hash: 6F41C266A097C2C4FE10AB6794559F8B7A1AF0A786FC8443DDE0E17786DE3DE0048376
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1934541353-517259162
                                            • Opcode ID: 7af7ca7af1a94e10101c55b0918b96677e46a0c651d45d35524257b5d56ba445
                                            • Instruction ID: a11c210daf912e66cbd68cf2f6311a030e3326ce80f7fd6d6e887ffdc8a5f538
                                            • Opcode Fuzzy Hash: 7af7ca7af1a94e10101c55b0918b96677e46a0c651d45d35524257b5d56ba445
                                            • Instruction Fuzzy Hash: 8141BE65A097C2C4EA04AB279945AF9B7A1AF06789FC8443DCD0E17B55DE3CE4048322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$freemallocmemmove
                                            • String ID: TRUE
                                            • API String ID: 3395529846-3412697401
                                            • Opcode ID: 89bb67e2fa85eab9a323bf84b29d2c736cc5bdde2a7b84e55d5725973ec3671d
                                            • Instruction ID: 30c140d1ae75015056591be40ac331b997ece4f9929b2cc9967642e35d826310
                                            • Opcode Fuzzy Hash: 89bb67e2fa85eab9a323bf84b29d2c736cc5bdde2a7b84e55d5725973ec3671d
                                            • Instruction Fuzzy Hash: D4314B11E0D683C4FB11EF27465A778FB91AF17B92F840639C94D06AD0CE2E9541C33A
                                            APIs
                                              • Part of subcall function 00007FF76C3552D0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C33A419,?,?,?,?,00007FF76C3397BB), ref: 00007FF76C3552F8
                                              • Part of subcall function 00007FF76C3552D0: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF76C33A419,?,?,?,?,00007FF76C3397BB), ref: 00007FF76C35531E
                                              • Part of subcall function 00007FF76C3552D0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C33A419,?,?,?,?,00007FF76C3397BB), ref: 00007FF76C35533F
                                              • Part of subcall function 00007FF76C3552D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C33A419,?,?,?,?,00007FF76C3397BB), ref: 00007FF76C355350
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C36971F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C369768
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C369771
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$realloc$EnvironmentVariable
                                            • String ID: %s%s.netrc$%s%s_netrc$HOME
                                            • API String ID: 4174189579-3384076093
                                            • Opcode ID: 821c03bee568abfad257e0ebcc113629796dd71169c6ce4d644d803328a4df23
                                            • Instruction ID: 068f3a7a548f6fb3ede3034836538e31516c74e1551dfd4da4c346f5e1a893ff
                                            • Opcode Fuzzy Hash: 821c03bee568abfad257e0ebcc113629796dd71169c6ce4d644d803328a4df23
                                            • Instruction Fuzzy Hash: B931A425A0DB42C1EA10EF13B8009AAF2A0BF89BD1F844439ED4D57B65EF3CE445C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: __stdio_common_vsscanf_strdupfree
                                            • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                            • API String ID: 860312144-3309259123
                                            • Opcode ID: a2d323184a620d5ac99e5a66bead614ab2b44fe312228ca63b6c42eb8a7baccb
                                            • Instruction ID: 4e36b4f3185d686714a4d7b2b426dbdc33ba83147c87dd65696bd0e684148938
                                            • Opcode Fuzzy Hash: a2d323184a620d5ac99e5a66bead614ab2b44fe312228ca63b6c42eb8a7baccb
                                            • Instruction Fuzzy Hash: 8431C422E1D683C1EA64BB22D4509BDB7A4BF46792FC0803ACB0E47351DF2CE8418363
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1941130848-1663925961
                                            • Opcode ID: 2bc44f96e5429c55cc5d8378b140c09216dd3961b4df2d5ef5365f046f7f721c
                                            • Instruction ID: 56f8faef2084e24b2f2aa6d53299412b9d52c50c8d4d4a07bf9dab65695e3818
                                            • Opcode Fuzzy Hash: 2bc44f96e5429c55cc5d8378b140c09216dd3961b4df2d5ef5365f046f7f721c
                                            • Instruction Fuzzy Hash: 4D219566A09B82C1EA50AB17E454AF9B3A0FF85786F840039DE4E07B15EF3CD045C761
                                            APIs
                                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF76C33C91C), ref: 00007FF76C33F5D5
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF76C33C91C), ref: 00007FF76C33F601
                                            • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF76C33C91C), ref: 00007FF76C33F609
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF76C33C91C), ref: 00007FF76C33F62B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF76C33C91C), ref: 00007FF76C33F642
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_errnostrerrorstrtoul
                                            • String ID: Invalid zoneid: %s; %s
                                            • API String ID: 439826447-2159854051
                                            • Opcode ID: a2ab55075de5d604c2124ce5bfb01723dda2de752500e89b77a4d47c41a9f329
                                            • Instruction ID: 7f9ee274b1684a2c3362b00a7e1898a6b6d7b714d0a1b00a9995bc309e22c702
                                            • Opcode Fuzzy Hash: a2ab55075de5d604c2124ce5bfb01723dda2de752500e89b77a4d47c41a9f329
                                            • Instruction Fuzzy Hash: 57118671A0D682C2EB40BB23D484979B370EF8AB5AFD41079CA1D47764DF2DD885CB25
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C338FC1
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C338FD1
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C338FDF
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C338FED
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C338FFB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C339009
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C339017
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C33C7B6,?,?,?,00007FF76C33B4CC), ref: 00007FF76C339025
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 1b01f0ddf9ed4b32c5f6c452b99db915678b5605d610269cae537ccdd869ba64
                                            • Instruction ID: 3912a6395c31080f13bdab9f5c368cc59bbbcc85de467325bbf40997034de1c9
                                            • Opcode Fuzzy Hash: 1b01f0ddf9ed4b32c5f6c452b99db915678b5605d610269cae537ccdd869ba64
                                            • Instruction Fuzzy Hash: E601B37A909B01C2D740AF22E5C547CB7B4FB8CFAA7501169CE4E82718DF38C8A9C691
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 260d9d5bd8500dc735d4b1faf18f31f3a708321caf4e88f6ee8a4cb233e49b2c
                                            • Instruction ID: 5e5c29119a299cb7c6a0290c43897b51fbec6058778c9cb88f3269babb8a22ca
                                            • Opcode Fuzzy Hash: 260d9d5bd8500dc735d4b1faf18f31f3a708321caf4e88f6ee8a4cb233e49b2c
                                            • Instruction Fuzzy Hash: 0DF0E4AAA19901C2D754AF22E8964687770EF8CF66B541075CD0F86324DE28DC9DC691
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                            • String ID:
                                            • API String ID: 15630516-0
                                            • Opcode ID: 7de62e8389a854ce84078b892ad35dea7722f3f670a58b18e7fe7dcb174bbfc9
                                            • Instruction ID: a604a74d5daaa296c4909d686c5a5211c97909ba028fb431c66c0068ad94582b
                                            • Opcode Fuzzy Hash: 7de62e8389a854ce84078b892ad35dea7722f3f670a58b18e7fe7dcb174bbfc9
                                            • Instruction Fuzzy Hash: E0C1DC22B18B85C9EB00EB76E005BAC7361EB457A9F804639CE6C17BD9DF3CA149C351
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF76C33C8FB), ref: 00007FF76C33C097
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF76C33C8FB), ref: 00007FF76C33C0C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID:
                                            • API String ID: 2635317215-0
                                            • Opcode ID: 717f05cdf9e9d4c4f0213cddd8f43669994a6f7344e1dade5958438c6ba25a5c
                                            • Instruction ID: 52430985bb0b4226267aa00c86b0e4c9cc696008fecf1c574107b401552014f4
                                            • Opcode Fuzzy Hash: 717f05cdf9e9d4c4f0213cddd8f43669994a6f7344e1dade5958438c6ba25a5c
                                            • Instruction Fuzzy Hash: 7591BC22609BC1CAD7459F35D4403E977A0FB55B29F480339CBAC4B386DF29A1A4C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$memmove
