Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
Analysis ID:1501355
MD5:0b1d213e54d820dd3fefa386aa3e1f43
SHA1:12e6ac4bed321f1a44e6d71338502e3dae943466
SHA256:0e7ff3739925d9952c557cd8c3454c181549953975cc6241e95a638c52c33dcd
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe (PID: 7252 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe" MD5: 0B1D213E54D820DD3FEFA386AA3E1F43)
    • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7344 cmdline: C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7372 cmdline: taskkill /f /im HTTPDebuggerUI.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7408 cmdline: C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7424 cmdline: taskkill /f /im HTTPDebuggerSvc.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7472 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7488 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7504 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7520 cmdline: taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7552 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7568 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7676 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7692 cmdline: taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7720 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7736 cmdline: taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7764 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7780 cmdline: taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7812 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7828 cmdline: taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7856 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7868 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7936 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7968 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7996 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8012 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8040 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8056 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8084 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 8100 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 8136 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 8152 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 8168 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 1836 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1196 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7244 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7388 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3232 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7452 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7408 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7492 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7472 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7528 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7516 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7580 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7568 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7700 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7696 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7756 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7728 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7800 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7772 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6472 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7844 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7832 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7816 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeAvira: detected
Source: http://185.101.104.92/as.exeAvira URL Cloud: Label: malware
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.8% probability
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52D8ED strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,4_2_00007FF6CE52D8ED
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE549DA0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,4_2_00007FF6CE549DA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52FB70 CryptAcquireContextA,CryptCreateHash,4_2_00007FF6CE52FB70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52CBE0 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,4_2_00007FF6CE52CBE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52FBC0 CryptHashData,4_2_00007FF6CE52FBC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52FBD0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,4_2_00007FF6CE52FBD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52CCB0 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,4_2_00007FF6CE52CCB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5507F0 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,4_2_00007FF6CE5507F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5528E0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,4_2_00007FF6CE5528E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE549480 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,4_2_00007FF6CE549480
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: -----BEGIN PUBLIC KEY-----4_2_00007FF6CE512A90
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: mov dword ptr [rbp+04h], 424D53FFh4_2_00007FF6CE53C4B0
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.7:49709 version: TLS 1.2
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: b0E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Cybertins\Auth Plus\KeyAuth-CPP-Example-main\x64\Release\FivemUnbanBaimless.pdb source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Cybertins\Auth Plus\KeyAuth-CPP-Example-main\x64\Release\FivemUnbanBaimless.pdb source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 54Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE509770 malloc,recv,free,4_2_00007FF6CE509770
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 54Content-Type: application/x-www-form-urlencoded
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeString found in binary or memory: http://185.101.104.92/as.exe
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeString found in binary or memory: http://185.101.104.92/as.exeC:
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415048357.0000018E503A0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415006221.0000018E503B9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5037B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415092286.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415006221.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415092286.0000018E503B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkz/valorantplus/
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5035C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5035C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ce
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5035C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/pace
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.7:49709 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5507F0 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,4_2_00007FF6CE5507F0
Source: cmd.exeProcess created: 56
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE522F404_2_00007FF6CE522F40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52D8ED4_2_00007FF6CE52D8ED
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4F18E04_2_00007FF6CE4F18E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51B6704_2_00007FF6CE51B670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5045104_2_00007FF6CE504510
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51C3304_2_00007FF6CE51C330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51A3304_2_00007FF6CE51A330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE513FB04_2_00007FF6CE513FB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52FF804_2_00007FF6CE52FF80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE544F604_2_00007FF6CE544F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4F10004_2_00007FF6CE4F1000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE528D904_2_00007FF6CE528D90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4FAF0B4_2_00007FF6CE4FAF0B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE543F304_2_00007FF6CE543F30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE53CED04_2_00007FF6CE53CED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE540BD04_2_00007FF6CE540BD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4FAD2D4_2_00007FF6CE4FAD2D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE516CE04_2_00007FF6CE516CE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52D9AC4_2_00007FF6CE52D9AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52D9B54_2_00007FF6CE52D9B5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4FEA204_2_00007FF6CE4FEA20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5507F04_2_00007FF6CE5507F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5528704_2_00007FF6CE552870
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4FF5B04_2_00007FF6CE4FF5B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE52B6704_2_00007FF6CE52B670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5383A04_2_00007FF6CE5383A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5003404_2_00007FF6CE500340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE50C3404_2_00007FF6CE50C340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4FC3CD4_2_00007FF6CE4FC3CD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5494804_2_00007FF6CE549480
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51D1F04_2_00007FF6CE51D1F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5262404_2_00007FF6CE526240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE519320 appears 380 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE51DDC0 appears 34 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE553E18 appears 47 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE5069E0 appears 49 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE51C760 appears 46 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE513BF0 appears 70 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE51DC50 appears 37 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE51DCE0 appears 33 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE5194A0 appears 323 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: String function: 00007FF6CE51C830 appears 36 times
Source: classification engineClassification label: mal80.evad.winEXE@107/28@1/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE505FF0 GetLastError,_errno,FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,4_2_00007FF6CE505FF0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "HTTPDebuggerUI.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "HTTPDebuggerSvc.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeReversingLabs: Detection: 60%
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerUI.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerSvc.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerUI.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerSvc.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: b0E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Cybertins\Auth Plus\KeyAuth-CPP-Example-main\x64\Release\FivemUnbanBaimless.pdb source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Cybertins\Auth Plus\KeyAuth-CPP-Example-main\x64\Release\FivemUnbanBaimless.pdb source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51C010 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,4_2_00007FF6CE51C010
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeBinary or memory string: TASKKILL /IM OLLYDBG.EXE /F
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeBinary or memory string: BAD CASTQWERTYUIOPASDFGHJKLZXCVBNMQWERTYUIOPASDFGHJKLZXCVBNM1234567890 | DEVELOPER : BRONKZ TASKKILL /IM PROCESSHACKER.EXE /FTASKKILL /IM DNSPY.EXE /FTASKKILL /IM CHEATENGINE-X86_64.EXE /FCLSTASKKILL /IM OLLYDBG.EXE /FTASKKILL /IM IDA.EXE /FTASKKILL /IM IDA64.EXE /FTASKKILL /IM RADARE2.EXE /FTASKKILL /IM X64DBG.EXE /FSTOP DEBUGGING U YERK
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeBinary or memory string: TASKKILL /IM PROCESSHACKER.EXE /F
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeBinary or memory string: TASKKILL /IM X64DBG.EXE /F
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 6057Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeAPI coverage: 5.7 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5037B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>>[$P
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE504D00 GetStdHandle,GetConsoleMode,SetConsoleMode,GetStdHandle,GetConsoleScreenBufferInfoEx,SetConsoleScreenBufferInfoEx,GetConsoleMode,SetConsoleMode,IsDebuggerPresent,system,system,system,system,system,system,system,system,system,system,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,exit,GetConsoleWindow,GetWindowLongA,SetWindowLongA,GetConsoleWindow,GetWindowRect,MoveWindow,system,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,system,Beep,system,system,exit,4_2_00007FF6CE504D00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE553CB8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,4_2_00007FF6CE553CB8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51C010 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,4_2_00007FF6CE51C010
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE4F31E0 GetProcessHeap,4_2_00007FF6CE4F31E0
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE553AC4 SetUnhandledExceptionFilter,4_2_00007FF6CE553AC4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE55391C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF6CE55391C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE55340C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF6CE55340C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerUI.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerSvc.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerUI.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerSvc.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerUI.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im HTTPDebuggerSvc.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE553B30 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00007FF6CE553B30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE528410 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,4_2_00007FF6CE528410
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE51AFE0 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,4_2_00007FF6CE51AFE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE53F100 calloc,calloc,calloc,bind,WSAGetLastError,4_2_00007FF6CE53F100
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE53EEC9 calloc,calloc,calloc,bind,WSAGetLastError,4_2_00007FF6CE53EEC9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeCode function: 4_2_00007FF6CE5383A0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,4_2_00007FF6CE5383A0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
11
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Process Injection
LSASS Memory131
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501355 Sample: SecuriteInfo.com.Win64.Drop... Startdate: 29/08/2024 Architecture: WINDOWS Score: 80 34 keyauth.win 2->34 40 Antivirus detection for URL or domain 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 3 other signatures 2->46 8 SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe 1 2->8         started        signatures3 process4 dnsIp5 36 keyauth.win 104.26.0.5, 443, 49709 CLOUDFLARENETUS United States 8->36 38 127.0.0.1 unknown unknown 8->38 11 cmd.exe 1 8->11         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 27 other processes 8->18 process6 signatures7 48 Excessive usage of taskkill to terminate processes 11->48 20 taskkill.exe 1 11->20         started        22 taskkill.exe 1 14->22         started        24 taskkill.exe 1 16->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 taskkill.exe 1 18->30         started        32 19 other processes 18->32 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe61%ReversingLabsWin64.Trojan.Tedy
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe100%AviraHEUR/AGEN.1315672
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
http://185.101.104.92/as.exe100%Avira URL Cloudmalware
https://keyauth.cc/panel/bronkz/valorantplus/0%Avira URL Cloudsafe
http://185.101.104.92/as.exeC:0%Avira URL Cloudsafe
https://keyauth.win/api/1.1/ce0%Avira URL Cloudsafe
https://keyauth.win/api/1.1/0%Avira URL Cloudsafe
https://keyauth.win/api/1.1/pace0%Avira URL Cloudsafe
https://curl.haxx.se/docs/http-cookies.html#0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/paceSecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5035C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://185.101.104.92/as.exeSecuriteInfo.com.Win64.DropperX-gen.8867.28776.exefalse
    • Avira URL Cloud: malware
    unknown
    https://keyauth.cc/panel/bronkz/valorantplus/SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415048357.0000018E503A0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415006221.0000018E503B9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5037B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415092286.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415006221.0000018E503BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000003.1415092286.0000018E503B9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.DropperX-gen.8867.28776.exefalse
    • URL Reputation: safe
    unknown
    https://curl.haxx.se/docs/http-cookies.html#SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exefalse
    • Avira URL Cloud: safe
    unknown
    https://keyauth.win/api/1.1/ceSecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe, 00000004.00000002.2528887357.0000018E5035C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://185.101.104.92/as.exeC:SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exefalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.26.0.5
    keyauth.winUnited States
    13335CLOUDFLARENETUSfalse
    IP
    127.0.0.1
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1501355
    Start date and time:2024-08-29 19:28:38 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 40s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:70
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
    Detection:MAL
    Classification:mal80.evad.winEXE@107/28@1/2
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 99%
    • Number of executed functions: 52
    • Number of non-executed functions: 238
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe, UsoClient.exe
    • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • VT rate limit hit for: SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
    TimeTypeDescription
    14:39:28API Interceptor3133x Sleep call for process: conhost.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    104.26.0.5SecuriteInfo.com.Win64.MalwareX-gen.26384.14234.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Trojan.GenericKD.73779679.12724.23011.exeGet hashmaliciousUnknownBrowse
        PmTPg1LYm4.exeGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.Win64.HacktoolX-gen.11863.1266.exeGet hashmaliciousUnknownBrowse
            SecuriteInfo.com.Win64.HacktoolX-gen.11863.1266.exeGet hashmaliciousUnknownBrowse
              Loader.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Win64.Evo-gen.2830.16242.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win64.Evo-gen.25703.16605.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.W64.Agent.NV.tr.9318.30020.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win32.Evo-gen.1540.18028.exeGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        keyauth.winSecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
                        • 104.26.1.5
                        SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                        • 172.67.72.57
                        SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
                        • 104.26.1.5
                        SecuriteInfo.com.Win64.MalwareX-gen.26384.14234.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Trojan.GenericKD.73779679.12724.23011.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                        • 172.67.72.57
                        SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                        • 172.67.72.57
                        PmTPg1LYm4.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.HacktoolX-gen.11863.1266.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        aj.exeGet hashmaliciousUnknownBrowse
                        • 172.67.72.57
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
                        • 172.64.41.3
                        https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        New Document from Community Insurance Center.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                        • 172.67.74.152
                        http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                        • 172.64.148.10
                        file.exeGet hashmaliciousUnknownBrowse
                        • 172.64.41.3
                        https://alkimialofts.com/on%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                        • 104.26.0.100
                        https://decktop.us/MUYKd1Get hashmaliciousUnknownBrowse
                        • 162.247.243.29
                        sxs.exeGet hashmaliciousUnknownBrowse
                        • 172.67.41.60
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        3b5074b1b5d032e5620f69f9f700ff0ehttp://getquckbulck.topGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.0.5
                        https://decktop.us/MUYKd1Get hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        Page1.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 104.26.0.5
                        Detailed Itinerary.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                        • 104.26.0.5
                        https://tmx.velsol.com/Reporting/Document.aspx?MasterAgreementID=i1339-005394573&ID=aQAxADMAMwA5AC0AMAAwADUAMwA5ADQANQA3ADMA.Get hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        Nettably.exeGet hashmaliciousSnake KeyloggerBrowse
                        • 104.26.0.5
                        DHL Page1.exeGet hashmaliciousGuLoaderBrowse
                        • 104.26.0.5
                        Upit za prevoz 28 08 2024 1037 Agrorit d.o.o.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.0.5
                        Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        • 104.26.0.5
                        No context
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):336
                        Entropy (8bit):3.381719730288618
                        Encrypted:false
                        SSDEEP:3:rRRqmfXMHdMIRgDQCXT+FOEaGj3F/9Dqa+Oe2oTiWWu1AX7oj4NAPWRX6u2vooa4:HfX0VyMCXT741lxoTLK7VAPWchwz4
                        MD5:4DFC909CA4DD851D88B767DE3DE855C0
                        SHA1:244B3561C1FE12EA595B1E10D37C1A4410B2B94A
                        SHA-256:A30DD910BD924D63DBD4DA1183E58057E2FC6A69AADF4B6C5571B77119A8CD06
                        SHA-512:D6C848114D171665CFFA3F57F30B35FF1322C4F984E76CF8A5AEEDC0F6D9C248BE7D89BD6CABCE21B1FA65D2AB694B132BA5626ACFED2A03865ECF3F38D5F113
                        Malicious:false
                        Preview:....##########################################################..[ Astrix Private Plus ]..[ Selecione uma opcao: ]..##########################################################....[+] Status > Valorant Plus | Undetected.....[1] Registrar Key....[+] Selecione uma opcao:
                        Process:C:\Windows\System32\cmd.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):44
                        Entropy (8bit):4.003997527334849
                        Encrypted:false
                        SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                        MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                        SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                        SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                        SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                        Malicious:false
                        Preview:The system cannot find the file specified...
                        File type:PE32+ executable (console) x86-64, for MS Windows
                        Entropy (8bit):6.4250352264986
                        TrID:
                        • Win64 Executable Console (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
                        File size:532'480 bytes
                        MD5:0b1d213e54d820dd3fefa386aa3e1f43
                        SHA1:12e6ac4bed321f1a44e6d71338502e3dae943466
                        SHA256:0e7ff3739925d9952c557cd8c3454c181549953975cc6241e95a638c52c33dcd
                        SHA512:f97fd05a49223574a6e4fa4e43e03369589ba25112fe04467cd17a122a13c4a496ee3d4d64370d860644ae5bf01443c5bd4d58181f80b9751f31f66227198e35
                        SSDEEP:12288:vwEh/b02vun/UtniLxUD9HpxZamJNcXo/0:Yw/Q4u/euUDlPZamAXo/
                        TLSH:CCB47C56A7A807FAD167803CC547D603E7B6B4591311DBDB43A0CA792F23BE16E3A720
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p....,..p....B..p.......p.......p.......p.......p.......p...p...q.......p.......p.......p....@..p.......p..Rich.p.
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x14006330c
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66614027 [Thu Jun 6 04:50:47 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:40029d5e9ef0ec678817a8a6a4ca4414
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007FE4A48F6AF0h
                        dec eax
                        add esp, 28h
                        jmp 00007FE4A48F6147h
                        int3
                        int3
                        jmp 00007FE4A48F6DB6h
                        int3
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        lea ecx, dword ptr [0001C4F0h]
                        call dword ptr [00002E1Ah]
                        mov eax, dword ptr [0001BD84h]
                        dec eax
                        lea ecx, dword ptr [0001C4DDh]
                        mov edx, dword ptr [0001CA6Fh]
                        inc eax
                        mov dword ptr [0001BD6Fh], eax
                        mov dword ptr [ebx], eax
                        dec eax
                        mov eax, dword ptr [00000058h]
                        inc ecx
                        mov ecx, 00000004h
                        dec esp
                        mov eax, dword ptr [eax+edx*8]
                        mov eax, dword ptr [0001BD54h]
                        inc ebx
                        mov dword ptr [ecx+eax], eax
                        call dword ptr [00002F9Ah]
                        dec eax
                        lea ecx, dword ptr [0001C49Bh]
                        dec eax
                        add esp, 20h
                        pop ebx
                        dec eax
                        jmp dword ptr [00002DCFh]
                        int3
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        lea ecx, dword ptr [0001C484h]
                        call dword ptr [00002DAEh]
                        cmp dword ptr [ebx], 00000000h
                        jne 00007FE4A48F62F4h
                        or dword ptr [ebx], FFFFFFFFh
                        jmp 00007FE4A48F6317h
                        inc ebp
                        xor ecx, ecx
                        dec eax
                        lea edx, dword ptr [0001C46Ah]
                        inc ecx
                        or eax, FFFFFFFFh
                        dec eax
                        lea ecx, dword ptr [0001C457h]
                        call dword ptr [00002F29h]
                        jmp 00007FE4A48F62ABh
                        cmp dword ptr [ebx], FFFFFFFFh
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x7c2b80x1e0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x850000x1e8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x800000x4428.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x528.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x755200x70.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x756000x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x753e00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x660000x990.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x6431c0x6440086e8bf3447559eaf6297b667d427e493False0.5306971828241895data6.3354313196726535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x660000x184aa0x18600856fde56690eff6b5be6891b39a8dfd9False0.38233173076923077data5.600669485538329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x7f0000xec00x4004acac08389ef34030efddca5696dc082False0.3017578125data3.586573501093021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x800000x44280x4600a816d04a2667fb26b29d63d2f93950eaFalse0.4732700892857143data5.721899138805059IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x850000x1e80x200114a35859e65254a8c4077b5732ac14dFalse0.5390625data4.766656762050388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x860000x5280x600ba8a1df2c67b95f5a6f1e01478bb30f4False0.5221354166666666data4.9609386154671755IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_MANIFEST0x850600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                        DLLImport
                        KERNEL32.dllMultiByteToWideChar, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, AcquireSRWLockExclusive, WakeAllConditionVariable, QueryPerformanceFrequency, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, VerSetConditionMask, SleepEx, LeaveCriticalSection, MoveFileExA, FormatMessageA, SetLastError, LocalFree, CloseHandle, GetCurrentProcess, GetProcessHeap, DeleteCriticalSection, HeapDestroy, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, TerminateProcess, IsProcessorFeaturePresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, WaitForSingleObjectEx, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, EnterCriticalSection, GetSystemTimeAsFileTime, GetSystemDirectoryA, InitializeCriticalSectionEx, HeapFree, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, Beep, IsDebuggerPresent, SleepConditionVariableSRW, GetStdHandle, InitializeSListHead, OutputDebugStringW, ReleaseSRWLockExclusive
                        USER32.dllGetWindowLongA, MoveWindow, GetWindowRect, MessageBoxA, SetWindowLongA
                        ADVAPI32.dllCryptEncrypt, GetTokenInformation, GetLengthSid, OpenProcessToken, IsValidSid, CopySid, ConvertSidToStringSidA, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                        SHELL32.dllShellExecuteA
                        MSVCP140.dll?_Random_device@std@@YAIXZ, ?id@?$ctype@D@std@@2V0locale@2@A, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z, ?_Xout_of_range@std@@YAXPEBD@Z, ?uncaught_exception@std@@YA_NXZ, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??Bid@locale@std@@QEAA_KXZ, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Xbad_function_call@std@@YAXXZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?width@ios_base@std@@QEBA_JXZ, ?width@ios_base@std@@QEAA_J_J@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
                        urlmon.dllURLDownloadToFileA
                        Normaliz.dllIdnToAscii
                        WLDAP32.dll
                        CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                        WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, socket
                        USERENV.dllUnloadUserProfile
                        VCRUNTIME140.dll__std_exception_copy, __current_exception, __std_exception_destroy, _CxxThrowException, memcmp, __std_terminate, memcpy, memmove, __C_specific_handler, __current_exception_context, strchr, memchr, strstr, strrchr, memset
                        VCRUNTIME140_1.dll__CxxFrameHandler4
                        api-ms-win-crt-runtime-l1-1-0.dll_resetstkoflw, __sys_nerr, _errno, strerror, _invalid_parameter_noinfo_noreturn, exit, _invalid_parameter_noinfo, _beginthreadex, _getpid, system, _register_thread_local_exe_atexit_callback, _c_exit, __p___argv, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, __p___argc, terminate, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, _set_app_type
                        api-ms-win-crt-heap-l1-1-0.dll_callnewh, realloc, calloc, _set_new_mode, malloc, free
                        api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                        api-ms-win-crt-stdio-l1-1-0.dllfseek, __stdio_common_vfprintf, __acrt_iob_func, ftell, __stdio_common_vsscanf, __p__commode, feof, fputs, fopen, _read, _write, _close, _open, _lseeki64, fclose, fgets, fflush, __stdio_common_vsprintf, fwrite, fputc, _set_fmode, fread
                        api-ms-win-crt-convert-l1-1-0.dllatoi, strtol, strtoul, strtoull, strtod, strtoll
                        api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                        api-ms-win-crt-string-l1-1-0.dllstrncmp, strpbrk, strspn, strncpy, strcmp, _strdup, strcspn, tolower, isupper
                        api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink, _access
                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 29, 2024 19:29:48.894685984 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:48.894742012 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:48.894809961 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:48.912616968 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:48.912643909 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.408215046 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.408289909 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:49.411206007 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:49.411216021 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.411669970 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.414805889 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:49.456501007 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.634783030 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.634879112 CEST44349709104.26.0.5192.168.2.7
                        Aug 29, 2024 19:29:49.634932995 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:49.644041061 CEST49709443192.168.2.7104.26.0.5
                        Aug 29, 2024 19:29:49.644071102 CEST44349709104.26.0.5192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 29, 2024 19:29:48.875948906 CEST6112153192.168.2.71.1.1.1
                        Aug 29, 2024 19:29:48.885786057 CEST53611211.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Aug 29, 2024 19:29:48.875948906 CEST192.168.2.71.1.1.10x2860Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Aug 29, 2024 19:29:48.885786057 CEST1.1.1.1192.168.2.70x2860No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                        Aug 29, 2024 19:29:48.885786057 CEST1.1.1.1192.168.2.70x2860No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                        Aug 29, 2024 19:29:48.885786057 CEST1.1.1.1192.168.2.70x2860No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                        • keyauth.win
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749709104.26.0.54437252C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
                        TimestampBytes transferredDirectionData
                        2024-08-29 17:29:49 UTC128OUTPOST /api/1.1/ HTTP/1.1
                        Host: keyauth.win
                        Accept: */*
                        Content-Length: 54
                        Content-Type: application/x-www-form-urlencoded
                        2024-08-29 17:29:49 UTC54OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 31 2e 30 26 6e 61 6d 65 3d 76 61 6c 6f 72 61 6e 74 70 6c 75 73 26 6f 77 6e 65 72 69 64 3d 75 61 48 51 57 38 46 50 7a 57
                        Data Ascii: type=init&ver=1.0&name=valorantplus&ownerid=uaHQW8FPzW
                        2024-08-29 17:29:49 UTC1107INHTTP/1.1 200 OK
                        Date: Thu, 29 Aug 2024 17:29:49 GMT
                        Content-Type: application/json; charset=UTF-8
                        Content-Length: 418
                        Connection: close