                                            • String ID: 1.1
                                            • API String ID: 1534225298-2150719395
                                            • Opcode ID: 959f939ed03b0bf3ca2435c93e8abd47972af75f8d378dfeeca0ce4ecd85709e
                                            • Instruction ID: 5f7dfb0d19df808dc89e1fd15ad0e57467c4e2f1190d3a19af2ff3d5b7a37cfc
                                            • Opcode Fuzzy Hash: 959f939ed03b0bf3ca2435c93e8abd47972af75f8d378dfeeca0ce4ecd85709e
                                            • Instruction Fuzzy Hash: 51515172609B85C6DA64AF22E9407A9B3A0FB48B85F848039DF9E4B754DF3CE458C351
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove
                                            • String ID:
                                            • API String ID: 2162964266-0
                                            • Opcode ID: 3ab395ba763f8578196c79e80dade60c8ed1f1b9827b41d12def1c7f130fb81a
                                            • Instruction ID: e2b02d1d657c96479339a1f4d8224ab38eed61a5feecc2990b1ac8ed95e00be9
                                            • Opcode Fuzzy Hash: 3ab395ba763f8578196c79e80dade60c8ed1f1b9827b41d12def1c7f130fb81a
                                            • Instruction Fuzzy Hash: 6751C13260CA41C2EB24AF26D544A3CB771FB4AB99F904139DA5D07798CF3CD991C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: Start Date: %s$Start Date
                                            • API String ID: 1934541353-2389359183
                                            • Opcode ID: 7ebb995824df8fea988f07f8694780a2802e1c5847b1986652ee6504fe404bf1
                                            • Instruction ID: fea7233034cdf9fdd6776a826ef0f1ead10fa1856acddf5353a4ff6c36d1b39b
                                            • Opcode Fuzzy Hash: 7ebb995824df8fea988f07f8694780a2802e1c5847b1986652ee6504fe404bf1
                                            • Instruction Fuzzy Hash: 46414B65A092C285FF196A178126AB8BB91EB067D2F88423DC65F07BD1DD2DE0458336
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ConditionMask$InfoVerifyVersion
                                            • String ID:
                                            • API String ID: 2793162063-0
                                            • Opcode ID: 22175fd1defc111390bc6bdaf9514f45174fca0fac8b88ff1ba54a625aad6c09
                                            • Instruction ID: 4e9f6637206b709038bbad32d545872ca945aad84c2103a5c3ac2fd23af62822
                                            • Opcode Fuzzy Hash: 22175fd1defc111390bc6bdaf9514f45174fca0fac8b88ff1ba54a625aad6c09
                                            • Instruction Fuzzy Hash: 3D41D932E1C681C6F2309B12A918BBAF7A0FBD5305F419239E9C947A55DE3DE4848B61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-2901970132
                                            • Opcode ID: 7959a5aadf351fc599b60655f7abd453df872177e391c1db5b59f9cf3e1debd1
                                            • Instruction ID: cc3a182c8676e8c11c6f6857f0cde1c56c0d1554c6ccc6e24f847937607dce40
                                            • Opcode Fuzzy Hash: 7959a5aadf351fc599b60655f7abd453df872177e391c1db5b59f9cf3e1debd1
                                            • Instruction Fuzzy Hash: 3B41D276A087C2C4EB10AB6395419F8B761BB0A789F880539DE0E1B785DE38E104C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-517259162
                                            • Opcode ID: 4a41f6acd76e062062b561a667d8840f26a051c7ca6ae1ed28f070a8d075619d
                                            • Instruction ID: 9fcfff1a0ed02ffc8fa5a98ac78448b66969197f4e41ada2b3ed26f67a37671e
                                            • Opcode Fuzzy Hash: 4a41f6acd76e062062b561a667d8840f26a051c7ca6ae1ed28f070a8d075619d
                                            • Instruction Fuzzy Hash: 1841B266A087C2C4EB05AB6399459F8B7A1BF0A7C9F880439DE0E17B45DF3CE1448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$freemalloc
                                            • String ID: PLAIN
                                            • API String ID: 1763039611-4000620671
                                            • Opcode ID: 6dc8157ccad2dc8929c256cd425644d8ce6e3def0de36ef4f5d686c67f1d4dfb
                                            • Instruction ID: 0e9831c1e8c0d9a405b218c17c526315a84791d431a683bd8c52115568cb350f
                                            • Opcode Fuzzy Hash: 6dc8157ccad2dc8929c256cd425644d8ce6e3def0de36ef4f5d686c67f1d4dfb
                                            • Instruction Fuzzy Hash: 0A310566A08B85C2EB109F13E0516AAB7A0FB46BE4F848235DE9D477D5DE3CD009C325
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: callocfreememmovestrchr
                                            • String ID: CAPA$Got unexpected pop3-server response
                                            • API String ID: 1098749377-1591402739
                                            • Opcode ID: 33b148d5745447b0d8d78de658e8a5e2b359c6d3444230c2b1fb9f1e81348ab8
                                            • Instruction ID: a323efccbc525d12a48578fbb4556ef8d64a50b0e7e6d2f84e53f50ab2698287
                                            • Opcode Fuzzy Hash: 33b148d5745447b0d8d78de658e8a5e2b359c6d3444230c2b1fb9f1e81348ab8
                                            • Instruction Fuzzy Hash: 7631E5A1B29382C2EA55AB16D541AB9BAD0BF05356FC0053ECB1E03391DF3CE465C323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: d0ce76544df53b1345fc274c3eed98608ca80b74762089145830b65eb514314d
                                            • Instruction ID: eae78232d5ac4c94ad9df437118def27730f3d494c540d5bb9a7ff60662c6aeb
                                            • Opcode Fuzzy Hash: d0ce76544df53b1345fc274c3eed98608ca80b74762089145830b65eb514314d
                                            • Instruction Fuzzy Hash: 7D31BF66A087C2C4EB10AB6395519F9B7A1BF0A78AFC40439DE4E1B745DE3CE1048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$%s%lx$Signature
                                            • API String ID: 2190258309-1406629954
                                            • Opcode ID: efb2fd936c664b1e5a89b42bb94741dd3d2f1ea6d767a3669055881584c0214a
                                            • Instruction ID: 6569bc0d17d9281513b4018db77826d727be6953d93ab2890574c35948ff26ba
                                            • Opcode Fuzzy Hash: efb2fd936c664b1e5a89b42bb94741dd3d2f1ea6d767a3669055881584c0214a
                                            • Instruction Fuzzy Hash: 8F310772B09782C5EA10AB27D444ABDB7A0EF4AB86F840039CE4E07B51EF2DD004C725
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: a75a58af8390352268c59e444a5725fb53b56978b17e4639fc9a44337c5125cf
                                            • Instruction ID: 3ec3a8ca8557c5ece2a573d83ed1f3c83e89e0fe74a4fcd9f1995cdd5f731ba6
                                            • Opcode Fuzzy Hash: a75a58af8390352268c59e444a5725fb53b56978b17e4639fc9a44337c5125cf
                                            • Instruction Fuzzy Hash: C931BF62A087C2C4EB10AB6395519F9B7A1BF0A78AFC40439DE4E1B745DE3CE1048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-517259162
                                            • Opcode ID: 96b8b39280216bc7e49da5c2682eb81cc3755c75f24c05926fa60aad9c968743
                                            • Instruction ID: d1dec4db597e80fae1b37a9f17214b5b579aff2ecbbbee8264a88c79417d2435
                                            • Opcode Fuzzy Hash: 96b8b39280216bc7e49da5c2682eb81cc3755c75f24c05926fa60aad9c968743
                                            • Instruction Fuzzy Hash: EE319F66E09782C4FA04AB6794519F9B7A0AF0678AFC8043DDE0E17746DE3CE0448376
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupcallocfree
                                            • String ID:
                                            • API String ID: 1236595397-0
                                            • Opcode ID: 1ff196ba7fdc5d3c429b43f3d41e087cb2f43d765aa006f9fd55f687526fc464
                                            • Instruction ID: 1978a229662ea564162168a9636748f4a706a34bcb97e2deede06ddd6d8f8135
                                            • Opcode Fuzzy Hash: 1ff196ba7fdc5d3c429b43f3d41e087cb2f43d765aa006f9fd55f687526fc464
                                            • Instruction Fuzzy Hash: A431F632A09B85C2EB40DB27E4507B9B7B0EB85B86F980034CE4D47794EF3DD4958761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3061335427-517259162
                                            • Opcode ID: cfdbe63e3a201a0ae6543db2c7649534b537b244e5a3e55b57553da5eb835166
                                            • Instruction ID: 24a9ca6cb4e4d02d5d6288e1f5d82fb057087cf71870751323d02212d0e49748
                                            • Opcode Fuzzy Hash: cfdbe63e3a201a0ae6543db2c7649534b537b244e5a3e55b57553da5eb835166
                                            • Instruction Fuzzy Hash: 22319E66A097C2C4FA00AB6794519F9B7A0AF4678AFC8143DDE0E1B756DE3CE0048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3061335427-517259162