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aLav0uSdr6lrP7fjMut4Oac7ABmvf5rb476a9S15173DtTtmpKF8O7J56oo54rYgHyVfjaKDAgEzYv6PphDzY%2BJwkXOcK8yY2uX6S9G9RvihDsm6SLU3m%2FETpZjs"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Acknowledge: Credit to VaultCord.com
                        X-Powered-By: VaultCord.com
                        content-security-policy: upgrade-insecure-requests
                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                        referrer-policy: strict-origin-when-cross-origin
                        strict-transport-security: max-age=31536000; includeSubDomains
                        x-content-security-policy: img-src *; media-src * data:;
                        x-content-type-options: nosniff
                        x-frame-options: DENY
                        x-xss-protection: 1; mode=block
                        Access-Control-Allow-Headers: *
                        Access-Control-Allow-Methods: *
                        Access-Control-Allow-Origin: *
                        Server: cloudflare
                        CF-RAY: 8bae43f45fc20c90-EWR
                        2024-08-29 17:29:49 UTC262INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69 7a 65 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 65 63 36 35 30 63 36 35 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74
                        Data Ascii: {"success":true,"message":"Initialized","sessionid":"ec650c65","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in lat
                        2024-08-29 17:29:49 UTC156INData Raw: 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 2e 30 22 2c 22 63 75 73 74 6f 6d 65 72 50 61 6e 65 6c 4c 69 6e 6b 22 3a 22 68 74 74 70 73 3a 2f 2f 6b 65 79 61 75 74 68 2e 63 63 2f 70 61 6e 65 6c 2f 62 72 6f 6e 6b 7a 2f 76 61 6c 6f 72 61 6e 74 70 6c 75 73 2f 22 7d 2c 22 6e 65 77 53 65 73 73 69 6f 6e 22 3a 74 72 75 65 2c 22 6e 6f 6e 63 65 22 3a 22 36 65 33 61 61 31 37 63 2d 64 64 65 36 2d 34 36 66 33 2d 61 61 64 65 2d 66 62 66 31 62 64 30 33 65 33 39 39 22 7d
                        Data Ascii: mple","version":"1.0","customerPanelLink":"https://keyauth.cc/panel/bronkz/valorantplus/"},"newSession":true,"nonce":"6e3aa17c-dde6-46f3-aade-fbf1bd03e399"}


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:4
                        Start time:13:29:35
                        Start date:29/08/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe"
                        Imagebase:0x7ff6ce4f0000
                        File size:532'480 bytes
                        MD5 hash:0B1D213E54D820DD3FEFA386AA3E1F43
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:5
                        Start time:13:29:35
                        Start date:29/08/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:7
                        Start time:13:29:35
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /f /im HTTPDebuggerUI.exe
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:9
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /f /im HTTPDebuggerSvc.exe
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:11
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:12
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerPro
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:13
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:15
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:16
                        Start time:13:29:36
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:18
                        Start time:13:29:38
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:19
                        Start time:13:29:38
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:20
                        Start time:13:29:38
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:13:29:38
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:22
                        Start time:13:29:39
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:13:29:39
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:24
                        Start time:13:29:39
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:13:29:39
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:26
                        Start time:13:29:40
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:13:29:40
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:29
                        Start time:13:29:41
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:30
                        Start time:13:29:41
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:31
                        Start time:13:29:42
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:32
                        Start time:13:29:42
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:33
                        Start time:13:29:42
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:34
                        Start time:13:29:42
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:35
                        Start time:13:29:43
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:36
                        Start time:13:29:43
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerPro
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:37
                        Start time:13:29:43
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:38
                        Start time:13:29:44
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerProSdk
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:39
                        Start time:13:29:44
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:40
                        Start time:13:29:44
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:41
                        Start time:13:29:44
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:42
                        Start time:13:29:45
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:43
                        Start time:13:29:45
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:44
                        Start time:13:29:46
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:45
                        Start time:13:29:46
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:46
                        Start time:13:29:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:47
                        Start time:13:29:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerPro
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:48
                        Start time:13:29:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:49
                        Start time:13:29:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerProSdk
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:50
                        Start time:13:29:47
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:51
                        Start time:13:29:48
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:52
                        Start time:13:29:48
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:53
                        Start time:13:29:49
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:54
                        Start time:13:29:49
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:55
                        Start time:13:29:49
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:56
                        Start time:13:29:49
                        Start date:29/08/2024
                        Path:C:\Windows\System32\taskkill.exe
                        Wow64 process (32bit):false
                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        Imagebase:0x7ff62ec50000
                        File size:101'376 bytes
                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:57
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:58
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerPro
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:59
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:60
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:sc stop HTTPDebuggerProSdk
                        Imagebase:0x7ff60ca70000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:61
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:62
                        Start time:13:29:50
                        Start date:29/08/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c cls
                        Imagebase:0x7ff72d4a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:5.2%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:26%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:106
                          execution_graph 48393 7ff6ce50b2db 48394 7ff6ce50b2f1 48393->48394 48395 7ff6ce50b322 48393->48395 48430 7ff6ce522f40 48394->48430 48396 7ff6ce50b3ca 48395->48396 48397 7ff6ce50b320 48395->48397 48399 7ff6ce50b3e4 48396->48399 48402 7ff6ce50b484 48396->48402 48404 7ff6ce50a6b0 292 API calls 48397->48404 48426 7ff6ce50ac2b 48397->48426 48720 7ff6ce5201c0 24 API calls 48399->48720 48400 7ff6ce50b30a 48717 7ff6ce528a40 48400->48717 48405 7ff6ce50a6b0 292 API calls 48402->48405 48402->48426 48404->48426 48405->48426 48406 7ff6ce50b3f1 48408 7ff6ce50a6b0 292 API calls 48406->48408 48409 7ff6ce50b411 48408->48409 48410 7ff6ce50b476 free 48409->48410 48413 7ff6ce50b41a 48409->48413 48410->48426 48411 7ff6ce50bcc3 48748 7ff6ce519320 19 API calls 48411->48748 48414 7ff6ce50b431 48413->48414 48417 7ff6ce50b423 free 48413->48417 48721 7ff6ce51f780 28 API calls 48414->48721 48415 7ff6ce50be50 17 API calls 48415->48426 48416 7ff6ce50bcd2 48417->48426 48422 7ff6ce50b467 free 48422->48426 48423 7ff6ce50b442 48423->48422 48424 7ff6ce50acce 48425 7ff6ce519320 19 API calls 48424->48425 48424->48426 48425->48424 48426->48411 48426->48415 48426->48416 48426->48424 48676 7ff6ce51aba0 48426->48676 48682 7ff6ce519320 19 API calls 48426->48682 48683 7ff6ce50a6b0 48426->48683 48722 7ff6ce514de0 48426->48722 48746 7ff6ce5093d0 15 API calls 48426->48746 48747 7ff6ce528b90 22 API calls 48426->48747 48431 7ff6ce522fd8 48430->48431 48432 7ff6ce523011 free _strdup 48431->48432 48435 7ff6ce52303b 48431->48435 48627 7ff6ce522fee 48431->48627 48432->48435 48432->48627 48436 7ff6ce5230f1 free 48435->48436 48437 7ff6ce523105 48435->48437 48436->48437 48438 7ff6ce523124 48437->48438 48789 7ff6ce51c760 15 API calls 48437->48789 48440 7ff6ce52316f free 48438->48440 48441 7ff6ce5231cd 48438->48441 48438->48627 48443 7ff6ce523182 free 48440->48443 48450 7ff6ce523231 48441->48450 48790 7ff6ce527e30 335 API calls 48441->48790 48451 7ff6ce5232d3 48443->48451 48452 7ff6ce5232fa 48443->48452 48444 7ff6ce523219 48447 7ff6ce523220 free 48444->48447 48444->48450 48447->48627 48448 7ff6ce52326e free 48448->48443 48448->48627 48450->48448 48791 7ff6ce527e30 335 API calls 48450->48791 48451->48452 48792 7ff6ce51c760 15 API calls 48451->48792 48454 7ff6ce5233b6 free 48452->48454 48455 7ff6ce52337e free 48452->48455 48452->48627 48456 7ff6ce5233a5 48454->48456 48802 7ff6ce51c760 15 API calls 48455->48802 48458 7ff6ce5233ed 48456->48458 48464 7ff6ce5233d6 48456->48464 48456->48627 48803 7ff6ce50f5b0 6 API calls 48458->48803 48460 7ff6ce5233f9 48804 7ff6ce5478d0 59 API calls 48460->48804 48462 7ff6ce523412 48462->48464 48462->48627 48463 7ff6ce52365c free 48476 7ff6ce52367f 48463->48476 48493 7ff6ce5233db 48464->48493 48805 7ff6ce510520 free free 48464->48805 48466 7ff6ce5234e8 48468 7ff6ce52352f strchr 48466->48468 48485 7ff6ce523501 48466->48485 48467 7ff6ce523480 48806 7ff6ce50f7b0 26 API calls 48467->48806 48470 7ff6ce523544 strchr 48468->48470 48468->48485 48475 7ff6ce523557 strchr 48470->48475 48470->48485 48471 7ff6ce523787 48480 7ff6ce5237b0 48471->48480 48481 7ff6ce5237eb 48471->48481 48472 7ff6ce52363c 48808 7ff6ce519320 19 API calls 48472->48808 48473 7ff6ce523495 48807 7ff6ce510520 free free 48473->48807 48475->48485 48476->48471 48477 7ff6ce5236b5 48476->48477 48809 7ff6ce525a40 strchr strchr strchr malloc memcpy 48477->48809 48478 7ff6ce5235b5 48478->48472 48478->48485 48811 7ff6ce51c760 15 API calls 48480->48811 48812 7ff6ce51c760 15 API calls 48481->48812 48485->48463 48486 7ff6ce5236bd 48487 7ff6ce5236db 