                                            • Opcode ID: 2f88f6ac6fb0dbbbd7ef05d3e395aa095ae106e73e0270b92a9c70a296006898
                                            • Instruction ID: 44507551bd506ff1e4e54c32b04f989aa46e1ee2a486604a779182208b59dad1
                                            • Opcode Fuzzy Hash: 2f88f6ac6fb0dbbbd7ef05d3e395aa095ae106e73e0270b92a9c70a296006898
                                            • Instruction Fuzzy Hash: 5F31AF66E097C2C4FA00AB6794519F9B7A0AF4678AFC8043DDE0E17756DE3CE0048336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: OS/400$SITE NAMEFMT 1
                                            • API String ID: 3061335427-2049154998
                                            • Opcode ID: 44b493ea91cc46c49121282076d4c0f03c30a5d4938f419ccf81dddd750b3199
                                            • Instruction ID: 7f7fe02699d78f44a1aa9bc4c057d6e6b4e608ffb0155f90f5de19f1cd6edee9
                                            • Opcode Fuzzy Hash: 44b493ea91cc46c49121282076d4c0f03c30a5d4938f419ccf81dddd750b3199
                                            • Instruction Fuzzy Hash: 3E31B621A0D7C2C5F7B1AB169450BB8BBA0AF49755FC04039CB4E57785DE3CE446C762
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                            • String ID:
                                            • API String ID: 469868127-0
                                            • Opcode ID: 103ec17979e39e692f6a3f8bfb2c87fc702194c30aec75c122ade078270b38de
                                            • Instruction ID: ff9c813e5b0fc6895bb26f9c1ed24726c60ea24e1d5c7f6f49b7539e4fc9add0
                                            • Opcode Fuzzy Hash: 103ec17979e39e692f6a3f8bfb2c87fc702194c30aec75c122ade078270b38de
                                            • Instruction Fuzzy Hash: 22215E36608A81C6E710AF13E184669B370FB89B92F844139DF8E47B50DF3EE4A5C761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupstrchr
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 3727083984-2292467869
                                            • Opcode ID: 135187ddad837442bc8959368bbf545a73b984fe343396fc0b74932c26ffbea7
                                            • Instruction ID: 165454ea6675bf3e06fa1afba8d770cc64041bf2da312bfbfc7a55e8601ba703
                                            • Opcode Fuzzy Hash: 135187ddad837442bc8959368bbf545a73b984fe343396fc0b74932c26ffbea7
                                            • Instruction Fuzzy Hash: 9361736190D7C2C5FBB1AB13D544B79B7A0EF04756FC8813ADA8E47691DF2CE4468322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$freemalloc
                                            • String ID:
                                            • API String ID: 1763039611-0
                                            • Opcode ID: cbe8d038c8a23e681688dc7d5298c8700c4b898a2117aa2d41c7926bc355fe7e
                                            • Instruction ID: aeb5ef17cbfb541b9006d1d501dea0ad79c1e2c9ec6d432001cc9122f9155484
                                            • Opcode Fuzzy Hash: cbe8d038c8a23e681688dc7d5298c8700c4b898a2117aa2d41c7926bc355fe7e
                                            • Instruction Fuzzy Hash: C7611212D18BC586E7119F35D9016FDA320FBA9788F81A325EE8D16A57EF68E2D4C310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                            • API String ID: 1865132094-1204028548
                                            • Opcode ID: bcec1632d8ce36f2d7a0de9d4853c655a121aa47ca6f190dad5e23601d973a36
                                            • Instruction ID: 1fc231cb8c410f484a1ccdf56512811b8a554934a88be662af25cf3b9d541da1
                                            • Opcode Fuzzy Hash: bcec1632d8ce36f2d7a0de9d4853c655a121aa47ca6f190dad5e23601d973a36
                                            • Instruction Fuzzy Hash: 1D51CB31A0CE82C1FB64AB268940BBDB791EF4574EF884039DE4D4E695CF2DE4548732
                                            APIs
                                            • memmove.VCRUNTIME140(?,?, && timeout /t 5",?,000000F8,?,-00000001,00007FF76C322585), ref: 00007FF76C318A87
                                            • memmove.VCRUNTIME140(?,?, && timeout /t 5",?,000000F8,?,-00000001,00007FF76C322585), ref: 00007FF76C318A9A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?, && timeout /t 5",?,000000F8,?,-00000001,00007FF76C322585), ref: 00007FF76C318B05
                                              • Part of subcall function 00007FF76C3784F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3157CA,?,?,?,?,?,?,?,00007FF76C31118E), ref: 00007FF76C37850A
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF76C318B12
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID: && timeout /t 5"
                                            • API String ID: 2075926362-934313417
                                            • Opcode ID: 43a413b19f113c986ae00824d90ef142ef84dc5726d1f0351a2c5912f8b815ed
                                            • Instruction ID: 970e1710a97af7feb9a404f370010b2ac02508d178368beb5e9f7f2c0f6f3b77
                                            • Opcode Fuzzy Hash: 43a413b19f113c986ae00824d90ef142ef84dc5726d1f0351a2c5912f8b815ed
                                            • Instruction Fuzzy Hash: FD41CC62609B85C9DA25EF22E40457AB3A0FB48BD5F94863ADEAD03B85CF3CD140C216
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C327EEA
                                            • strtoull.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF76C327F10
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C327F19
                                              • Part of subcall function 00007FF76C318980: memmove.VCRUNTIME140(?,?, && timeout /t 5",?,000000F8,?,-00000001,00007FF76C322585), ref: 00007FF76C318A9A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _errno$memmovestrtoull
                                            • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                            • API String ID: 3546919614-808606891
                                            • Opcode ID: a1d58a205df8ea0fc39009f3d58b5456453d4418ac12cb8100ef427df41276df
                                            • Instruction ID: 3e9860d12aa8440e11e5d1552e8d2babdbf16a1a0383c2d08c7f3cb977e466ef
                                            • Opcode Fuzzy Hash: a1d58a205df8ea0fc39009f3d58b5456453d4418ac12cb8100ef427df41276df
                                            • Instruction Fuzzy Hash: 9851B122908641C6EB28AF26E440A3CB3A0FB46B59F940639DA5D073D8DF3CE841C772
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 573759493-632690687
                                            • Opcode ID: 41cf194390283f80654d9e811d9f585b02866320e4f76d58a215eaa146bf9e74
                                            • Instruction ID: 64f3b993fa83744cb731332963a3823736a87f6f55a73cc13013341d19842bab
                                            • Opcode Fuzzy Hash: 41cf194390283f80654d9e811d9f585b02866320e4f76d58a215eaa146bf9e74
                                            • Instruction Fuzzy Hash: 1341F921D0DAC6C5FB11DF26964AA78FBA1EB02B42FC44139C68E12685CF3DD541C33A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID: start cmd /C "color b && title Error && echo
                                            • API String ID: 2075926362-15786077
                                            • Opcode ID: b7b3d8668d7c040fba411c8e603331d884d89abbffa77f14f0d7d40d3fa98e19
                                            • Instruction ID: e80da07ec58e6c1df5f443ba0a5f53fb19c11076eb7c7389ae60d3d634f8f478
                                            • Opcode Fuzzy Hash: b7b3d8668d7c040fba411c8e603331d884d89abbffa77f14f0d7d40d3fa98e19
                                            • Instruction Fuzzy Hash: 1531F722B05686C8FE16EB179504678B2419B06FF5F980639DE2D07BD5DE7CE082C326
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID: && timeout /t 5"
                                            • API String ID: 2016347663-934313417
                                            • Opcode ID: 7e6a421d6232408313209df97fc7d0e832a6f2192df059c584efc99da77120af
                                            • Instruction ID: 71a91ccc2dbb99fd7165dfc4407d924ec2ee051ec62016f98ba35e6d4641cb72
                                            • Opcode Fuzzy Hash: 7e6a421d6232408313209df97fc7d0e832a6f2192df059c584efc99da77120af
                                            • Instruction Fuzzy Hash: 52310321709781CCEE15AF1799046A8B351AB09BE1F880739DF6D07BD5CE3CE091C326
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_close_openmalloc
                                            • String ID: Couldn't open file %s
                                            • API String ID: 3412525164-447283422
                                            • Opcode ID: 16067cbcc0111e809fd86af3b503726b5bab42d1a3ac7f3519d7580c131806f0
                                            • Instruction ID: fe19a1db13efdb59d02cb6dc345396390c35e4fc7ea436fc4b7097a196b56f75