48486->48487 48488 7ff6ce5236d0 free 48486->48488 48486->48627 48490 7ff6ce523706 48487->48490 48494 7ff6ce5236f0 memcpy 48487->48494 48489 7ff6ce52372f 48488->48489 48497 7ff6ce523753 48489->48497 48810 7ff6ce51c760 15 API calls 48489->48810 48492 7ff6ce52370b strchr 48490->48492 48491 7ff6ce5237e9 48491->48497 48520 7ff6ce523a0f 48491->48520 48491->48627 48495 7ff6ce523718 48492->48495 48496 7ff6ce52371b free 48492->48496 48493->48466 48493->48478 48493->48627 48494->48492 48495->48496 48496->48489 48497->48491 48569 7ff6ce52364b 48497->48569 48813 7ff6ce541ef0 23 API calls 48497->48813 48500 7ff6ce523ca0 calloc 48503 7ff6ce523ccf 48500->48503 48500->48627 48501 7ff6ce523a02 48505 7ff6ce541ec0 13 API calls 48501->48505 48502 7ff6ce523a4e 48509 7ff6ce523a8a free 48502->48509 48510 7ff6ce523bde 48502->48510 48511 7ff6ce523aaa 48502->48511 48749 7ff6ce525310 48503->48749 48504 7ff6ce523b08 48824 7ff6ce519320 19 API calls 48504->48824 48505->48569 48508 7ff6ce523867 48508->48501 48508->48627 48814 7ff6ce542030 8 API calls 48508->48814 48823 7ff6ce51c760 15 API calls 48509->48823 48510->48511 48515 7ff6ce523c02 free 48510->48515 48511->48500 48511->48627 48512 7ff6ce523ce3 48521 7ff6ce523d50 48512->48521 48527 7ff6ce523d17 48512->48527 48512->48627 48518 7ff6ce523c2d 48515->48518 48519 7ff6ce523c20 48515->48519 48516 7ff6ce523b21 48524 7ff6ce523bc2 48516->48524 48531 7ff6ce523b7f 48516->48531 48517 7ff6ce523912 48517->48501 48525 7ff6ce52391a 48517->48525 48518->48519 48526 7ff6ce523c40 48518->48526 48828 7ff6ce51c760 15 API calls 48519->48828 48520->48502 48520->48504 48520->48516 48520->48531 48522 7ff6ce523d7e 48521->48522 48523 7ff6ce523d55 48521->48523 48830 7ff6ce524f50 7 API calls 48522->48830 48528 7ff6ce525310 25 API calls 48523->48528 48826 7ff6ce519320 19 API calls 48524->48826 48815 7ff6ce541ec0 48525->48815 48827 7ff6ce51c760 15 API calls 48526->48827 48829 7ff6ce524f50 7 API calls 48527->48829 48548 7ff6ce523d7c 48528->48548 48531->48502 48537 7ff6ce523ba9 48531->48537 48825 7ff6ce519320 19 API calls 48537->48825 48539 7ff6ce523d9b 48545 7ff6ce525310 25 API calls 48539->48545 48539->48548 48539->48627 48541 7ff6ce523d38 free 48541->48548 48542 7ff6ce523922 48542->48520 48543 7ff6ce52394a strstr 48542->48543 48544 7ff6ce5239df 48542->48544 48546 7ff6ce523962 48543->48546 48544->48520 48545->48548 48546->48544 48820 7ff6ce51c830 48546->48820 48549 7ff6ce525310 25 API calls 48548->48549 48548->48627 48550 7ff6ce523f90 free free free 48549->48550 48552 7ff6ce523fce 48550->48552 48550->48627 48551 7ff6ce52418b 48554 7ff6ce5242d1 48551->48554 48551->48627 48834 7ff6ce52b620 _gmtime64 48551->48834 48552->48551 48553 7ff6ce524031 48552->48553 48560 7ff6ce524115 48552->48560 48552->48627 48831 7ff6ce50d3d0 62 API calls 48553->48831 48759 7ff6ce5253b0 48554->48759 48555 7ff6ce524160 48555->48551 48561 7ff6ce524174 48555->48561 48555->48627 48558 7ff6ce5241bd 48562 7ff6ce5241c3 48558->48562 48580 7ff6ce5241d9 48558->48580 48559 7ff6ce524134 48564 7ff6ce525310 25 API calls 48559->48564 48559->48627 48560->48555 48560->48559 48563 7ff6ce525310 25 API calls 48560->48563 48833 7ff6ce524f50 7 API calls 48561->48833 48835 7ff6ce519320 19 API calls 48562->48835 48563->48559 48564->48555 48568 7ff6ce524188 48568->48551 48569->48627 48570 7ff6ce5242df 48571 7ff6ce524310 48570->48571 48578 7ff6ce5246fc 48570->48578 48570->48627 48572 7ff6ce5246a3 48571->48572 48574 7ff6ce524407 48571->48574 48575 7ff6ce524320 48571->48575 48845 7ff6ce524f50 7 API calls 48572->48845 48573 7ff6ce524106 48573->48560 48579 7ff6ce524410 48574->48579 48598 7ff6ce524481 48574->48598 48575->48572 48596 7ff6ce52432a 48575->48596 48577 7ff6ce5246b9 48589 7ff6ce5250c0 62 API calls 48577->48589 48577->48627 48583 7ff6ce525310 25 API calls 48578->48583 48587 7ff6ce524755 48578->48587 48582 7ff6ce525310 25 API calls 48579->48582 48580->48554 48584 7ff6ce51c830 13 API calls 48580->48584 48580->48627 48581 7ff6ce5240fe 48832 7ff6ce50d340 9 API calls 48581->48832 48588 7ff6ce524420 48582->48588 48583->48587 48593 7ff6ce5242a5 48584->48593 48585 7ff6ce524514 48610 7ff6ce5245f1 48585->48610 48626 7ff6ce52452f 48585->48626 48586 7ff6ce524781 48611 7ff6ce524871 48586->48611 48586->48627 48640 7ff6ce5247a4 48586->48640 48587->48586 48594 7ff6ce525310 25 API calls 48587->48594 48587->48627 48603 7ff6ce5250c0 62 API calls 48588->48603 48588->48627 48595 7ff6ce5246dc 48589->48595 48590 7ff6ce52437b 48599 7ff6ce52439f 48590->48599 48590->48627 48837 7ff6ce527940 28 API calls 48590->48837 48591 7ff6ce525310 25 API calls 48597 7ff6ce524078 48591->48597 48836 7ff6ce524f50 7 API calls 48593->48836 48594->48586 48604 7ff6ce5246e6 48595->48604 48605 7ff6ce52445f 48595->48605 48596->48590 48615 7ff6ce525310 25 API calls 48596->48615 48597->48573 48597->48581 48597->48591 48600 7ff6ce525310 25 API calls 48598->48600 48609 7ff6ce5244d0 48598->48609 48838 7ff6ce524f50 7 API calls 48599->48838 48600->48609 48602 7ff6ce525310 25 API calls 48602->48609 48612 7ff6ce524443 48603->48612 48846 7ff6ce519320 19 API calls 48604->48846 48841 7ff6ce520350 17 API calls 48605->48841 48607 7ff6ce524397 48607->48599 48607->48627 48609->48585 48609->48602 48609->48627 48642 7ff6ce5245d5 48610->48642 48842 7ff6ce527940 28 API calls 48610->48842 48655 7ff6ce52481c 48611->48655 48847 7ff6ce527940 28 API calls 48611->48847 48612->48605 48617 7ff6ce524449 48612->48617 48615->48590 48840 7ff6ce519320 19 API calls 48617->48840 48620 7ff6ce5242c7 48620->48554 48620->48627 48623 7ff6ce5243b5 48623->48627 48629 7ff6ce5250c0 62 API calls 48623->48629 48624 7ff6ce5248a7 48634 7ff6ce5248c1 48624->48634 48645 7ff6ce524998 48624->48645 48625 7ff6ce524a31 48855 7ff6ce524f50 7 API calls 48625->48855 48630 7ff6ce52456f strchr 48626->48630 48626->48642 48793 7ff6ce553060 48627->48793 48628 7ff6ce524478 48628->48627 48857 7ff6ce528b90 22 API calls 48628->48857 48633 7ff6ce5243e3 48629->48633 48635 7ff6ce524584 strchr 48630->48635 48654 7ff6ce5245a4 48630->48654 48631 7ff6ce5247e7 strchr 48636 7ff6ce5247fc strchr 48631->48636 48631->48655 48637 7ff6ce5243e9 48633->48637 48638 7ff6ce5243ff 48633->48638 48639 7ff6ce5248ce 48634->48639 48634->48645 48641 7ff6ce524597 strchr 48635->48641 48635->48654 48643 7ff6ce52480f strchr 48636->48643 48636->48655 48839 7ff6ce519320 19 API calls 48637->48839 48856 7ff6ce520350 17 API calls 48638->48856 48848 7ff6ce524f50 7 API calls 48639->48848 48640->48631 48640->48655 48641->48654 48843 7ff6ce524f50 7 API calls 48642->48843 48643->48655 48645->48627 48663 7ff6ce524908 48645->48663 48853 7ff6ce524f50 7 API calls 48645->48853 48646 7ff6ce524630 48646->48627 48651 7ff6ce5250c0 62 API calls 48646->48651 48649 7ff6ce524b05 48649->48627 48858 7ff6ce5194a0 48649->48858 48657 7ff6ce524683 48651->48657 48652 7ff6ce5248e4 48652->48627 48661 7ff6ce52490d 48652->48661 48662 7ff6ce5248f5 48652->48662 48653 7ff6ce5249f3 48769 7ff6ce5250c0 48653->48769 48654->48627 48654->48642 48655->48624 48655->48625 48655->48627 48657->48638 48660 7ff6ce52468d 48657->48660 48844 7ff6ce519320 19 API calls 48660->48844 48667 7ff6ce524954 48661->48667 48669 7ff6ce525310 25 API calls 48661->48669 48849 7ff6ce524f50 7 API calls 48662->48849 48663->48627 48663->48653 48667->48663 48852 7ff6ce524f50 7 API calls 48667->48852 48668 7ff6ce524a1b 48672 7ff6ce524925 48669->48672 48672->48663 48850 7ff6ce524f50 7 API calls 48672->48850 48674 7ff6ce52493c 48674->48667 48851 7ff6ce524f50 7 API calls 48674->48851 48677 7ff6ce51abea 48676->48677 48678 7ff6ce51ac0a 48677->48678 48950 7ff6ce521160 48677->48950 48680 7ff6ce553060 8 API calls 48678->48680 48681 7ff6ce51ac9e 48680->48681 48681->48426 48682->48426 48684 7ff6ce50a6ec 48683->48684 48685 7ff6ce50a7c2 48683->48685 48953 7ff6ce50e900 48684->48953 48687 7ff6ce553060 8 API calls 48685->48687 48689 7ff6ce50a7f7 48687->48689 48688 7ff6ce50a6f7 free free 48690 7ff6ce50a727 48688->48690 48689->48426 48691 7ff6ce50a765 48690->48691 48981 7ff6ce528670 22 API calls 48690->48981 48971 7ff6ce50be50 48691->48971 48694 7ff6ce50a82c 48975 7ff6ce521ed0 48694->48975 48695 7ff6ce50a77f 48695->48685 48695->48694 48982 7ff6ce522890 free free free free 48695->48982 48699 7ff6ce50a85b 48700 7ff6ce50a860 free 48699->48700 48700->48700 48701 7ff6ce50a87e 48700->48701 48702 7ff6ce50a9ab 48701->48702 48704 7ff6ce50a8e7 48701->48704 48703 7ff6ce514de0 90 API calls 48702->48703 48706 7ff6ce50a9dd 48703->48706 48705 7ff6ce51c830 13 API calls 48704->48705 48707 7ff6ce50a946 48705->48707 48986 7ff6ce514f60 292 API calls 48706->48986 48983 7ff6ce5120f0 92 API calls 48707->48983 48710 7ff6ce50a967 48711 7ff6ce50a96b 48710->48711 48712 7ff6ce50a995 48710->48712 48713 7ff6ce5194a0 15 API calls 48711->48713 48985 7ff6ce514f60 292 API calls 48712->48985 48715 7ff6ce50a986 48713->48715 48984 7ff6ce514f60 292 API calls 48715->48984 48718 7ff6ce521160 2 API calls 48717->48718 48719 7ff6ce528a5a 48718->48719 48719->48397 48720->48406 48721->48423 48723 7ff6ce514f1c 48722->48723 48725 7ff6ce514e02 48722->48725 48723->48426 48724 7ff6ce514e2f 48726 7ff6ce521ed0 9 API calls 48724->48726 48725->48723 48725->48724 48995 7ff6ce522890 free free free free 48725->48995 48728 7ff6ce514e42 48726->48728 48992 7ff6ce5446c0 48728->48992 48746->48426 48747->48426 48748->48416 48868 7ff6ce51c8a0 15 API calls 48749->48868 48751 7ff6ce525339 48752 7ff6ce52537a 48751->48752 48753 7ff6ce525341 48751->48753 48755 7ff6ce525387 free free 48752->48755 48756 7ff6ce525399 48752->48756 48869 7ff6ce524f50 7 API calls 48753->48869 48755->48756 48756->48512 48758 7ff6ce525365 free 48758->48512 48760 7ff6ce5253db 48759->48760 48761 7ff6ce525460 strchr 48760->48761 48763 7ff6ce5254c8 _strdup 48760->48763 48766 7ff6ce5256ba 48760->48766 48767 7ff6ce525694 free 48760->48767 48768 7ff6ce525310 25 API calls 48760->48768 48761->48760 48762 7ff6ce525479 strchr 48761->48762 48762->48760 48763->48760 48764 7ff6ce5256d9 48763->48764 48765 7ff6ce5256e3 free free 48764->48765 48764->48766 48765->48766 48766->48570 48767->48760 48768->48760 48770 7ff6ce525122 48769->48770 48771 7ff6ce52518a 48770->48771 48772 7ff6ce525134 48770->48772 48870 7ff6ce519b70 48771->48870 48873 7ff6ce51fa30 malloc 48772->48873 48775 7ff6ce525149 48777 7ff6ce52516f memcpy 48775->48777 48778 7ff6ce525150 48775->48778 48777->48771 48779 7ff6ce525167 48778->48779 48780 7ff6ce525155 free free 48778->48780 48788 7ff6ce524a11 48779->48788 48780->48779 48788->48638 48788->48668 48789->48438 48790->48444 48791->48448 48792->48452 48794 7ff6ce553069 48793->48794 48795 7ff6ce50b2fb 48794->48795 48796 7ff6ce553440 IsProcessorFeaturePresent 48794->48796 48795->48395 48795->48400 48797 7ff6ce553458 48796->48797 48945 7ff6ce553634 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 48797->48945 48799 7ff6ce55346b 48946 7ff6ce55340c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48799->48946 48802->48456 48803->48460 48804->48462 48805->48467 48806->48473 48807->48493 48808->48569 48809->48486 48810->48497 48811->48491 48812->48491 48813->48508 48814->48517 48816 7ff6ce541ee0 48815->48816 48817 7ff6ce541ec5 48815->48817 48816->48542 48947 7ff6ce542ea0 12 API calls 48817->48947 48948 7ff6ce51d1f0 13 API calls 48820->48948 48822 7ff6ce51c863 48822->48544 48823->48511 48824->48569 48825->48569 48826->48569 48827->48511 48828->48511 48829->48541 48830->48539 48831->48597 48832->48573 48833->48568 48834->48558 48835->48569 48836->48620 48837->48607 48838->48623 48839->48627 48840->48569 48841->48628 48842->48654 48843->48646 48844->48569 48845->48577 48846->48569 48847->48655 48848->48652 48849->48663 48850->48674 48851->48667 48852->48663 48853->48663 48855->48645 48856->48628 48857->48649 48859 7ff6ce5195fe 48858->48859 48860 7ff6ce5194a9 48858->48860 48859->48627 48867 7ff6ce519579 48860->48867 48949 7ff6ce51c930 13 API calls 48860->48949 48862 7ff6ce553060 8 API calls 48862->48859 48863 7ff6ce5194fc 48864 7ff6ce519561 48863->48864 48866 7ff6ce51c830 13 API calls 48863->48866 48864->48864 48865 7ff6ce5195ae fwrite fwrite 48864->48865 48864->48867 48865->48867 48866->48864 48867->48862 48868->48751 48869->48758 48876 7ff6ce52f640 48870->48876 48873->48775 48877 7ff6ce52f6b9 malloc 48876->48877 48878 7ff6ce52f692 48876->48878 48879 7ff6ce52f6f9 48877->48879 48880 7ff6ce52f6ac 48877->48880 48878->48877 48878->48880 48881 7ff6ce52f719 memcpy 48879->48881 48882 7ff6ce553060 8 API calls 48880->48882 48890 7ff6ce52f79c 48881->48890 48883 7ff6ce519ba0 48882->48883 48945->48799 48948->48822 48949->48863 48951 7ff6ce5211ad GetTickCount 48950->48951 48952 7ff6ce521172 QueryPerformanceCounter 48950->48952 48951->48678 48952->48678 48954 7ff6ce50e927 48953->48954 48955 7ff6ce50e915 48953->48955 48958 7ff6ce50ea38 EnterCriticalSection LeaveCriticalSection 48954->48958 48959 7ff6ce50eac4 free 48954->48959 48955->48954 48956 7ff6ce50e91b 48955->48956 48987 7ff6ce52c750 WaitForSingleObjectEx CloseHandle 48956->48987 48961 7ff6ce50ea7b 48958->48961 48962 7ff6ce50ea71 CloseHandle 48958->48962 48959->48688 48960 7ff6ce50e920 48960->48954 48963 7ff6ce50ea89 48961->48963 48964 7ff6ce50ea81 48961->48964 48967 7ff6ce50ea9c 48962->48967 48989 7ff6ce50eae0 7 API calls 48963->48989 48988 7ff6ce52c750 WaitForSingleObjectEx CloseHandle 48964->48988 48968 7ff6ce50eab1 closesocket 48967->48968 48990 7ff6ce5094b0 free 48967->48990 48968->48959 48969 7ff6ce50ea92 free 48969->48967 48972 7ff6ce50bea0 48971->48972 48973 7ff6ce50be67 48971->48973 48972->48695 48991 7ff6ce5091a0 17 API calls 48973->48991 48976 7ff6ce521f4a 48975->48976 48980 7ff6ce521ef1 48975->48980 48977 7ff6ce553060 8 API calls 48976->48977 48978 7ff6ce50a83b free 48977->48978 48978->48699 48978->48701 48979 7ff6ce521f13 _time64 48979->48976 48980->48976 48980->48979 48981->48691 48982->48694 48983->48710 48987->48960 48988->48963 48989->48969 48990->48968 48991->48972 48996 7ff6ce547c40 8 API calls 48992->48996 48994 7ff6ce5446d5 48995->48724 48996->48994 48997 7ff6ce535161 48998 7ff6ce535166 48997->48998 49003 7ff6ce5351b3 48997->49003 48999 7ff6ce5351e3 48998->48999 48998->49003 49057 7ff6ce536810 38 API calls 48999->49057 49001 7ff6ce5351e8 49001->49003 49019 7ff6ce5352fc 49001->49019 49002 7ff6ce5351d3 49003->49002 49020 7ff6ce5379b0 65 API calls 49003->49020 49005 7ff6ce535273 49006 7ff6ce535353 49005->49006 49021 7ff6ce54e430 35 API calls 49005->49021 49067 7ff6ce5365b0 free free free free 49006->49067 49009 7ff6ce53528e 49010 7ff6ce5194a0 15 API calls 49009->49010 49011 7ff6ce5352b5 49010->49011 49011->49006 49012 7ff6ce5352bd 49011->49012 49013 7ff6ce535310 49012->49013 49012->49019 49022 7ff6ce535a60 49012->49022 49013->49019 49066 7ff6ce520350 17 API calls 49013->49066 49016 7ff6ce5352e1 49016->49013 49017 7ff6ce5352e7 49016->49017 49017->49019 49058 7ff6ce519f80 49017->49058 49020->49005 49021->49009 49023 7ff6ce535a89 49022->49023 49024 7ff6ce535af0 49022->49024 49026 7ff6ce535a9a 49023->49026 49027 7ff6ce535ab0 49023->49027 49108 7ff6ce51f080 49024->49108 49106 7ff6ce51ef80 403 API calls 49026->49106 49068 7ff6ce51a330 49027->49068 49030 7ff6ce535afd 49037 7ff6ce535b61 49030->49037 49043 7ff6ce535bda 49030->49043 49128 7ff6ce54e430 35 API calls 49030->49128 49031 7ff6ce535aa5 49031->49016 49033 7ff6ce535ac1 49033->49043 49107 7ff6ce5366e0 65 API calls 49033->49107 49035 7ff6ce535c8e 49136 7ff6ce520350 17 API calls 49035->49136 49036 7ff6ce535b92 49038 7ff6ce535bee 49036->49038 49039 7ff6ce535b9e 49036->49039 49037->49035 49037->49036 49037->49043 49052 7ff6ce535bf7 49038->49052 49132 7ff6ce5504c0 _errno strtoll _errno 49038->49132 49129 7ff6ce5363f0 269 API calls 49039->49129 49043->49016 49044 7ff6ce535ae5 49044->49016 49046 7ff6ce535ba8 49046->49043 49130 7ff6ce535f40 26 API calls 49046->49130 49048 7ff6ce535c4e 49048->49043 49135 7ff6ce54e430 35 API calls 49048->49135 49051 7ff6ce535c13 49051->49048 49051->49052 49054 7ff6ce535c39 49051->49054 49052->49048 49134 7ff6ce536780 72 API calls 49052->49134 49053 7ff6ce535bc3 49053->49043 49131 7ff6ce536330 32 API calls 49053->49131 49133 7ff6ce536780 72 API calls 49054->49133 49057->49001 49059 7ff6ce519fc0 closesocket 49058->49059 49062 7ff6ce519f95 49058->49062 49059->49019 49061 7ff6ce519fd6 49437 7ff6ce5094b0 free 49061->49437 49062->49061 49064 7ff6ce519fb1 49062->49064 49436 7ff6ce5094b0 free 49064->49436 49065 7ff6ce519fde 49065->49019 49066->49019 49067->49019 49069 7ff6ce51a388 49068->49069 49081 7ff6ce51a37f 49068->49081 49070 7ff6ce521160 2 API calls 49069->49070 49073 7ff6ce51a3a2 49070->49073 49071 7ff6ce553060 8 API calls 49072 7ff6ce51a8b5 49071->49072 49072->49024 49072->49033 49074 7ff6ce51a419 49073->49074 49075 7ff6ce51a432 49073->49075 49158 7ff6ce519320 19 API calls 49074->49158 49077 7ff6ce51a43c 49075->49077 49104 7ff6ce51a469 49075->49104 49078 7ff6ce51b500 609 API calls 49077->49078 49079 7ff6ce51a44a 49078->49079 49079->49081 49082 7ff6ce51b610 51 API calls 49079->49082 49080 7ff6ce529990 19 API calls 49080->49104 49081->49071 49082->49081 49083 7ff6ce51a745 49083->49081 49160 7ff6ce51bc30 614 API calls 49083->49160 49084 7ff6ce51a6b4 SleepEx getsockopt 49086 7ff6ce51a6fc WSAGetLastError 49084->49086 49084->49104 49086->49104 49087 7ff6ce51a656 SleepEx getsockopt 49090 7ff6ce51a69e WSAGetLastError 49087->49090 49087->49104 49088 7ff6ce51a783 49093 7ff6ce51a7db 49088->49093 49096 7ff6ce519f80 2 API calls 49088->49096 49089 7ff6ce51a567 WSASetLastError 49089->49104 49090->49104 49091 7ff6ce5194a0 15 API calls 49091->49104 49092 7ff6ce51a777 49161 7ff6ce505eb0 27 API calls 49092->49161 49137 7ff6ce51b500 49093->49137 49094 7ff6ce51a75e 49094->49081 49094->49092 49096->49093 49098 7ff6ce51a857 49162 7ff6ce519320 19 API calls 49098->49162 49099 7ff6ce51a7f9 49099->49081 49150 7ff6ce51b610 49099->49150 49102 7ff6ce51a428 49102->49081 49104->49080 49104->49083 49104->49084 49104->49087 49104->49088 49104->49089 49104->49091 49105 7ff6ce51bc30 614 API calls 49104->49105 49159 7ff6ce505eb0 27 API calls 49104->49159 49105->49104 49106->49031 49107->49044 49109 7ff6ce51f0b4 49108->49109 49112 7ff6ce51f0cf 49108->49112 49109->49112 49207 7ff6ce513520 49109->49207 49110 7ff6ce51f111 memset 49116 7ff6ce51f143 49110->49116 49112->49110 49114 7ff6ce51f0d5 49112->49114 49113 7ff6ce553060 8 API calls 49115 7ff6ce51f275 49113->49115 49114->49113 49115->49030 49117 7ff6ce51f216 49116->49117 49118 7ff6ce51f19e calloc 49116->49118 49220 7ff6ce51e430 402 API calls 49117->49220 49120 7ff6ce51f1b6 49118->49120 49121 7ff6ce51f1cc 49118->49121 49120->49114 49123 7ff6ce5194a0 15 API calls 49121->49123 49122 7ff6ce51f226 49125 7ff6ce5194a0 15 API calls 49122->49125 49126 7ff6ce51f241 49122->49126 49124 7ff6ce51f1db 49123->49124 49124->49117 49125->49126 49126->49114 49127 7ff6ce51f24b free 49126->49127 49127->49114 49128->49037 49129->49046 49130->49053 49131->49043 49132->49051 49133->49048 49134->49048 49135->49043 49136->49043 49138 7ff6ce51b605 49137->49138 49140 7ff6ce51b517 49137->49140 49138->49099 49139 7ff6ce51b5e7 49165 7ff6ce529df0 581 API calls 49139->49165 49140->49139 49141 7ff6ce51b5ba 49140->49141 49143 7ff6ce51b59c 49140->49143 49164 7ff6ce52a440 608 API calls 49141->49164 49143->49141 49146 7ff6ce51b5a1 49143->49146 49145 7ff6ce51b600 49145->49099 49163 7ff6ce519320 19 API calls 49146->49163 49147 7ff6ce51b5e2 49147->49099 49149 7ff6ce51b5b0 49149->49099 49151 7ff6ce51b63d 49150->49151 49152 7ff6ce51b630 49150->49152 49166 7ff6ce51acb0 49151->49166 49154 7ff6ce528a40 2 API calls 49152->49154 49154->49151 49157 7ff6ce51b655 49157->49081 49158->49102 49159->49104 49160->49094 49161->49098 49162->49102 49163->49149 49164->49147 49165->49145 49167 7ff6ce51ace7 49166->49167 49168 7ff6ce51aee3 49166->49168 49167->49168 49169 7ff6ce51ad01 getpeername 49167->49169 49170 7ff6ce553060 8 API calls 49168->49170 49172 7ff6ce51ad26 WSAGetLastError 49169->49172 49173 7ff6ce51ad5d getsockname 49169->49173 49171 7ff6ce51afca 49170->49171 49196 7ff6ce515a50 15 API calls 49171->49196 49197 7ff6ce505eb0 27 API calls 49172->49197 49175 7ff6ce51ade7 49173->49175 49176 7ff6ce51adb0 WSAGetLastError 49173->49176 49201 7ff6ce519ee0 19 API calls 49175->49201 49199 7ff6ce505eb0 27 API calls 49176->49199 49177 7ff6ce51ad43 49198 7ff6ce519320 19 API calls 49177->49198 49181 7ff6ce51adcd 49200 7ff6ce519320 19 API calls 49181->49200 49182 7ff6ce51ae09 49183 7ff6ce51ae4d 49182->49183 49184 7ff6ce51ae0d _errno _errno 49182->49184 49204 7ff6ce519ee0 19 API calls 49183->49204 49202 7ff6ce505eb0 27 API calls 49184->49202 49188 7ff6ce51ae33 49203 7ff6ce519320 19 API calls 49188->49203 49189 7ff6ce51ae9f 49189->49168 49191 7ff6ce51aea3 _errno _errno 49189->49191 49205 7ff6ce505eb0 27 API calls 49191->49205 49193 7ff6ce51aec9 49206 7ff6ce519320 19 API calls 49193->49206 49195 7ff6ce51ad58 49195->49168 49196->49157 49197->49177 49198->49195 49199->49181 49200->49195 49201->49182 49202->49188 49203->49195 49204->49189 49205->49193 49206->49195 49208 7ff6ce513547 49207->49208 49211 7ff6ce51354e 49207->49211 49257 7ff6ce513f00 memset 49208->49257 49210 7ff6ce51357d 49221 7ff6ce52c7a0 49210->49221 49239 7ff6ce52d430 49210->49239 49211->49210 49212 7ff6ce513574 49211->49212 49214 7ff6ce5135b7 49211->49214 49258 7ff6ce519320 19 API calls 49212->49258 49214->49112 49215 7ff6ce5135a2 49215->49214 49217 7ff6ce528a40 2 API calls 49215->49217 49216 7ff6ce5135c7 49216->49214 49217->49214 49220->49122 49222 7ff6ce52d430 49221->49222 49224 7ff6ce51aba0 10 API calls 49222->49224 49230 7ff6ce52d479 49222->49230 49235 7ff6ce52d4ab 49222->49235 49223 7ff6ce52d5a2 49223->49230 49381 7ff6ce52eb90 67 API calls 49223->49381 49225 7ff6ce52d497 49224->49225 49227 7ff6ce52d58c 49225->49227 49259 7ff6ce52d620 49225->49259 49226 7ff6ce51aba0 10 API calls 49226->49235 49380 7ff6ce519320 19 API calls 49227->49380 49230->49215 49232 7ff6ce52d585 49232->49230 49233 7ff6ce529990 19 API calls 49233->49235 49235->49223 49235->49226 49235->49227 49235->49230 49235->49233 49236 7ff6ce52d56d WSAGetLastError 49235->49236 49238 7ff6ce52d55c 49235->49238 49313 7ff6ce52e400 49235->49313 49379 7ff6ce519320 19 API calls 49236->49379 49238->49227 49238->49230 49240 7ff6ce52d484 49239->49240 49245 7ff6ce52d479 49239->49245 49242 7ff6ce51aba0 10 API calls 49240->49242 49253 7ff6ce52d4ab 49240->49253 49241 7ff6ce52d5a2 49241->49245 49435 7ff6ce52eb90 67 API calls 49241->49435 49243 7ff6ce52d497 49242->49243 49246 7ff6ce52d58c 49243->49246 49248 7ff6ce52d620 74 API calls 49243->49248 49244 7ff6ce51aba0 10 API calls 49244->49253 49245->49215 49434 7ff6ce519320 19 API calls 49246->49434 49248->49253 49250 7ff6ce52d585 49250->49245 49251 7ff6ce529990 19 API calls 49251->49253 49252 7ff6ce52e400 252 API calls 49252->49253 49253->49241 49253->49244 49253->49245 49253->49246 49253->49251 49253->49252 49254 7ff6ce52d56d WSAGetLastError 49253->49254 49256 7ff6ce52d55c 49253->49256 49433 7ff6ce519320 19 API calls 49254->49433 49256->49245 49256->49246 49257->49211 49258->49216 49260 7ff6ce52d692 49259->49260 49382 7ff6ce51c1b0 49260->49382 49263 7ff6ce52d6e1 49265 7ff6ce52d6ea GetModuleHandleA GetProcAddress 49263->49265 49269 7ff6ce52d728 49263->49269 49264 7ff6ce5194a0 15 API calls 49264->49263 49266 7ff6ce52d70c 49265->49266 49265->49269 49267 7ff6ce51c1b0 14 API calls 49266->49267 49268 7ff6ce52d720 49267->49268 49268->49269 49270 7ff6ce51c1b0 14 API calls 49269->49270 49282 7ff6ce52d785 49269->49282 49271 7ff6ce52d781 49270->49271 49272 7ff6ce52d792 49271->49272 49271->49282 49404 7ff6ce519320 19 API calls 49272->49404 49274 7ff6ce52e0b7 49390 7ff6ce52b2b0 49274->49390 49276 7ff6ce553060 8 API calls 49278 7ff6ce52e3bc 49276->49278 49277 7ff6ce52e0cc 49279 7ff6ce52e0df 49277->49279 49281 7ff6ce52b2b0 13 API calls 49277->49281 49278->49235 49283 7ff6ce5194a0 15 API calls 49279->49283 49285 7ff6ce52e0f2 49279->49285 49280 7ff6ce52d8d3 49405 7ff6ce519320 19 API calls 49280->49405 49281->49279 49282->49274 49282->49280 49283->49285 49287 7ff6ce52e13b 49285->49287 49288 7ff6ce5194a0 15 API calls 49285->49288 49286 7ff6ce52e0ae 49286->49274 49292 7ff6ce52e206 49286->49292 49289 7ff6ce52e19d calloc 49287->49289 49288->49287 49290 7ff6ce52e1f7 49289->49290 49291 7ff6ce52e210 49289->49291 49406 7ff6ce519320 19 API calls 49290->49406 49291->49292 49294 7ff6ce52e279 free 49291->49294 49295 7ff6ce52e31c 49291->49295 