                                            • Opcode Fuzzy Hash: 16067cbcc0111e809fd86af3b503726b5bab42d1a3ac7f3519d7580c131806f0
                                            • Instruction Fuzzy Hash: BF41C222A08A81C1EB149F26E40067AFBA1FB49B99F844139DB9D47785DF3CE4418712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnofreememmoverecv
                                            • String ID: Recv failure: %s
                                            • API String ID: 209274916-4276829032
                                            • Opcode ID: a78407a8b934f3a00432b862932e7ce1a91fbacb64c95f620fbab4905c9d13c5
                                            • Instruction ID: 3c7e6846e4161e9e378b0ca63aa032e678cea0bf169f6a3e0fd4dabadabfeb45
                                            • Opcode Fuzzy Hash: a78407a8b934f3a00432b862932e7ce1a91fbacb64c95f620fbab4905c9d13c5
                                            • Instruction Fuzzy Hash: 3631BD72A05B81C1EB11AF12E885AAAB3A0BB58BDAF804139DE1D07388DE3CD565C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                            • API String ID: 3985033223-1703240927
                                            • Opcode ID: 43b105938bbe1afea60731f8c3265c8eeec9abcad497d3cf9d11d24f4fe7bae9
                                            • Instruction ID: 08a295f46fbf9894f2e32a9eb439e2282c53b31a9025a15bc6049ac172faf915
                                            • Opcode Fuzzy Hash: 43b105938bbe1afea60731f8c3265c8eeec9abcad497d3cf9d11d24f4fe7bae9
                                            • Instruction Fuzzy Hash: 8641E231A0AA82C1EB41AB02DA44778F7A0AF44BD5FC58239CE1D9B7D4DF2DE4468321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                            • API String ID: 1865132094-195851662
                                            • Opcode ID: 129133361ddcbb05e5fd9370c9f06ba04fbccc03db41721f9e5084d6b1078048
                                            • Instruction ID: f6dd2c6f6bbc8769bd7653e3242adfc5e0f45aa66f61fa73fb50a1cea8fe6d30
                                            • Opcode Fuzzy Hash: 129133361ddcbb05e5fd9370c9f06ba04fbccc03db41721f9e5084d6b1078048
                                            • Instruction Fuzzy Hash: E741B332F18A82C1EB55EB26E4447A9B7A0EB84B89F888035DB4D4B795CF3CD494C712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$_strdupfree
                                            • String ID: FALSE
                                            • API String ID: 3359907120-3701058176
                                            • Opcode ID: 7764bb6831e2eaa97326a71e8e30827daf489382d19c39de26f14aff11951569
                                            • Instruction ID: 0fd680c63ad6e5d5c4521c432cbc39e1382325bf5df1e781bf264d79b089255e
                                            • Opcode Fuzzy Hash: 7764bb6831e2eaa97326a71e8e30827daf489382d19c39de26f14aff11951569
                                            • Instruction Fuzzy Hash: 56314C22E0D597C5FB12EF27961AB38FB909B03766FC40679C99A055C0CE2DD581C33A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %s: %s$FALSE$TRUE
                                            • API String ID: 1865132094-3430445539
                                            • Opcode ID: a6d7f1661c1feeff80e5064c4ce2b60c652a1103aa2eff225b398e4cdcefcb12
                                            • Instruction ID: b17a27f44620462d48aa012ecd341edf3e520163dcf146d9545ba74d652bbdaf
                                            • Opcode Fuzzy Hash: a6d7f1661c1feeff80e5064c4ce2b60c652a1103aa2eff225b398e4cdcefcb12
                                            • Instruction Fuzzy Hash: FB0184A6A0C782C1EA61AB57E945BF5B390BB46B82FC44039CE4E03351DF2CD185C336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 1294909896-3343404259
                                            • Opcode ID: e1f46f550dfdcdcdb2de335d8caeb3610cd3dadedfb56dba1dd394773ee2ca03
                                            • Instruction ID: 8c1ea544133deaaaaaccb52c7c8286e74c5fdaba96e7c9ccc90b8cfe0aa18229
                                            • Opcode Fuzzy Hash: e1f46f550dfdcdcdb2de335d8caeb3610cd3dadedfb56dba1dd394773ee2ca03
                                            • Instruction Fuzzy Hash: 60D1C531A08686C5FB64AF27D544BF9B361EF44B8AF844139CE0D4B69ADF3DD44483A2
                                            APIs
                                              • Part of subcall function 00007FF76C36D4E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369F75,?,?,?,00007FF76C33B3FA), ref: 00007FF76C36D506
                                              • Part of subcall function 00007FF76C36D4E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369F75,?,?,?,00007FF76C33B3FA), ref: 00007FF76C36D527
                                              • Part of subcall function 00007FF76C36D4E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369F75,?,?,?,00007FF76C33B3FA), ref: 00007FF76C36D542
                                              • Part of subcall function 00007FF76C36D4E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369F75,?,?,?,00007FF76C33B3FA), ref: 00007FF76C36D550
                                              • Part of subcall function 00007FF76C36D4E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369F75,?,?,?,00007FF76C33B3FA), ref: 00007FF76C36D562
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C36D606
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: HTTP$NTLM
                                            • API String ID: 2190258309-4188377180
                                            • Opcode ID: 130ac42098961743247599a56bb6e9502eb2ce61e4b1216574272b91c42ea7da
                                            • Instruction ID: ceff294318a82f43b5d9cc9465e81d7d3bcc1830e2e949acf5296a5ffc49b373
                                            • Opcode Fuzzy Hash: 130ac42098961743247599a56bb6e9502eb2ce61e4b1216574272b91c42ea7da
                                            • Instruction Fuzzy Hash: 24616C36609B81C2EB609F17E440A6AB3A4FB88B85F944039DE8D43B58EF3CD454CB52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                            • API String ID: 1294909896-1891748601
                                            • Opcode ID: 31461b1feb7cbf637afcf20a2aaa98fffb8e89ade3f5c141d23370641694dd4e
                                            • Instruction ID: aeb6f7799a4d250ca6dcdc17752d8f2362722c7a17da6fb9f552deaa462dd6e8
                                            • Opcode Fuzzy Hash: 31461b1feb7cbf637afcf20a2aaa98fffb8e89ade3f5c141d23370641694dd4e
                                            • Instruction Fuzzy Hash: 1D519262A0C6C2C6E664B7369450BB9FA50EF41366FC00239DB6E0B6C2DF7CE4459372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID: TRUE
                                            • API String ID: 1934541353-3412697401
                                            • Opcode ID: fbe6dabc12e5a791c19b722c8e6ae0017cda973ba5d9082353760d4feb85bc08
                                            • Instruction ID: c4fa7353a6eebe31d946823b6054c08f4c5e7f2c149b08c4e43f922951e43451
                                            • Opcode Fuzzy Hash: fbe6dabc12e5a791c19b722c8e6ae0017cda973ba5d9082353760d4feb85bc08
                                            • Instruction Fuzzy Hash: A041AB61F09A92C5FB499A1785197B4BB92EB027F1F844639CA6F433C1DD2DD086C336
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF76C3767F0), ref: 00007FF76C37689F
                                              • Part of subcall function 00007FF76C350C90: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF76C33488A,?,?,?,?,?,?,?,00007FF76C334657), ref: 00007FF76C350CA1
                                              • Part of subcall function 00007FF76C350C90: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF76C350E43
                                              • Part of subcall function 00007FF76C350C90: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF76C350E60
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF76C3767F0), ref: 00007FF76C37690E
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF76C3767F0), ref: 00007FF76C376928
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF76C3767F0), ref: 00007FF76C37695E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: xn--
                                            • API String ID: 2644425738-2826155999
                                            • Opcode ID: ab96790c3fc4ca84c96659126e3f5302aa64baacbd0cf19053438b5ee3ccc87b
                                            • Instruction ID: c8b5851468d77159ffae520b158b703b721818af07e5bd8c8d0e4054509fdbcb
                                            • Opcode Fuzzy Hash: ab96790c3fc4ca84c96659126e3f5302aa64baacbd0cf19053438b5ee3ccc87b
                                            • Instruction Fuzzy Hash: 4941B461B0D68285FA54B6238526B79B2A15F47B81F848138DE4EC77C1EE2DE4058736
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: callocfreememset
                                            • String ID: CONNECT phase completed!$allocate connect buffer!