49292->49276 49296 7ff6ce52e2f6 49294->49296 49297 7ff6ce52e2aa 49294->49297 49298 7ff6ce519be0 48 API calls 49295->49298 49411 7ff6ce5056c0 22 API calls 49296->49411 49300 7ff6ce52e2d0 49297->49300 49301 7ff6ce52e2b2 49297->49301 49302 7ff6ce52e33d 49298->49302 49409 7ff6ce5056c0 22 API calls 49300->49409 49407 7ff6ce5056c0 22 API calls 49301->49407 49302->49292 49413 7ff6ce519320 19 API calls 49302->49413 49303 7ff6ce52e300 49412 7ff6ce519320 19 API calls 49303->49412 49307 7ff6ce52e2b9 49408 7ff6ce519320 19 API calls 49307->49408 49308 7ff6ce52e2da 49410 7ff6ce519320 19 API calls 49308->49410 49310 7ff6ce52d7a1 49310->49292 49315 7ff6ce52e470 49313->49315 49314 7ff6ce52eb6f 49315->49314 49316 7ff6ce52e512 49315->49316 49317 7ff6ce52e4d2 malloc 49315->49317 49318 7ff6ce52e518 malloc 49316->49318 49319 7ff6ce52e563 49316->49319 49317->49314 49317->49316 49318->49314 49318->49319 49320 7ff6ce52e5d0 49319->49320 49321 7ff6ce52e576 realloc 49319->49321 49325 7ff6ce52e615 49320->49325 49415 7ff6ce5196a0 recv 49320->49415 49321->49320 49322 7ff6ce52e592 49321->49322 49418 7ff6ce519320 19 API calls 49322->49418 49326 7ff6ce52e65a malloc 49325->49326 49330 7ff6ce52e86a 49325->49330 49336 7ff6ce52e5a1 49325->49336 49326->49314 49327 7ff6ce52e6f7 memcpy 49326->49327 49328 7ff6ce52e717 free 49327->49328 49327->49336 49335 7ff6ce52e789 49328->49335 49328->49336 49329 7ff6ce553060 8 API calls 49331 7ff6ce52e5bd 49329->49331 49419 7ff6ce519320 19 API calls 49330->49419 49331->49235 49334 7ff6ce52e885 49334->49336 49337 7ff6ce52eafc 49335->49337 49339 7ff6ce52e8ad 49335->49339 49345 7ff6ce52e7a8 49335->49345 49336->49329 49337->49336 49338 7ff6ce52eb0a 49337->49338 49431 7ff6ce5056c0 22 API calls 49338->49431 49342 7ff6ce52e8b6 49339->49342 49343 7ff6ce52e8f4 49339->49343 49341 7ff6ce52eb1f 49432 7ff6ce519320 19 API calls 49341->49432 49342->49338 49347 7ff6ce52e8c3 49342->49347 49422 7ff6ce5056c0 22 API calls 49343->49422 49349 7ff6ce52e814 49345->49349 49351 7ff6ce519be0 48 API calls 49345->49351 49355 7ff6ce52e922 49345->49355 49420 7ff6ce5056c0 22 API calls 49347->49420 49356 7ff6ce52e840 memcpy 49349->49356 49360 7ff6ce52e948 49349->49360 49350 7ff6ce52e90b 49423 7ff6ce519320 19 API calls 49350->49423 49351->49345 49352 7ff6ce52e8d8 49421 7ff6ce519320 19 API calls 49352->49421 49424 7ff6ce519320 19 API calls 49355->49424 49356->49330 49356->49360 49358 7ff6ce52ead0 49358->49336 49359 7ff6ce52eaeb 49358->49359 49430 7ff6ce549480 91 API calls 49359->49430 49360->49336 49360->49358 49362 7ff6ce52eaa3 49360->49362 49364 7ff6ce52e9f9 49360->49364 49428 7ff6ce5056c0 22 API calls 49362->49428 49366 7ff6ce52ea6b 49364->49366 49370 7ff6ce52ea07 memset 49364->49370 49365 7ff6ce52eab7 49429 7ff6ce519320 19 API calls 49365->49429 49368 7ff6ce52ea7a CertFreeCertificateContext 49366->49368 49369 7ff6ce52ea80 49366->49369 49368->49369 49369->49358 49372 7ff6ce52ea84 49369->49372 49373 7ff6ce52ea2c 49370->49373 49371 7ff6ce52eac9 49371->49366 49427 7ff6ce519320 19 API calls 49372->49427 49373->49366 49375 7ff6ce52ea3c 49373->49375 49378 7ff6ce52ea56 49373->49378 49375->49378 49425 7ff6ce512a90 253 API calls 49375->49425 49378->49366 49426 7ff6ce519320 19 API calls 49378->49426 49379->49232 49380->49232 49381->49230 49383 7ff6ce51c1dd 49382->49383 49384 7ff6ce51c28f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 49383->49384 49387 7ff6ce51c1f5 49383->49387 49385 7ff6ce51c2d2 VerSetConditionMask 49384->49385 49386 7ff6ce51c2e4 VerifyVersionInfoA 49384->49386 49385->49386 49386->49387 49388 7ff6ce553060 8 API calls 49387->49388 49389 7ff6ce51c31b 49388->49389 49389->49263 49389->49264 49391 7ff6ce52b2bc 49390->49391 49396 7ff6ce52b2e6 49390->49396 49392 7ff6ce52b2c1 _errno 49391->49392 49401 7ff6ce52b2d7 49391->49401 49392->49277 49393 7ff6ce52b3a7 49393->49277 49394 7ff6ce52b340 strchr 49394->49396 49395 7ff6ce52b450 strchr 49398 7ff6ce52b470 strchr 49395->49398 49395->49401 49396->49393 49396->49394 49397 7ff6ce553060 8 API calls 49399 7ff6ce52b5b6 49397->49399 49398->49401 49399->49277 49400 7ff6ce52b565 49403 7ff6ce52b4fd 49400->49403 49414 7ff6ce52b300 strchr 49400->49414 49401->49395 49401->49400 49401->49403 49403->49397 49404->49310 49405->49286 49406->49292 49407->49307 49408->49310 49409->49308 49410->49310 49411->49303 49412->49310 49413->49292 49414->49403 49416 7ff6ce5196bb WSAGetLastError 49415->49416 49417 7ff6ce5196e2 49415->49417 49416->49325 49417->49325 49418->49336 49419->49334 49420->49352 49421->49334 49422->49350 49423->49334 49424->49334 49425->49378 49426->49366 49427->49334 49428->49365 49429->49371 49430->49334 49431->49341 49432->49334 49433->49250 49434->49250 49435->49245 49436->49059 49437->49065 49438 7ff6ce50af20 49439 7ff6ce50af31 49438->49439 49466 7ff6ce521dd0 49439->49466 49441 7ff6ce50af65 49442 7ff6ce50af97 49441->49442 49443 7ff6ce5194a0 15 API calls 49441->49443 49494 7ff6ce522820 314 API calls 49442->49494 49445 7ff6ce50af91 49443->49445 49445->49442 49447 7ff6ce50afa7 49445->49447 49446 7ff6ce50afa4 49446->49447 49470 7ff6ce50bed0 49447->49470 49454 7ff6ce50ac2b 49455 7ff6ce50bcd2 49454->49455 49456 7ff6ce50bcc3 49454->49456 49458 7ff6ce50be50 17 API calls 49454->49458 49460 7ff6ce514de0 90 API calls 49454->49460 49461 7ff6ce51aba0 10 API calls 49454->49461 49462 7ff6ce50acce 49454->49462 49465 7ff6ce50a6b0 292 API calls 49454->49465 49492 7ff6ce519320 19 API calls 49454->49492 49495 7ff6ce5093d0 15 API calls 49454->49495 49496 7ff6ce528b90 22 API calls 49454->49496 49497 7ff6ce519320 19 API calls 49456->49497 49458->49454 49460->49454 49461->49454 49462->49454 49463 7ff6ce519320 19 API calls 49462->49463 49463->49462 49465->49454 49467 7ff6ce521dfa 49466->49467 49498 7ff6ce522900 49467->49498 49469 7ff6ce521e19 49469->49441 49478 7ff6ce50bf36 49470->49478 49471 7ff6ce50c2b8 memcpy memcpy 49472 7ff6ce50c1a0 49471->49472 49473 7ff6ce553060 8 API calls 49472->49473 49475 7ff6ce50afb2 49473->49475 49474 7ff6ce50c1aa 49474->49471 49477 7ff6ce50c2b4 49474->49477 49519 7ff6ce521780 free 49474->49519 49475->49454 49486 7ff6ce5224f0 49475->49486 49476 7ff6ce50c07e calloc 49476->49472 49479 7ff6ce50c098 49476->49479 49477->49471 49478->49474 49478->49476 49478->49479 49479->49472 49479->49478 49481 7ff6ce5214b0 malloc memcpy 49479->49481 49482 7ff6ce50c197 free 49479->49482 49483 7ff6ce50c18f 49479->49483 49513 7ff6ce5217f0 49479->49513 49481->49479 49482->49472 49518 7ff6ce521780 free 49483->49518 49487 7ff6ce522509 49486->49487 49520 7ff6ce515840 49487->49520 49489 7ff6ce522520 49490 7ff6ce514de0 90 API calls 49489->49490 49491 7ff6ce50aebc 49489->49491 49490->49491 49491->49454 49493 7ff6ce51ef30 free 49491->49493 49492->49454 49493->49454 49494->49446 49495->49454 49496->49454 49497->49455 49500 7ff6ce522940 49498->49500 49499 7ff6ce52297b 49502 7ff6ce51c830 13 API calls 49499->49502 49500->49499 49501 7ff6ce522966 tolower 49500->49501 49501->49499 49501->49501 49503 7ff6ce522992 49502->49503 49504 7ff6ce5229fc 49503->49504 49506 7ff6ce5229d8 tolower 49503->49506 49512 7ff6ce522a71 49503->49512 49505 7ff6ce522a36 _time64 49504->49505 49504->49512 49507 7ff6ce522a55 49505->49507 49505->49512 49508 7ff6ce51c830 13 API calls 49506->49508 49511 7ff6ce5194a0 15 API calls 49507->49511 49507->49512 49508->49504 49509 7ff6ce553060 8 API calls 49510 7ff6ce522a9c 49509->49510 49510->49469 49511->49512 49512->49509 49514 7ff6ce5218a6 49513->49514 49515 7ff6ce521807 49513->49515 49514->49479 49515->49514 49516 7ff6ce521827 malloc 49515->49516 49517 7ff6ce521856 49516->49517 49517->49479 49518->49482 49519->49474 49521 7ff6ce528a40 2 API calls 49520->49521 49522 7ff6ce515865 49521->49522 49523 7ff6ce515875 49522->49523 49524 7ff6ce5158c9 49522->49524 49525 7ff6ce51589e free 49522->49525 49523->49489 49527 7ff6ce521160 2 API calls 49524->49527 49529 7ff6ce5158d5 49524->49529 49555 7ff6ce51c760 15 API calls 49525->49555 49528 7ff6ce5158ff 49527->49528 49530 7ff6ce515941 49528->49530 49531 7ff6ce515913 49528->49531 49529->49489 49533 7ff6ce528a40 2 API calls 49530->49533 49544 7ff6ce51a130 49531->49544 49535 7ff6ce51594e 49533->49535 49534 7ff6ce515929 49536 7ff6ce515931 49534->49536 49538 7ff6ce521160 2 API calls 49534->49538 49537 7ff6ce528a40 2 API calls 49535->49537 49539 7ff6ce515971 49535->49539 49536->49489 49537->49539 49541 7ff6ce515a04 49538->49541 49540 7ff6ce51acb0 47 API calls 49539->49540 49542 7ff6ce51598a 49540->49542 49541->49489 49542->49534 49543 7ff6ce5194a0 15 API calls 49542->49543 49543->49534 49545 7ff6ce521160 2 API calls 49544->49545 49546 7ff6ce51a153 49545->49546 49547 7ff6ce51a1cb 49546->49547 49550 7ff6ce51a1e4 49546->49550 49621 7ff6ce519320 19 API calls 49547->49621 49549 7ff6ce51a1da 49554 7ff6ce51a2f1 49549->49554 49551 7ff6ce51a2ed 49550->49551 49556 7ff6ce51b670 49550->49556 49551->49554 49622 7ff6ce5091a0 17 API calls 49551->49622 49554->49534 49555->49524 49557 7ff6ce51b6df memcpy 49556->49557 49559 7ff6ce51b748 socket 49557->49559 49562 7ff6ce51b71b 49557->49562 49559->49562 49561 7ff6ce553060 8 API calls 49563 7ff6ce51bc1b 49561->49563 49565 7ff6ce51b787 49562->49565 49614 7ff6ce51baa4 49562->49614 49643 7ff6ce528640 ioctlsocket 49562->49643 49563->49550 49564 7ff6ce51bbaa _errno _errno _errno 49648 7ff6ce505eb0 27 API calls 49564->49648 49565->49564 49623 7ff6ce544b70 49565->49623 49568 7ff6ce51bbdb 49649 7ff6ce519320 19 API calls 49568->49649 49569 7ff6ce51b7d4 49569->49564 49571 7ff6ce51b7dd htons 49569->49571 49573 7ff6ce5194a0 15 API calls 49571->49573 49572 7ff6ce51bbf0 49575 7ff6ce519f80 2 API calls 49572->49575 49574 7ff6ce51b7fe 49573->49574 49576 7ff6ce51b879 49574->49576 49577 7ff6ce51b81f setsockopt 49574->49577 49609 7ff6ce51ba85 49575->49609 49582 7ff6ce51c1b0 14 API calls 49576->49582 49586 7ff6ce51b8b1 49576->49586 49577->49576 49578 7ff6ce51b84d WSAGetLastError 49577->49578 49644 7ff6ce505eb0 27 API calls 49578->49644 49579 7ff6ce51b8d2 getsockopt 49583 7ff6ce51b8f9 49579->49583 49584 7ff6ce51b903 setsockopt 49579->49584 49580 7ff6ce51b8b5 49587 7ff6ce51b93a setsockopt 49580->49587 49594 7ff6ce51b979 49580->49594 49582->49586 49583->49580 49583->49584 49584->49580 49585 7ff6ce51b867 49588 7ff6ce5194a0 15 API calls 49585->49588 49586->49579 49586->49580 49589 7ff6ce51b967 49587->49589 49590 7ff6ce51b97e 49587->49590 49588->49576 49592 7ff6ce5194a0 15 API calls 49589->49592 49600 7ff6ce51b9ac WSAIoctl 49590->49600 49591 7ff6ce51ba58 49645 7ff6ce51afe0 594 API calls 49591->49645 49592->49594 49593 7ff6ce51baae 49642 7ff6ce528640 ioctlsocket 49593->49642 49606 7ff6ce51ba47 49594->49606 49610 7ff6ce51ba99 49594->49610 49597 7ff6ce51babb 49599 7ff6ce521160 2 API calls 49597->49599 49598 7ff6ce51ba74 49598->49593 49602 7ff6ce51ba7a 49598->49602 49603 7ff6ce51bac5 49599->49603 49600->49594 49601 7ff6ce51b9f4 WSAGetLastError 49600->49601 49604 7ff6ce5194a0 15 API calls 49601->49604 49605 7ff6ce519f80 2 API calls 49602->49605 49607 7ff6ce51baef 49603->49607 49646 7ff6ce5091a0 17 API calls 49603->49646 49604->49594 49605->49609 49606->49591 49606->49593 49612 7ff6ce51bb38 WSAGetLastError 49607->49612 49613 7ff6ce51bb0f connect 49607->49613 49607->49614 49609->49614 49611 7ff6ce519f80 2 API calls 49610->49611 49611->49614 49612->49614 49615 7ff6ce51bb45 49612->49615 49613->49612 49613->49614 49614->49561 49615->49614 49647 7ff6ce505eb0 27 API calls 49615->49647 49617 7ff6ce51bb61 49618 7ff6ce5194a0 15 API calls 49617->49618 49619 7ff6ce51bb77 49618->49619 49621->49549 49622->49554 49624 7ff6ce544ba9 49623->49624 49625 7ff6ce544b7f 49623->49625 49627 7ff6ce51c830 13 API calls 49624->49627 49626 7ff6ce544b84 _errno 49625->49626 49633 7ff6ce544b97 49625->49633 49626->49569 49629 7ff6ce544c18 49627->49629 49628 7ff6ce544c64 _errno 49630 7ff6ce544c37 49628->49630 49629->49628 49629->49630 49631 7ff6ce553060 8 API calls 49630->49631 49632 7ff6ce544c7f 49631->49632 49632->49569 49634 7ff6ce51c830 13 API calls 49633->49634 49635 7ff6ce544f0a 49633->49635 49637 7ff6ce544e90 49633->49637 49634->49633 49650 7ff6ce544bc0 14 API calls 49635->49650 49638 7ff6ce544eb9 49637->49638 49639 7ff6ce544f23 _errno 49637->49639 49640 7ff6ce553060 8 API calls 