                                            • API String ID: 3505321882-591125384
                                            • Opcode ID: 68d514f7b86cdb551b7cf433abbe7efe2060765152c071c8cb0d38a077bfa434
                                            • Instruction ID: d6377e24bc2d17cb33c10341651c559706a2b9002d95306db327c67ee89e0977
                                            • Opcode Fuzzy Hash: 68d514f7b86cdb551b7cf433abbe7efe2060765152c071c8cb0d38a077bfa434
                                            • Instruction Fuzzy Hash: 4B518732B086C2D2E759AF16D9447B9B390FB8478AF488039CB5D0B291DF78E969C315
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _errnofreememmove
                                            • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                            • API String ID: 3569933452-4268564757
                                            • Opcode ID: b76e1b4a5518ac13d23085a089d378f1201aeba4be3151cabb2d5fcf983a087a
                                            • Instruction ID: 7b468d90d05282c527df46cdb6c9fc8d13d5d715e606f648199634bdd32edb65
                                            • Opcode Fuzzy Hash: b76e1b4a5518ac13d23085a089d378f1201aeba4be3151cabb2d5fcf983a087a
                                            • Instruction Fuzzy Hash: F551C062A1CBC2C2EB14AB26D440AB9FB60FB46795FC48039DB9D07A55DF7CE005C762
                                            APIs
                                            • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF76C31688C
                                            • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF76C3168BE
                                            • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF76C3168F9
                                            • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF76C31695C
                                            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF76C316998
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: D@std@@@std@@U?$char_traits@$?sbumpc@?$basic_streambuf@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@
                                            • String ID:
                                            • API String ID: 1457788575-0
                                            • Opcode ID: 6893421deeca5781e2c1d6a5238aa063ebb165829b01111c5705bc7182232999
                                            • Instruction ID: ec366517526ea20b6e49aaf76b6ff27986d2d734baed03a63fe47211ee9a21d1
                                            • Opcode Fuzzy Hash: 6893421deeca5781e2c1d6a5238aa063ebb165829b01111c5705bc7182232999
                                            • Instruction Fuzzy Hash: 3541A332608A81C6DB21DF5AE580A3DBBB0FB84B96F548139CE9E87B60CF39D451C711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$calloc$memmove
                                            • String ID:
                                            • API String ID: 1476394334-0
                                            • Opcode ID: 64c6fdbff8a11b2532f15ed745b50853e0830a626b0b8bd0508148e4ab3add04
                                            • Instruction ID: d42a65eb1eace95ab13543bebfc91fbcc3432c4cbe05b4b094e2126135f3fec0
                                            • Opcode Fuzzy Hash: 64c6fdbff8a11b2532f15ed745b50853e0830a626b0b8bd0508148e4ab3add04
                                            • Instruction Fuzzy Hash: BC21AEB1A0DB82C6E760AF23D410639BAA0FB48BE1F844238DB9E57794EF3DD4548751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemallocmemmove
                                            • String ID: Start Date: %s$Start Date
                                            • API String ID: 2537350866-2389359183
                                            • Opcode ID: 645e973068f8d14e3c442d7c646b7d6f97955d556b955e8b6d6482bd4041ae52
                                            • Instruction ID: ca7a63832e60fe46be07717e96d9385e4a13957872cda98d879a61253cf2de53
                                            • Opcode Fuzzy Hash: 645e973068f8d14e3c442d7c646b7d6f97955d556b955e8b6d6482bd4041ae52
                                            • Instruction Fuzzy Hash: 7D210665A093C2C0EE15AB178611AF8B792AF16BD6F884539C90E07BD1DE3DA5448332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 2190258309-1663925961
                                            • Opcode ID: 9126df0b5afe5ef941f56d6fbd578ce692d75b24dec8e5cc34924407e27a8d6a
                                            • Instruction ID: c65ccbd1c063f1f0a6e7c3c49c93629c29b6319e8e0285a7f24b459b79807d08
                                            • Opcode Fuzzy Hash: 9126df0b5afe5ef941f56d6fbd578ce692d75b24dec8e5cc34924407e27a8d6a
                                            • Instruction Fuzzy Hash: A221B262A09B86C5FA50AB17E450AFEB3A0FF85B86F840039DE4E07B55EE3CD045C765
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: malloc$free
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1480856625-1663925961
                                            • Opcode ID: a4642c6a8c0f623f89d5f45499ed7478b5b89596c4b31a3bdf23ea40a6a4a95f
                                            • Instruction ID: 47dde8d06f44838f675f71e5f5e147a0dad0836570f049a289ee5fab738e1245
                                            • Opcode Fuzzy Hash: a4642c6a8c0f623f89d5f45499ed7478b5b89596c4b31a3bdf23ea40a6a4a95f
                                            • Instruction Fuzzy Hash: FB218376A08B82C5EA50AB17E454AEAB3A0FF85786F84003ADE4E07B15EF3CD045C765
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: malloc$free
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1480856625-1663925961
                                            • Opcode ID: a04aec94a01de67136a3c8488be706026768e4ad02e76b0738e893e1c58f3096
                                            • Instruction ID: 2ac9d0528afc1cd49aac41c16429777477c80adc62a34d50b62a71bacc781edb
                                            • Opcode Fuzzy Hash: a04aec94a01de67136a3c8488be706026768e4ad02e76b0738e893e1c58f3096
                                            • Instruction Fuzzy Hash: 74218366A08B82C5EA50EB17E454AEAB3A0FF85786F84003ADE4E07B15EF3CD045C765
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                            • String ID:
                                            • API String ID: 469868127-0
                                            • Opcode ID: b7c469b9c50272ed13fe7d360d03cd1159581588343cfb076c67ffe656983371
                                            • Instruction ID: 4bbcb581841cdd47507c2bb5c48de76b091c561c1fabdb9331c8b970e2b2081b
                                            • Opcode Fuzzy Hash: b7c469b9c50272ed13fe7d360d03cd1159581588343cfb076c67ffe656983371
                                            • Instruction Fuzzy Hash: E8114C36A08A81C7E710AF13E544669B770FB89B92F444139DF8E07B44CF3EE4A58761
                                            APIs
                                            Strings
                                            • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF76C34EE05
                                            • ** Resuming transfer from byte position %I64d, xrefs: 00007FF76C34EBA8
                                            • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF76C34EBBB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fflush
                                            • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                            • API String ID: 497872470-664487449
                                            • Opcode ID: 1cd5326ffe5c89d474f7394fe99d3e6f104ab3c010b3591c91a5573f86731d3e
                                            • Instruction ID: 8256e4eedcc921fa26e3215600c1925348f0198b2c8fb16cbd4fab876226cde1
                                            • Opcode Fuzzy Hash: 1cd5326ffe5c89d474f7394fe99d3e6f104ab3c010b3591c91a5573f86731d3e
                                            • Instruction Fuzzy Hash: 1891B422606B86C5DA60EB06E544BAAF364FB84BC0F825036DE4D4BB95FF3CD445D781
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastfreememmove
                                            • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                            • API String ID: 1540152464-2064316097
                                            • Opcode ID: 23cf9610105657980b2ae86206a27269685fc60679ebbc9f262ad753cd3d57d1
                                            • Instruction ID: 49d686563c678f0a79b8c8e8023745c45cdf4b53e2012e516615e07d47ba99d7
                                            • Opcode Fuzzy Hash: 23cf9610105657980b2ae86206a27269685fc60679ebbc9f262ad753cd3d57d1
                                            • Instruction Fuzzy Hash: 5141C521A08A82C5F760BF279400BB9B7A4FB49799FC48139DF5D8B385EE3CE4458752
                                            APIs
                                              • Part of subcall function 00007FF76C31FEB0: memmove.VCRUNTIME140 ref: 00007FF76C31FEE1
                                              • Part of subcall function 00007FF76C325AB0: memmove.VCRUNTIME140 ref: 00007FF76C325C6A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C3208CE
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C320921
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF76C32099F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                            • String ID: out_of_range
                                            • API String ID: 15630516-3053435996
                                            • Opcode ID: 2ab4a17d05f9163cc9de7fb43529338f15fca0f13a97be7f78d8d893a7ce780d
                                            • Instruction ID: 6faf0de63d04d464b5eb30a099596b661bcd4900702efd379f0633edf6a9269a
                                            • Opcode Fuzzy Hash: 2ab4a17d05f9163cc9de7fb43529338f15fca0f13a97be7f78d8d893a7ce780d
                                            • Instruction Fuzzy Hash: EF51C572A08BC5C5EE10AB26E44176EB361FB857A5F904239D6AD03BE9DF3CE084C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: FALSE$TRUE
                                            • API String ID: 1865132094-1412513891
                                            • Opcode ID: 7a0ac71498421370ad996f4cff490362927955eaa5c88f67c1dfb3f62a368794
                                            • Instruction ID: ece3f29c0433ed0e4401ddd13b8364c76b16f97265222883bc2b2832811edb76
                                            • Opcode Fuzzy Hash: 7a0ac71498421370ad996f4cff490362927955eaa5c88f67c1dfb3f62a368794
                                            • Instruction Fuzzy Hash: 454126A1F09246C4FF05AA17991A6B8F791AB067A6F84453ADE4D0B3C0DE2DE540833A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _time64$ErrorLast
                                            • String ID: TFTP response timeout
                                            • API String ID: 3339832089-3820788777
                                            • Opcode ID: 6927f1a4163830692c329c6e32629500f2de2583b1f017f14199414e138124f1
                                            • Instruction ID: 57fad1668021601136997f138d47ccbac665ddd71c668e851bdee393131a9d55
                                            • Opcode Fuzzy Hash: 6927f1a4163830692c329c6e32629500f2de2583b1f017f14199414e138124f1
                                            • Instruction Fuzzy Hash: 7341E832A08681C5E760EF27D410BB9B790EB49BA5F818239DE1D577C9DF3CD4018762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: %s%lx
                                            • API String ID: 573759493-530121141
                                            • Opcode ID: d527ada8ade7ecfa56ba3b172719db392c12cc6823c2fb702e40bff02885ca90
                                            • Instruction ID: a8cac76b155ebd14a9b17bb7bda45ffe4c9d198b477b330926a25fa2fdab7e1c
                                            • Opcode Fuzzy Hash: d527ada8ade7ecfa56ba3b172719db392c12cc6823c2fb702e40bff02885ca90
                                            • Instruction Fuzzy Hash: 4C311311E0D597C5FB12AF27865AB78FFA19B03B42FC44539C58A06A81DE2EE541C33A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: TRUE
                                            • API String ID: 573759493-3412697401
                                            • Opcode ID: 6e949270edc3d642e131fa7b48bd87022cb680dfd3fcf7aff53e0eec1f037c97
                                            • Instruction ID: dad52764f6ec66d3a9ba4ae0d4fe6cc581c5599ce1c49f3949603f9175a070be
                                            • Opcode Fuzzy Hash: 6e949270edc3d642e131fa7b48bd87022cb680dfd3fcf7aff53e0eec1f037c97
                                            • Instruction Fuzzy Hash: A4311722E0C587C9FB01DF268659778BFA1AB07B95F844235CA9A46AC5CE2DD141C336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fwrite
                                            • String ID: ...$...