49638->49640 49639->49638 49641 7ff6ce544ef7 49640->49641 49641->49569 49642->49597 49643->49565 49644->49585 49645->49598 49646->49607 49647->49617 49648->49568 49649->49572 49650->49637 49651 7ff6ce50e5c0 49652 7ff6ce50e614 49651->49652 49653 7ff6ce50e604 49651->49653 49655 7ff6ce521160 2 API calls 49652->49655 49696 7ff6ce521aa0 49653->49696 49656 7ff6ce50e656 49655->49656 49662 7ff6ce50ec60 calloc 49656->49662 49659 7ff6ce50e67e 49703 7ff6ce519320 19 API calls 49659->49703 49660 7ff6ce50e675 49663 7ff6ce50edee _errno 49662->49663 49664 7ff6ce50ecb1 malloc 49662->49664 49686 7ff6ce50e671 49663->49686 49665 7ff6ce50ed67 49664->49665 49666 7ff6ce50ed3c InitializeCriticalSectionEx 49664->49666 49667 7ff6ce50ed90 free 49665->49667 49668 7ff6ce50ed80 DeleteCriticalSection free 49665->49668 49704 7ff6ce528410 socket 49666->49704 49671 7ff6ce50eda8 49667->49671 49672 7ff6ce50eda3 49667->49672 49668->49667 49675 7ff6ce50edb8 free 49671->49675 49676 7ff6ce50edb2 closesocket 49671->49676 49724 7ff6ce52c030 free free free 49672->49724 49673 7ff6ce50ee16 _strdup 49673->49665 49677 7ff6ce50ee30 free _strdup 49673->49677 49675->49663 49676->49675 49678 7ff6ce50ee7e 49677->49678 49679 7ff6ce50ee52 49677->49679 49680 7ff6ce50ee8a EnterCriticalSection LeaveCriticalSection 49678->49680 49681 7ff6ce50ef01 free 49678->49681 49723 7ff6ce52c700 _beginthreadex 49679->49723 49684 7ff6ce50eeb4 CloseHandle 49680->49684 49685 7ff6ce50eec5 49680->49685 49681->49663 49683 7ff6ce50ee66 49683->49686 49687 7ff6ce50ee6e _errno 49683->49687 49688 7ff6ce50eee8 49684->49688 49689 7ff6ce50eeca 49685->49689 49690 7ff6ce50eed2 49685->49690 49686->49659 49686->49660 49687->49678 49693 7ff6ce50eef8 closesocket 49688->49693 49727 7ff6ce5094b0 free 49688->49727 49725 7ff6ce52c750 WaitForSingleObjectEx CloseHandle 49689->49725 49726 7ff6ce50eae0 7 API calls 49690->49726 49693->49681 49694 7ff6ce50eedb free 49694->49688 49697 7ff6ce521aa9 49696->49697 49698 7ff6ce521abf socket 49696->49698 49697->49652 49699 7ff6ce521adc 49698->49699 49700 7ff6ce521ad5 49698->49700 49701 7ff6ce519f80 2 API calls 49699->49701 49700->49652 49702 7ff6ce521ae6 49701->49702 49702->49652 49703->49660 49705 7ff6ce528460 49704->49705 49706 7ff6ce528465 htonl setsockopt 49704->49706 49709 7ff6ce553060 8 API calls 49705->49709 49707 7ff6ce5285eb closesocket closesocket closesocket 49706->49707 49708 7ff6ce5284c4 bind 49706->49708 49707->49705 49708->49707 49710 7ff6ce5284df getsockname 49708->49710 49711 7ff6ce50ed5f 49709->49711 49710->49707 49712 7ff6ce5284fb listen 49710->49712 49711->49665 49711->49673 49712->49707 49713 7ff6ce528510 socket 49712->49713 49713->49707 49714 7ff6ce52852b connect 49713->49714 49714->49707 49715 7ff6ce528546 accept 49714->49715 49715->49707 49716 7ff6ce528562 49715->49716 49717 7ff6ce51c830 13 API calls 49716->49717 49718 7ff6ce528579 send 49717->49718 49718->49707 49720 7ff6ce5285aa recv 49718->49720 49720->49707 49721 7ff6ce5285c8 memcmp 49720->49721 49721->49707 49722 7ff6ce5285de closesocket 49721->49722 49722->49705 49723->49683 49724->49671 49725->49690 49726->49694 49727->49693 49728 7ff6ce524e40 49729 7ff6ce513520 253 API calls 49728->49729 49730 7ff6ce524e57 49729->49730 49731 7ff6ce50ba65 49732 7ff6ce50ba74 49731->49732 49736 7ff6ce50ba93 49731->49736 49733 7ff6ce50ba85 49732->49733 49734 7ff6ce50be50 17 API calls 49732->49734 49735 7ff6ce50a6b0 292 API calls 49733->49735 49734->49733 49735->49736 49743 7ff6ce50ac2b 49736->49743 49752 7ff6ce5093d0 15 API calls 49736->49752 49738 7ff6ce50be50 17 API calls 49738->49743 49740 7ff6ce50bcd2 49741 7ff6ce50bcc3 49755 7ff6ce519320 19 API calls 49741->49755 49743->49738 49743->49740 49743->49741 49745 7ff6ce514de0 90 API calls 49743->49745 49746 7ff6ce51aba0 10 API calls 49743->49746 49747 7ff6ce50acce 49743->49747 49750 7ff6ce50a6b0 292 API calls 49743->49750 49751 7ff6ce519320 19 API calls 49743->49751 49753 7ff6ce5093d0 15 API calls 49743->49753 49754 7ff6ce528b90 22 API calls 49743->49754 49745->49743 49746->49743 49747->49743 49748 7ff6ce519320 19 API calls 49747->49748 49748->49747 49750->49743 49751->49743 49752->49743 49753->49743 49754->49743 49755->49740 49756 7ff6ce50b7a8 49757 7ff6ce50b7c1 49756->49757 49758 7ff6ce50b84f 49757->49758 49760 7ff6ce50ba24 49757->49760 49797 7ff6ce51fec0 49758->49797 49841 7ff6ce5091a0 17 API calls 49760->49841 49764 7ff6ce50b874 49765 7ff6ce50b910 49764->49765 49769 7ff6ce50b87e 49764->49769 49771 7ff6ce50b8a5 49764->49771 49766 7ff6ce50b9c1 49765->49766 49772 7ff6ce50b918 49765->49772 49795 7ff6ce50ac2b 49766->49795 49840 7ff6ce5091a0 17 API calls 49766->49840 49768 7ff6ce50be50 17 API calls 49768->49795 49773 7ff6ce50a6b0 292 API calls 49769->49773 49775 7ff6ce50a6b0 292 API calls 49771->49775 49772->49771 49776 7ff6ce50b99b free 49772->49776 49777 7ff6ce50b92e 49772->49777 49773->49795 49774 7ff6ce50bcd2 49779 7ff6ce50b8c3 49775->49779 49776->49771 49778 7ff6ce50b93b free 49777->49778 49777->49795 49839 7ff6ce51f780 28 API calls 49778->49839 49838 7ff6ce51f780 28 API calls 49779->49838 49780 7ff6ce50bcc3 49844 7ff6ce519320 19 API calls 49780->49844 49784 7ff6ce50b963 free 49786 7ff6ce50b979 49784->49786 49784->49795 49790 7ff6ce50a6b0 292 API calls 49786->49790 49787 7ff6ce50b8f4 free 49787->49795 49788 7ff6ce514de0 90 API calls 49788->49795 49789 7ff6ce51aba0 10 API calls 49789->49795 49790->49795 49791 7ff6ce50b8d2 49791->49787 49792 7ff6ce50acce 49793 7ff6ce519320 19 API calls 49792->49793 49792->49795 49793->49792 49795->49768 49795->49774 49795->49780 49795->49788 49795->49789 49795->49792 49796 7ff6ce50a6b0 292 API calls 49795->49796 49836 7ff6ce519320 19 API calls 49795->49836 49842 7ff6ce5093d0 15 API calls 49795->49842 49843 7ff6ce528b90 22 API calls 49795->49843 49796->49795 49798 7ff6ce51ff11 49797->49798 49799 7ff6ce51ff5f 49798->49799 49802 7ff6ce529990 19 API calls 49798->49802 49800 7ff6ce51ff66 49799->49800 49801 7ff6ce51ff7d 49799->49801 49878 7ff6ce519320 19 API calls 49800->49878 49811 7ff6ce51ffa9 49801->49811 49845 7ff6ce5205d0 49801->49845 49802->49799 49804 7ff6ce51ffc6 49879 7ff6ce520d20 90 API calls 49804->49879 49805 7ff6ce51ffde 49808 7ff6ce521160 2 API calls 49805->49808 49816 7ff6ce51ffe8 49808->49816 49809 7ff6ce51ffd6 49809->49805 49814 7ff6ce50b863 49809->49814 49810 7ff6ce520058 49880 7ff6ce528b90 22 API calls 49810->49880 49811->49804 49811->49805 49811->49814 49813 7ff6ce520060 49813->49814 49881 7ff6ce529d00 23 API calls 49813->49881 49814->49764 49837 7ff6ce5201c0 24 API calls 49814->49837 49816->49810 49818 7ff6ce5194a0 15 API calls 49816->49818 49817 7ff6ce52007e 49817->49814 49819 7ff6ce520092 49817->49819 49826 7ff6ce520112 49817->49826 49818->49810 49820 7ff6ce51aba0 10 API calls 49819->49820 49822 7ff6ce5200a1 49820->49822 49821 7ff6ce520179 49886 7ff6ce528b90 22 API calls 49821->49886 49822->49814 49825 7ff6ce5200aa 49822->49825 49824 7ff6ce520150 49824->49821 49827 7ff6ce520163 49824->49827 49832 7ff6ce5200fc 49825->49832 49833 7ff6ce5200e1 49825->49833 49826->49821 49826->49824 49828 7ff6ce520137 49826->49828 49885 7ff6ce519320 19 API calls 49827->49885 49884 7ff6ce519320 19 API calls 49828->49884 49831 7ff6ce51ff75 49831->49814 49883 7ff6ce519320 19 API calls 49832->49883 49882 7ff6ce519320 19 API calls 49833->49882 49836->49795 49837->49764 49838->49791 49839->49784 49840->49795 49841->49795 49842->49795 49843->49795 49844->49774 49859 7ff6ce520620 49845->49859 49847 7ff6ce528a40 2 API calls 49847->49859 49848 7ff6ce520b5a 49850 7ff6ce5194a0 15 API calls 49848->49850 49852 7ff6ce520b73 49848->49852 49849 7ff6ce521160 2 API calls 49849->49859 49850->49852 49852->49811 49853 7ff6ce520b37 49853->49848 49855 7ff6ce5194a0 15 API calls 49853->49855 49854 7ff6ce5208b0 49854->49859 49891 7ff6ce519260 fwrite fwrite 49854->49891 49892 7ff6ce519260 fwrite fwrite 49854->49892 49855->49848 49859->49847 49859->49848 49859->49849 49859->49852 49859->49853 49859->49854 49860 7ff6ce520bf1 49859->49860 49862 7ff6ce520b5f 49859->49862 49865 7ff6ce5194a0 15 API calls 49859->49865 49872 7ff6ce52088c 49859->49872 49877 7ff6ce519240 23 API calls 49859->49877 49887 7ff6ce519610 49859->49887 49890 7ff6ce526240 192 API calls 49859->49890 49893 7ff6ce545f40 23 API calls 49859->49893 49894 7ff6ce532a60 23 API calls 49859->49894 49861 7ff6ce520bf6 49860->49861 49864 7ff6ce520c0d 49860->49864 49896 7ff6ce519320 19 API calls 49861->49896 49866 7ff6ce520b67 49862->49866 49867 7ff6ce520b93 49862->49867 49897 7ff6ce519320 19 API calls 49864->49897 49865->49859 49870 7ff6ce5194a0 15 API calls 49866->49870 49895 7ff6ce519320 19 API calls 49867->49895 49868 7ff6ce520b9f 49868->49852 49870->49852 49873 7ff6ce5194a0 15 API calls 49872->49873 49874 7ff6ce520bb8 49873->49874 49876 7ff6ce5194a0 15 API calls 49874->49876 49876->49852 49877->49859 49878->49831 49879->49809 49880->49813 49881->49817 49882->49831 49883->49831 49884->49831 49885->49831 49886->49814 49898 7ff6ce52ef70 49887->49898 49890->49859 49891->49854 49892->49859 49893->49859 49894->49859 49895->49868 49896->49868 49897->49868 49899 7ff6ce52f00e 49898->49899 49900 7ff6ce52efef 49898->49900 49901 7ff6ce52f015 49899->49901 49902 7ff6ce52f032 49899->49902 49900->49899 49903 7ff6ce52eff5 49900->49903 49904 7ff6ce5194a0 15 API calls 49901->49904 49905 7ff6ce52f038 49902->49905 49908 7ff6ce52f051 49902->49908 49906 7ff6ce5194a0 15 API calls 49903->49906 49914 7ff6ce52f004 49904->49914 49907 7ff6ce5194a0 15 API calls 49905->49907 49906->49914 49907->49914 49910 7ff6ce52f080 realloc 49908->49910 49911 7ff6ce52f0ce 49908->49911 49933 7ff6ce52f149 49908->49933 49909 7ff6ce52f4a6 49915 7ff6ce52f5a5 memcpy memcpy 49909->49915 49919 7ff6ce52f5eb 49909->49919 49910->49911 49912 7ff6ce52f0ad 49910->49912 49913 7ff6ce5196a0 2 API calls 49911->49913 49944 7ff6ce519320 19 API calls 49912->49944 49917 7ff6ce52f117 49913->49917 49914->49909 49918 7ff6ce51c1b0 14 API calls 49914->49918 49915->49919 49924 7ff6ce52f13d 49917->49924 49925 7ff6ce52f30e 49917->49925 49917->49933 49921 7ff6ce52f496 49918->49921 49922 7ff6ce553060 8 API calls 49919->49922 49920 7ff6ce52f0c4 49920->49914 49921->49909 49926 7ff6ce5194a0 15 API calls 49921->49926 49923 7ff6ce51966b 49922->49923 49923->49859 49928 7ff6ce5194a0 15 API calls 49924->49928 49927 7ff6ce5194a0 15 API calls 49925->49927 49926->49909 49927->49933 49928->49933 49929 7ff6ce5194a0 15 API calls 49929->49933 49930 7ff6ce5194a0 15 API calls 49930->49914 49931 7ff6ce52d430 253 API calls 49931->49933 49932 7ff6ce52f42e 49932->49914 49932->49930 49933->49914 49933->49929 49933->49931 49933->49932 49934 7ff6ce52f4b7 49933->49934 49935 7ff6ce52f250 realloc 49933->49935 49939 7ff6ce52f29b memcpy 49933->49939 49941 7ff6ce52f2eb memcpy 49933->49941 49934->49932 49937 7ff6ce52f4e6 49934->49937 49935->49933 49936 7ff6ce52f516 49935->49936 49946 7ff6ce519320 19 API calls 49936->49946 49945 7ff6ce5056c0 22 API calls 49937->49945 49939->49933 49941->49933 49942 7ff6ce52f4ff 49943 7ff6ce5194a0 15 API calls 49942->49943 49943->49914 49944->49920 49945->49942 49946->49920 49947 7ff6ce4f18e0 49994 7ff6ce502d90 49947->49994 49949 7ff6ce4f193a 49950 7ff6ce502d90 7 API calls 49949->49950 49951 7ff6ce4f1967 49950->49951 49952 7ff6ce502d90 7 API calls 49951->49952 49953 7ff6ce4f1993 49952->49953 49954 7ff6ce502d90 7 API calls 49953->49954 49955 7ff6ce4f19bf 49954->49955 49956 7ff6ce502d90 7 API calls 49955->49956 49957 7ff6ce4f19eb 49956->49957 49958 7ff6ce502d90 7 API calls 49957->49958 49959 7ff6ce4f1a17 49958->49959 49960 7ff6ce502d90 7 API calls 49959->49960 49961 7ff6ce4f1a43 49960->49961 49962 7ff6ce502d90 7 API calls 49961->49962 49963 7ff6ce4f1a72 49962->49963 49964 7ff6ce502d90 7 API calls 49963->49964 49965 7ff6ce4f1aad 49964->49965 49966 7ff6ce502d90 7 API calls 49965->49966 49967 7ff6ce4f1ae5 49966->49967 49968 7ff6ce502d90 7 API calls 49967->49968 49969 7ff6ce4f1b20 49968->49969 49970 7ff6ce502d90 7 API calls 49969->49970 49971 7ff6ce4f1b58 49970->49971 49972 7ff6ce502d90 7 API calls 49971->49972 49973 7ff6ce4f1b93 49972->49973 49974 7ff6ce502d90 7 API calls 49973->49974 49975 7ff6ce4f1bcb 49974->49975 49976 7ff6ce502d90 7 API calls 49975->49976 49977 7ff6ce4f1c06 49976->49977 49978 7ff6ce502d90 7 API calls 49977->49978 49979 7ff6ce4f1c3e 49978->49979 50011 7ff6ce552cc8 49979->50011 49981 7ff6ce4f1d3b 50020 7ff6ce4f2330 ?