                                            • API String ID: 3559309478-2253869979
                                            • Opcode ID: cc5e1ffe1e98b91176a8b3f95d00f8597a6303a62665e83198dbe035b19a601a
                                            • Instruction ID: 6957a9066d1275bd1ea4da157a2dbf08f2816c4823cf6bb7031315f2af7fe278
                                            • Opcode Fuzzy Hash: cc5e1ffe1e98b91176a8b3f95d00f8597a6303a62665e83198dbe035b19a601a
                                            • Instruction Fuzzy Hash: AC31E461A09AC5C1EB60EB12E414BF9B3A1FB88785FC04235CA5E03790CF3DD015C791
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: acceptgetsocknameioctlsocket
                                            • String ID: Connection accepted from server$Error accept()ing server connect
                                            • API String ID: 36920154-2331703088
                                            • Opcode ID: 7b736428fac4d0e5b68c1d54877851a7311014b4d4fad642fbef5f5e413bece9
                                            • Instruction ID: 1e63a28258d4ed5cb4f4b337192583b32f3a425f90b171d20dba509e35dcdaaf
                                            • Opcode Fuzzy Hash: 7b736428fac4d0e5b68c1d54877851a7311014b4d4fad642fbef5f5e413bece9
                                            • Instruction Fuzzy Hash: B63194216086C1C5E654EB22E444BAAB3A0FB48BA9FC41239DE6D4B7C5DF3DE1058762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: :
                                            • API String ID: 2653869212-336475711
                                            • Opcode ID: 9d55a18ca533cc488087d91a8685ca0e891cf53c3e7487a43f84847c9b4c94d2
                                            • Instruction ID: f729d2c46ce35cd65052f7cebc944363fbcdc53653e7fa94f8369442b001de8a
                                            • Opcode Fuzzy Hash: 9d55a18ca533cc488087d91a8685ca0e891cf53c3e7487a43f84847c9b4c94d2
                                            • Instruction Fuzzy Hash: 7921AE32A09B85C6EE61AF06E5407A9B3A0FB44BA5F888139CF9D47384EF3CD4048761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: :
                                            • API String ID: 2653869212-336475711
                                            • Opcode ID: 674244ef9c0535a9a8747cbeff99938d769fccc67fed606d4fbde66a7aa8ecb3
                                            • Instruction ID: 581a8abe8fabbfcc817c90d652010509c5a03ed2633b8837bc5634a38d842c2a
                                            • Opcode Fuzzy Hash: 674244ef9c0535a9a8747cbeff99938d769fccc67fed606d4fbde66a7aa8ecb3
                                            • Instruction Fuzzy Hash: 38118E32A09B85C1EE61AF06E5407A9B3A0EB44BA5F88413ACF9D47394EF3CE4548761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ErrorLastsend
                                            • String ID: SENT$Sending data failed (%d)
                                            • API String ID: 1802528911-3459338696
                                            • Opcode ID: fe1ce7282310f26c10f005fc81da213437cf0d7eb6fe1701960341f3b47a97fd
                                            • Instruction ID: 26a8d04d35591de9efb0feb9e4a224acff709b2cf9c87f8274103e668a1850bf
                                            • Opcode Fuzzy Hash: fe1ce7282310f26c10f005fc81da213437cf0d7eb6fe1701960341f3b47a97fd
                                            • Instruction Fuzzy Hash: 6E01DE22708A92C1DB10AB2BE801859BB70EB99FC8B896139DB5D47B11CE38D505C391
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove
                                            • String ID:
                                            • API String ID: 2162964266-0
                                            • Opcode ID: 802905112179594054f2c2b4ba1fd08375f3ca45d5e0ca94aeb3242eb6ac0d64
                                            • Instruction ID: cdc284d1598d44e90c797a5cfa17bcacf1d606fb6958678a84d028b92bdb7495
                                            • Opcode Fuzzy Hash: 802905112179594054f2c2b4ba1fd08375f3ca45d5e0ca94aeb3242eb6ac0d64
                                            • Instruction Fuzzy Hash: 0B41E132604B81D6EB12AF2AE5445A9B321F726BD0F944635CF6C07B82DF38E1E0C391
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ExceptionThrow
                                            • String ID:
                                            • API String ID: 432778473-0
                                            • Opcode ID: 72819c585e659784e5d9a33e7a21a9f5d1a9cbe1d1279d8ce48f8406621303d6
                                            • Instruction ID: dc991969c3d7532e7177eed4271f56afcb9f2663ae4a15343a106300659f18eb
                                            • Opcode Fuzzy Hash: 72819c585e659784e5d9a33e7a21a9f5d1a9cbe1d1279d8ce48f8406621303d6
                                            • Instruction Fuzzy Hash: CB215EA6A14B80C9D718FE73D8524E97362FB8DBD8F44953AFE4D47B4ACE28D4404790
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C34AD45), ref: 00007FF76C34A968
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C34AD45), ref: 00007FF76C34A971
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C34AD45), ref: 00007FF76C34A9EA
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C34AD45), ref: 00007FF76C34A9FB
                                            • memmove.VCRUNTIME140(?,?,00000000,00007FF76C34AD45), ref: 00007FF76C34AA24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$mallocmemmove
                                            • String ID:
                                            • API String ID: 1934541353-0
                                            • Opcode ID: 9cabeaae55df19c09b5fc046ef442e1caae62a35f39ea22151b81ffcd051e7f2
                                            • Instruction ID: ccb433a2ffa7b4048245f40088b2787ddb5d6a52258893abd83e7c313290ae54
                                            • Opcode Fuzzy Hash: 9cabeaae55df19c09b5fc046ef442e1caae62a35f39ea22151b81ffcd051e7f2
                                            • Instruction Fuzzy Hash: 8A31A422A09B85C1EB50AF13E940769B3A0EB09FE5F848239DE6E4B7C5DF3CD4548712
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 0-3343404259
                                            • Opcode ID: d4bd8f961c01d8f6c9ad39bc338a75a696d2099a47638f2714563e293faed805
                                            • Instruction ID: 7dc6b2f3e5d86a3b0e1e4bac137d4d1c14429845ca1f1742be9babca70695ccc
                                            • Opcode Fuzzy Hash: d4bd8f961c01d8f6c9ad39bc338a75a696d2099a47638f2714563e293faed805
                                            • Instruction Fuzzy Hash: 18B1B931A08686C5F764AE27D454BBDB3A0EF41B4AF944139CD0E4B296DF3DE444C3A2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                            • API String ID: 1294909896-910067264
                                            • Opcode ID: 1008ff672a7a3c620490f3befc03e7857a942f8444ee8cb399f12ff33b302598
                                            • Instruction ID: 1cede5235fd0d3a4449fb48cab7d69ad7e2033fd1c12530fde97d7217da09d1e
                                            • Opcode Fuzzy Hash: 1008ff672a7a3c620490f3befc03e7857a942f8444ee8cb399f12ff33b302598
                                            • Instruction Fuzzy Hash: B7511962B0C696C4EB119B17A6099B9FBA5FB02796FC4403ADA4D03B54DF3DD441C336
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                            • API String ID: 1294909896-2632828617
                                            • Opcode ID: 05d40c5e7b8570f2c8cac0e9a813d49927c0426b82e49adf5c7aee4e9bb0e51c
                                            • Instruction ID: 8d75175f305b7dcc3df2e64a5c9fbf1b8f5c075d7fa25985d95231a1244a04f7
                                            • Opcode Fuzzy Hash: 05d40c5e7b8570f2c8cac0e9a813d49927c0426b82e49adf5c7aee4e9bb0e51c
                                            • Instruction Fuzzy Hash: 2741C461A0C6D2C5EA219B12A609BB9F7A0FB06B92F844039CB4D03754CF3DE545C776
                                            APIs
                                            • memmove.VCRUNTIME140(00000000,7FFFFFFFFFFFFFFF,00000000,00007FF76C3160F0), ref: 00007FF76C316684
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,7FFFFFFFFFFFFFFF,00000000,00007FF76C3160F0), ref: 00007FF76C3166C2
                                            • memmove.VCRUNTIME140 ref: 00007FF76C3166CC
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF76C316705
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 2016347663-0
                                            • Opcode ID: 57b51a8c635622f8d9f7d5f01c3f3ab2648edfd40d090a1e59034f0fec72160a
                                            • Instruction ID: 3cd980c959336cb854ff5205784446d833ef8556f3ff28d4a1f70674a40f0eeb
                                            • Opcode Fuzzy Hash: 57b51a8c635622f8d9f7d5f01c3f3ab2648edfd40d090a1e59034f0fec72160a
                                            • Instruction Fuzzy Hash: 35410132B09B81C8EE11AB67A144A6CF3A1EB45BD5F984239CE5D47B95CE7CD041C321
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF76C355D6B), ref: 00007FF76C373ADE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s
                                            • API String ID: 1294909896-3043279178
                                            • Opcode ID: 99c5245ea1296ffde5abc40f34589e1d0eb5484a2dc5c5139945c2da538ee967
                                            • Instruction ID: 3f2ac689889cb3619c6a8bd141b64bbea93f3b12bbb5d65346b772eebe6eeb78
                                            • Opcode Fuzzy Hash: 99c5245ea1296ffde5abc40f34589e1d0eb5484a2dc5c5139945c2da538ee967
                                            • Instruction Fuzzy Hash: E4419332A18B85C2DA90EB16F4415AAF7A0FB85BA1F540139DF9E07BA1DF3CE495C310
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF76C3575B0,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF76C373F13
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C373F9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s
                                            • API String ID: 1294909896-3043279178
                                            • Opcode ID: 7ed0b569015fbb09826a0379e959182ce879e00e491ffc2fb4531db0d787b82a
                                            • Instruction ID: 67ad4cc4dfdf49daaedf03370f638a1502260d142c8b7076c5276026458a365f
                                            • Opcode Fuzzy Hash: 7ed0b569015fbb09826a0379e959182ce879e00e491ffc2fb4531db0d787b82a
                                            • Instruction Fuzzy Hash: 39418432A08B45C2EA51AB27B5415AAF3A0FB45BD1F444138DF8E47BA1DF3CE0858715
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                            • API String ID: 1294909896-918878739
                                            • Opcode ID: 85f46235454a9c6a6c81e661cab0dc356034a704c2ec8f7efb83ff05e8c0a442
                                            • Instruction ID: f7fb892af0d4de2c384e6f0c433946200a85d27fe84412802b312b096eef1297
                                            • Opcode Fuzzy Hash: 85f46235454a9c6a6c81e661cab0dc356034a704c2ec8f7efb83ff05e8c0a442
                                            • Instruction Fuzzy Hash: 7E31F162A09B85C4EB519B23DA056A8F7A2FB46B92FC4403ACA4D07784DF3DE541C325
                                            APIs
                                            • memmove.VCRUNTIME140(?,?,?,00007FF76C31118E), ref: 00007FF76C315621
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF76C31118E), ref: 00007FF76C31568B
                                              • Part of subcall function 00007FF76C3784F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF76C3157CA,?,?,?,?,?,?,?,00007FF76C31118E), ref: 00007FF76C37850A
                                            • memmove.VCRUNTIME140(?,?,?,00007FF76C31118E), ref: 00007FF76C3156B3
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF76C3156E1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID:
                                            • API String ID: 2075926362-0
                                            • Opcode ID: 3d5303f46380ffb3e770df0726efbd6f4cc7112fe6a177eb2947a5462595e725
                                            • Instruction ID: d89ff79d1e9893dd784daab37f4cb323ff4e12d77eff2bba65564736bd54b22b
                                            • Opcode Fuzzy Hash: 3d5303f46380ffb3e770df0726efbd6f4cc7112fe6a177eb2947a5462595e725
                                            • Instruction Fuzzy Hash: E8316D31A09782C9EA15AF22A440779B360EB14BA5F981738DB7D07FD1CF3CD0528352
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF76C35F594
                                              • Part of subcall function 00007FF76C33FA50: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C33FB75
                                              • Part of subcall function 00007FF76C33FA50: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF76C33FB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: fwrite$free
                                            • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                            • API String ID: 3468156532-1133524294
                                            • Opcode ID: e136dbf9f441ac8e451b338ded0dfd5f1dd260cb128f691fda4e896475c89939
                                            • Instruction ID: 60666f20b85070f5eeec7deab84541870f52c1df8f0aa22a70a354b8bb0b50f8
                                            • Opcode Fuzzy Hash: e136dbf9f441ac8e451b338ded0dfd5f1dd260cb128f691fda4e896475c89939
                                            • Instruction Fuzzy Hash: 6E414236A08A82C5E710EF27D4409ADB7A0EB48B86FC9413ACF4E4B395DF39D444C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 1294909896-1153420294
                                            • Opcode ID: fa8fed30186aba6a4e1af7be4f59decd1c9c566d7eccbb58121c3f13c3b8ce00
                                            • Instruction ID: a993e1704ffb29ed6faa1954116447ae008b28d28d65f5f9fae94e586fb3c49b
                                            • Opcode Fuzzy Hash: fa8fed30186aba6a4e1af7be4f59decd1c9c566d7eccbb58121c3f13c3b8ce00
                                            • Instruction Fuzzy Hash: 0C31C362A08B81C4EB60AB52E649AE9F390FB46B82FD40039CA4D03255CF7DD645C736
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: freemallocmemmove
                                            • String ID: TRUE
                                            • API String ID: 2537350866-3412697401
                                            • Opcode ID: 2d4bb351302d831bfebcd9c632c6d04f713925cca0e941be01b971f6ff58826f
                                            • Instruction ID: a91ebcb78b034efd5b02a58b95fddf2fd2081772a2751f137af329e54d47a4fc
                                            • Opcode Fuzzy Hash: 2d4bb351302d831bfebcd9c632c6d04f713925cca0e941be01b971f6ff58826f
                                            • Instruction Fuzzy Hash: E4214765B09B42C4EF45DA1796097B4B792AB06BF1F84413ACD1E037C4DE3DD0818335
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: isupper$_strdupfree
                                            • String ID:
                                            • API String ID: 3359907120-0
                                            • Opcode ID: fc4fc429732e00a44db8fe2e5d174b6341ba560f848fdfd93ac567f87e273a55
                                            • Instruction ID: cab1f6fa7b3f9403bb59644c91faae648d86f2d42f9ada40d5beabeb9d74c3b9
                                            • Opcode Fuzzy Hash: fc4fc429732e00a44db8fe2e5d174b6341ba560f848fdfd93ac567f87e273a55
                                            • Instruction Fuzzy Hash: 4A21E011E0D5D7C5FB12EF27865AB38FFA19B13B42F880579C58A45A81CE2ED541C33A
                                            APIs
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF76C32E2B8), ref: 00007FF76C32E405
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF76C32E2B8), ref: 00007FF76C32E41F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64
                                            • API String ID: 1114863663-3980630743
                                            • Opcode ID: b1fd929e1ea02ce3b4e574b7c926a0cbc35f4da2a7fe06a434e72a59128ba437
                                            • Instruction ID: 7883b8713e195fba66c61e668010e24b552dbd795039bf47a1b08181faf946db
                                            • Opcode Fuzzy Hash: b1fd929e1ea02ce3b4e574b7c926a0cbc35f4da2a7fe06a434e72a59128ba437
                                            • Instruction Fuzzy Hash: 1221C632A086A3C5EF616B32D451EB9B7949B05F4BF894538CA5A46284DE2CE90487B2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: strstr$calloc
                                            • String ID: ;type=
                                            • API String ID: 3224321581-3507045495
                                            • Opcode ID: f68a191c9b8f20b82da7e8e041d4e816902b3fd0c790a73ad980d8742af74313
                                            • Instruction ID: 3060d2121486a821722d2986a5dbc102bc48ecc1af5c453fd328d32aec72fd1d
                                            • Opcode Fuzzy Hash: f68a191c9b8f20b82da7e8e041d4e816902b3fd0c790a73ad980d8742af74313
                                            • Instruction Fuzzy Hash: 3521FB31A087C1C1E7559B26E4407A97BA0FB44798F885239DBAD4B7C5DF3CE491C321
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$freemalloc
                                            • String ID:
                                            • API String ID: 2605342592-0
                                            • Opcode ID: c1d6b819950136bb12358642d9b14dbf1d8b50b5778c953896405999a56a868f
                                            • Instruction ID: 5065406fa42454a6022a135ced0d3a8646aefd79ddeec9bbbecab3daa3ec79c8
                                            • Opcode Fuzzy Hash: c1d6b819950136bb12358642d9b14dbf1d8b50b5778c953896405999a56a868f
                                            • Instruction Fuzzy Hash: 78118E31B09B46C6E710AF62B955929B7B0EB88BC1B884038DB4A97B14DF38E5018765
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Proxy-Connection: Keep-Alive
                                            • API String ID: 1294909896-2835282938
                                            • Opcode ID: 376a8986730c62dd9a4c920ab9db2ce35aa2abf6bbf9b22cd592376a19957654
                                            • Instruction ID: 639b0190a1c3d4ddb0f1c56fa1f2f8cfcb565a526cc96085a30b48192df0ab28
                                            • Opcode Fuzzy Hash: 376a8986730c62dd9a4c920ab9db2ce35aa2abf6bbf9b22cd592376a19957654
                                            • Instruction Fuzzy Hash: C3010862F09700C2FA156B56A8507A9B6909F48BF3F448238CE6D0B3D0DF3C88898750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree$strchr
                                            • String ID:
                                            • API String ID: 1739957132-0
                                            • Opcode ID: a0101cdfa49fb209d86112a1354245424091e60fc42ac384daf90f3d044b54de
                                            • Instruction ID: 0b022bace9743f78b5d0683035029ed7fbdc88d9b2e0b226c96264f5ff0820bb
                                            • Opcode Fuzzy Hash: a0101cdfa49fb209d86112a1354245424091e60fc42ac384daf90f3d044b54de
                                            • Instruction Fuzzy Hash: 1A01B951F0E78182FF59AB1761A5438B2B06F49BC1F88447DDD0E83744EF1CD8958726
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$CriticalDeleteSectionclosesocket
                                            • String ID:
                                            • API String ID: 3086658127-0
                                            • Opcode ID: e6065c34bd9fd7665f1a29da9260240fc75fadae23c59dc187488d4a932b61f2
                                            • Instruction ID: 489fc13fed05d30c0827fca3083f79ea267cbd40a7f399024c479886ebd24a32
                                            • Opcode Fuzzy Hash: e6065c34bd9fd7665f1a29da9260240fc75fadae23c59dc187488d4a932b61f2
                                            • Instruction Fuzzy Hash: 23010C12D19A82C3EB44EF32C9605787360FFE9F29B416329DE6E011A5AF68A5D48311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %ld
                                            • API String ID: 1865132094-1112595699
                                            • Opcode ID: 57a3f8d6c35ad66ff5f26708f499374c9b3277a3990a07a39963c7f585c7f855
                                            • Instruction ID: 737f625a4e2e360a710f1df333130f512b9cd6b2492786ce70ad3d31d3012f8f
                                            • Opcode Fuzzy Hash: 57a3f8d6c35ad66ff5f26708f499374c9b3277a3990a07a39963c7f585c7f855
                                            • Instruction Fuzzy Hash: A231C822A0DA42C1FA75EB639050BBAB790AF45746FD60039DA4D17785EF3CE444C732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupmalloc
                                            • String ID: identity
                                            • API String ID: 3515966317-1788209604
                                            • Opcode ID: e66af6c4f9ade603a49866f33157afbd46f7a3ea0939318be889fcbbf3a58f28
                                            • Instruction ID: 00f8991cfb3bbc4681ca502afccfc8abb8ac5acba89dc3f5f0a2daa502f4c2ac
                                            • Opcode Fuzzy Hash: e66af6c4f9ade603a49866f33157afbd46f7a3ea0939318be889fcbbf3a58f28
                                            • Instruction Fuzzy Hash: 6C31E761E0AA86C1FB81AB16D940775F7A0AF44BE6F898238CE1D473D4EF2CD4458321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: mallocrealloc
                                            • String ID:
                                            • API String ID: 948496778-3916222277
                                            • Opcode ID: e94f5cdb75c950c2740f760a2f91d4e0736702ef94c0651a508f7944ff44a452
                                            • Instruction ID: 812f5a4becc2b3667f67b7642f4c58f8e2d0c076b23489d573dced7f00bada2d
                                            • Opcode Fuzzy Hash: e94f5cdb75c950c2740f760a2f91d4e0736702ef94c0651a508f7944ff44a452
                                            • Instruction Fuzzy Hash: F311AF72609B81C1DB549F27E1402A9B7A0FB08FD5F848139DA5E07788EF3CD891C391
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: getsockoptsetsockopt
                                            • String ID: @
                                            • API String ID: 194641219-2726393805
                                            • Opcode ID: a8f8a15b25916064966fa32856a7fd5acc42e338f16d970676a69efc016cda55
                                            • Instruction ID: 5951f7dce40d0c4cb28a36a967936998d25ff61a1cdaddf7a7c5e86ff4973681
                                            • Opcode Fuzzy Hash: a8f8a15b25916064966fa32856a7fd5acc42e338f16d970676a69efc016cda55
                                            • Instruction Fuzzy Hash: B1118271A0C182C6F760EF12E805AA6F7A0FB8534AF944038DB484BA94DBBDD599CB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: TRUE
                                            • API String ID: 1865132094-3412697401
                                            • Opcode ID: 213a7e9061b6b9024912f3341fdbacb041f930a0680c4625f7bae1a8d067af90
                                            • Instruction ID: 1c8f6587cdeecb6178898d78dcedcf2091185f8f23fd01012dbb4712e3db70ab
                                            • Opcode Fuzzy Hash: 213a7e9061b6b9024912f3341fdbacb041f930a0680c4625f7bae1a8d067af90
                                            • Instruction Fuzzy Hash: C601F9A6F0E645C4FB029B13D9156B8B761BB06BE6F84443ACE0E07390DE3DD4818335
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %s: %s
                                            • API String ID: 3985033223-1451338302
                                            • Opcode ID: 3dc5c5f85b59fb888ab8b0b5595986c5c5bba1adc293ac1f03581c6924fb86e2
                                            • Instruction ID: 97259309cafe973786b5652394ce27f31299102449df27db14ba83c9c4a205ce
                                            • Opcode Fuzzy Hash: 3dc5c5f85b59fb888ab8b0b5595986c5c5bba1adc293ac1f03581c6924fb86e2
                                            • Instruction Fuzzy Hash: 95F04F91A0D681C2EA61AB13F905FF5B360AF45BD2F884439CE4E073529E3CD5898726
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free$memset
                                            • String ID:
                                            • API String ID: 2717317152-0
                                            • Opcode ID: e53b978167ceb9468db9350c7236f2eeb9b758ee64c9a7439acd5f3c50bf64fe
                                            • Instruction ID: 5d4de00212d2c9e0eb1410e0f7b825337318fb868f7a350e42673e5b3746242a
                                            • Opcode Fuzzy Hash: e53b978167ceb9468db9350c7236f2eeb9b758ee64c9a7439acd5f3c50bf64fe
                                            • Instruction Fuzzy Hash: 4C211A32E18B91E3E704DB22D6906A8B360FB99750F519229EB8D43A11DF74F1F5C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2b2ba1a3e79af3b65418d18d4aa77cbdbf5ce9e38100f5acbc1927a1a1e45bb9
                                            • Instruction ID: 93183393e134789c4a5f7231725425d93abea4be7504893004898accdfa856f5
                                            • Opcode Fuzzy Hash: 2b2ba1a3e79af3b65418d18d4aa77cbdbf5ce9e38100f5acbc1927a1a1e45bb9
                                            • Instruction Fuzzy Hash: D1115E36A09A01C1EB50AF26E49067CB3B4EF84F95F544039CA0E42764DF3CD894C762
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8952ac6fd4e53bbabe20cb384a18410bb6eaa72cb7eb8d9e19d29fa112ef5033
                                            • Instruction ID: 44f8f60e7a8b11285c7d748cec67206d0aa0ba0b70f0ee9c674c0d4cf9e32f27
                                            • Opcode Fuzzy Hash: 8952ac6fd4e53bbabe20cb384a18410bb6eaa72cb7eb8d9e19d29fa112ef5033
                                            • Instruction Fuzzy Hash: 82110036609B45C5D7809F26E580668B7A4FB48F59F884039DF8E57718CF34E899C750
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369B8E,?,?,?,00007FF76C33B402), ref: 00007FF76C36DAB6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369B8E,?,?,?,00007FF76C33B402), ref: 00007FF76C36DAD7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369B8E,?,?,?,00007FF76C33B402), ref: 00007FF76C36DAF2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF76C369B8E,?,?,?,00007FF76C33B402), ref: 00007FF76C36DB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1382816137.00007FF76C311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76C310000, based on PE: true
                                            • Associated: 00000000.00000002.1382792826.00007FF76C310000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382879549.00007FF76C37B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382912218.00007FF76C396000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1382928311.00007FF76C398000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff76c310000_tpmbypassprivatestore.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 60de26c849afc63f796b88f3f6179a90b259070c00f3c6a51290a8a63c5b7bbb
                                            • Instruction ID: 5ccffb8330a532af998e6488a6d0fbaca47fd4e9a434972ca96339ebdf0ca6a8
                                            • Opcode Fuzzy Hash: 60de26c849afc63f796b88f3f6179a90b259070c00f3c6a51290a8a63c5b7bbb
                                            • Instruction Fuzzy Hash: 7711A576A09B41C2DB44AF2AE89142CB7B4FF98F99754006ACA4E43768CF38D895C791