_Xlength_error@std@@YAXPEBD 49981->50020 49982 7ff6ce552cc8 std::_Facet_Register 3 API calls 49984 7ff6ce4f1c57 49982->49984 49984->49981 49984->49982 50022 7ff6ce4f53e0 5 API calls 2 library calls 49984->50022 49986 7ff6ce552cc8 std::_Facet_Register 3 API calls 49988 7ff6ce4f1dad _beginthreadex 49986->49988 49990 7ff6ce4f1df5 49988->49990 49992 7ff6ce4f1e13 49988->49992 49991 7ff6ce553060 8 API calls 49990->49991 49993 7ff6ce4f1e0e 49991->49993 49995 7ff6ce502e81 49994->49995 49996 7ff6ce502db6 49994->49996 50023 7ff6ce4f2260 ?_Xlength_error@std@@YAXPEBD 49995->50023 49997 7ff6ce502dc4 memcpy 49996->49997 49998 7ff6ce502ddc 49996->49998 49997->49949 50000 7ff6ce502ded 49998->50000 50001 7ff6ce502e86 49998->50001 50002 7ff6ce502e44 49998->50002 50003 7ff6ce552cc8 std::_Facet_Register 3 API calls 50000->50003 50024 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 50001->50024 50005 7ff6ce502e08 memcpy 50002->50005 50009 7ff6ce552cc8 std::_Facet_Register 3 API calls 50002->50009 50007 7ff6ce502e03 50003->50007 50005->49949 50007->50005 50010 7ff6ce502e3d _invalid_parameter_noinfo_noreturn 50007->50010 50008 7ff6ce502e8c 50009->50005 50010->50002 50012 7ff6ce552ce2 malloc 50011->50012 50013 7ff6ce552cec 50012->50013 50014 7ff6ce552cd3 50012->50014 50013->49984 50014->50012 50015 7ff6ce552cf2 50014->50015 50016 7ff6ce552cfd 50015->50016 50025 7ff6ce553734 _CxxThrowException std::bad_alloc::bad_alloc 50015->50025 50026 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 50016->50026 50019 7ff6ce552d03 50021 7ff6ce4f1d8b 50020->50021 50021->49986 50022->49984 50024->50008 50026->50019 50027 7ff6ce50b12b 50028 7ff6ce50b13e 50027->50028 50029 7ff6ce51f080 405 API calls 50028->50029 50032 7ff6ce50b146 50028->50032 50037 7ff6ce50b1f7 50028->50037 50031 7ff6ce50b17d 50029->50031 50030 7ff6ce50b183 50034 7ff6ce50a6b0 292 API calls 50030->50034 50031->50030 50031->50032 50031->50037 50050 7ff6ce524c80 50031->50050 50047 7ff6ce50ac2b 50032->50047 50069 7ff6ce51ef30 free 50032->50069 50034->50047 50035 7ff6ce50be50 17 API calls 50035->50047 50037->50030 50037->50032 50038 7ff6ce50bcd2 50039 7ff6ce50bcc3 50072 7ff6ce519320 19 API calls 50039->50072 50042 7ff6ce514de0 90 API calls 50042->50047 50043 7ff6ce51aba0 10 API calls 50043->50047 50044 7ff6ce50acce 50045 7ff6ce519320 19 API calls 50044->50045 50044->50047 50045->50044 50047->50035 50047->50038 50047->50039 50047->50042 50047->50043 50047->50044 50048 7ff6ce50a6b0 292 API calls 50047->50048 50068 7ff6ce519320 19 API calls 50047->50068 50070 7ff6ce5093d0 15 API calls 50047->50070 50071 7ff6ce528b90 22 API calls 50047->50071 50048->50047 50051 7ff6ce524cac 50050->50051 50052 7ff6ce51f080 405 API calls 50051->50052 50055 7ff6ce524cb6 50052->50055 50053 7ff6ce553060 8 API calls 50054 7ff6ce524e12 50053->50054 50054->50037 50056 7ff6ce524dcc 50055->50056 50057 7ff6ce524d07 50055->50057 50060 7ff6ce524de6 50055->50060 50058 7ff6ce513520 253 API calls 50056->50058 50056->50060 50059 7ff6ce51c830 13 API calls 50057->50059 50058->50060 50061 7ff6ce524d78 calloc 50059->50061 50060->50053 50062 7ff6ce524d97 50061->50062 50063 7ff6ce524d90 50061->50063 50064 7ff6ce525310 25 API calls 50062->50064 50063->50060 50065 7ff6ce524da6 50064->50065 50065->50060 50066 7ff6ce5250c0 62 API calls 50065->50066 50067 7ff6ce524dc8 50066->50067 50067->50056 50067->50060 50068->50047 50069->50047 50070->50047 50071->50047 50072->50038 50073 7ff6ce5035e0 50076 7ff6ce5048f0 50073->50076 50078 7ff6ce504900 50076->50078 50079 7ff6ce504919 SetConsoleTitleA 50078->50079 50080 7ff6ce50495d _invalid_parameter_noinfo_noreturn 50078->50080 50081 7ff6ce5049c0 50078->50081 50079->50078 50082 7ff6ce502d90 7 API calls 50081->50082 50083 7ff6ce504a1d 50082->50083 50108 7ff6ce503a50 50083->50108 50085 7ff6ce504b65 50087 7ff6ce504b80 50085->50087 50088 7ff6ce504cbb 50085->50088 50086 7ff6ce504a55 rand 50089 7ff6ce504cb6 50086->50089 50105 7ff6ce504a49 50086->50105 50125 7ff6ce4f7670 50087->50125 50140 7ff6ce4f2260 ?_Xlength_error@std@@YAXPEBD 50088->50140 50139 7ff6ce4f5f20 ?_Xout_of_range@std@@YAXPEBD 50089->50139 50092 7ff6ce502d90 7 API calls 50092->50105 50095 7ff6ce504bb8 50096 7ff6ce504bf9 50095->50096 50101 7ff6ce504beb _invalid_parameter_noinfo_noreturn 50095->50101 50099 7ff6ce504c38 50096->50099 50102 7ff6ce504c31 _invalid_parameter_noinfo_noreturn 50096->50102 50097 7ff6ce504adb memcpy 50097->50105 50100 7ff6ce504c86 50099->50100 50106 7ff6ce504c7f _invalid_parameter_noinfo_noreturn 50099->50106 50104 7ff6ce553060 8 API calls 50100->50104 50103 7ff6ce504bf2 _invalid_parameter_noinfo_noreturn 50101->50103 50102->50099 50103->50096 50107 7ff6ce504c9a 50104->50107 50105->50085 50105->50086 50105->50092 50105->50097 50105->50103 50138 7ff6ce503610 9 API calls 2 library calls 50105->50138 50106->50100 50107->50078 50109 7ff6ce503b52 50108->50109 50110 7ff6ce503a89 50108->50110 50141 7ff6ce4f2260 ?_Xlength_error@std@@YAXPEBD 50109->50141 50111 7ff6ce503ab7 50110->50111 50112 7ff6ce503a97 memset 50110->50112 50114 7ff6ce503ac3 50111->50114 50115 7ff6ce503b57 50111->50115 50116 7ff6ce503b1a 50111->50116 50112->50105 50117 7ff6ce552cc8 std::_Facet_Register 3 API calls 50114->50117 50142 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 50115->50142 50119 7ff6ce503b27 memset 50116->50119 50122 7ff6ce552cc8 std::_Facet_Register 3 API calls 50116->50122 50120 7ff6ce503ad9 50117->50120 50119->50105 50123 7ff6ce503b13 _invalid_parameter_noinfo_noreturn 50120->50123 50124 7ff6ce503ade 50120->50124 50121 7ff6ce503b5d 50122->50124 50123->50116 50124->50119 50126 7ff6ce4f76c0 50125->50126 50127 7ff6ce4f773f memcpy memcpy 50125->50127 50128 7ff6ce4f772a 50126->50128 50129 7ff6ce4f7780 50126->50129 50130 7ff6ce4f7708 50126->50130 50127->50095 50131 7ff6ce4f7715 50128->50131 50134 7ff6ce552cc8 std::_Facet_Register 3 API calls 50128->50134 50143 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 50129->50143 50133 7ff6ce552cc8 std::_Facet_Register 3 API calls 50130->50133 50131->50127 50136 7ff6ce4f7710 50133->50136 50134->50131 50135 7ff6ce4f7785 50136->50131 50137 7ff6ce4f7723 _invalid_parameter_noinfo_noreturn 50136->50137 50137->50128 50138->50105 50142->50121 50143->50135 50144 7ff6ce50adec 50145 7ff6ce528a40 2 API calls 50144->50145 50146 7ff6ce50adf9 50145->50146 50147 7ff6ce50ae15 50146->50147 50202 7ff6ce5091a0 17 API calls 50146->50202 50148 7ff6ce50ae31 50147->50148 50203 7ff6ce5091a0 17 API calls 50147->50203 50171 7ff6ce514b40 free free 50148->50171 50152 7ff6ce50ae41 50153 7ff6ce5194a0 15 API calls 50152->50153 50156 7ff6ce50ae97 50152->50156 50163 7ff6ce50ac2b 50152->50163 50154 7ff6ce50ae8b 50153->50154 50155 7ff6ce50be50 17 API calls 50154->50155 50155->50156 50156->50163 50204 7ff6ce51ef30 free 50156->50204 50158 7ff6ce50be50 17 API calls 50158->50163 50160 7ff6ce50bcd2 50161 7ff6ce50bcc3 50207 7ff6ce519320 19 API calls 50161->50207 50163->50158 50163->50160 50163->50161 50165 7ff6ce514de0 90 API calls 50163->50165 50166 7ff6ce51aba0 10 API calls 50163->50166 50167 7ff6ce50acce 50163->50167 50170 7ff6ce50a6b0 292 API calls 50163->50170 50201 7ff6ce519320 19 API calls 50163->50201 50205 7ff6ce5093d0 15 API calls 50163->50205 50206 7ff6ce528b90 22 API calls 50163->50206 50165->50163 50166->50163 50167->50163 50168 7ff6ce519320 19 API calls 50167->50168 50168->50167 50170->50163 50208 7ff6ce514920 50171->50208 50174 7ff6ce514920 292 API calls 50175 7ff6ce514ba6 memset 50174->50175 50241 7ff6ce5162d0 50175->50241 50177 7ff6ce514c6e 50179 7ff6ce514de0 90 API calls 50177->50179 50181 7ff6ce514bed 50177->50181 50179->50181 50180 7ff6ce528a40 2 API calls 50182 7ff6ce514c0f 50180->50182 50181->50152 50182->50181 50183 7ff6ce514c3b free 50182->50183 50184 7ff6ce514c62 50182->50184 50331 7ff6ce51c760 15 API calls 50183->50331 50184->50177 50185 7ff6ce521160 2 API calls 50184->50185 50187 7ff6ce514cb0 50185->50187 50188 7ff6ce514ced 50187->50188 50189 7ff6ce514cc4 50187->50189 50191 7ff6ce528a40 2 API calls 50188->50191 50190 7ff6ce51a130 614 API calls 50189->50190 50192 7ff6ce514cda 50190->50192 50193 7ff6ce514cfa 50191->50193 50192->50177 50194 7ff6ce514da7 50192->50194 50195 7ff6ce514d1d 50193->50195 50196 7ff6ce528a40 2 API calls 50193->50196 50197 7ff6ce521160 2 API calls 50194->50197 50198 7ff6ce51acb0 47 API calls 50195->50198 50196->50195 50197->50181 50199 7ff6ce514d37 50198->50199 50199->50194 50200 7ff6ce5194a0 15 API calls 50199->50200 50200->50194 50201->50163 50202->50147 50203->50148 50204->50163 50205->50163 50206->50163 50207->50160 50209 7ff6ce514b2b 50208->50209 50210 7ff6ce51492f 50208->50210 50209->50174 50210->50209 50332 7ff6ce5093d0 15 API calls 50210->50332 50212 7ff6ce51494d 50214 7ff6ce514961 50212->50214 50333 7ff6ce50a2e0 292 API calls 50212->50333 50216 7ff6ce514972 50214->50216 50334 7ff6ce509fd0 292 API calls 50214->50334 50217 7ff6ce514996 free 50216->50217 50218 7ff6ce5149a3 50216->50218 50217->50218 50335 7ff6ce514f60 292 API calls 50218->50335 50242 7ff6ce516315 50241->50242 50330 7ff6ce516339 50242->50330 50336 7ff6ce515ad0 calloc 50242->50336 50244 7ff6ce51634b 50244->50330 50351 7ff6ce517f40 50244->50351 50245 7ff6ce553060 8 API calls 50246 7ff6ce514bd5 50245->50246 50246->50177 50246->50180 50246->50181 50249 7ff6ce516382 _strdup 50250 7ff6ce516394 50249->50250 50249->50330 50251 7ff6ce5163b2 50250->50251 50252 7ff6ce5163a0 _strdup 50250->50252 50401 7ff6ce516ce0 50251->50401 50252->50251 50252->50330 50256 7ff6ce51c830 13 API calls 50257 7ff6ce516425 50256->50257 50257->50330 50460 7ff6ce517530 50257->50460 50258 7ff6ce516477 50259 7ff6ce5164bc _strdup 50258->50259 50260 7ff6ce5164d2 50258->50260 50258->50330 50259->50260 50259->50330 50261 7ff6ce5164dc _strdup 50260->50261 50262 7ff6ce5164f5 50260->50262 50261->50262 50261->50330 50476 7ff6ce5179a0 50262->50476 50267 7ff6ce516542 50268 7ff6ce516564 50267->50268 50270 7ff6ce515070 38 API calls 50267->50270 50267->50330 50271 7ff6ce515070 38 API calls 50268->50271 50272 7ff6ce516586 50268->50272 50268->50330 50269 7ff6ce515070 38 API calls 50269->50267 50270->50268 50271->50272 50273 7ff6ce51671f 50272->50273 50277 7ff6ce516684 50272->50277 50272->50330 50498 7ff6ce512850 50273->50498 50275 7ff6ce5168ba 50276 7ff6ce512850 8 API calls 50275->50276 50275->50330 50280 7ff6ce5168d1 50276->50280 50278 7ff6ce51670f 50277->50278 50279 7ff6ce5166a4 50277->50279 50282 7ff6ce515140 2 API calls 50278->50282 50578 7ff6ce511790 17 API calls 50279->50578 50280->50330 50522 7ff6ce518400 50280->50522 50282->50330 50283 7ff6ce5166ba 50286 7ff6ce518e70 17 API calls 50283->50286 50283->50330 50294 7ff6ce5166cc 50286->50294 50287 7ff6ce5169c4 50288 7ff6ce5166d2 50288->50330 50294->50288 50579 7ff6ce520350 17 API calls 50294->50579 50330->50245 50331->50184 50332->50212 50333->50214 50334->50216 50337 7ff6ce515b00 calloc 50336->50337 50338 7ff6ce515af5 50336->50338 50339 7ff6ce515b2a 50337->50339 50340 7ff6ce515d71 free 50337->50340 50338->50244 50341 7ff6ce521160 2 API calls 50339->50341 50340->50244 50342 7ff6ce515bc1 50341->50342 50343 7ff6ce521160 2 API calls 50342->50343 50344 7ff6ce515bd5 50343->50344 50345 7ff6ce515d37 _strdup 50344->50345 50346 7ff6ce515dad 50344->50346 50345->50346 50348 7ff6ce515d49 50345->50348 50347 7ff6ce521160 2 API calls 50346->50347 50349 7ff6ce515ded 50347->50349 50350 7ff6ce515d57 free free 50348->50350 50349->50244 50350->50340 50587 7ff6ce518f20 8 API calls 50351->50587 50354 7ff6ce517f67 50591 7ff6ce541eb0 calloc 50354->50591 50355 7ff6ce517f60 50590 7ff6ce541ef0 23 API calls 50355->50590 50358 7ff6ce517f65 50359 7ff6ce517f6c 50358->50359 50364 7ff6ce517fe2 50359->50364 50396 7ff6ce51636c 50359->50396 50592 7ff6ce541b20 tolower 50359->50592 50360 7ff6ce5180a5 50595 7ff6ce542030 8 API calls 50360->50595 50363 7ff6ce517faf 50363->50364 50365 7ff6ce517fc8 50363->50365 50366 7ff6ce517fbb free 50363->50366 50364->50360 50364->50396 50594 7ff6ce542030 8 API calls 50364->50594 50593 7ff6ce51c760 15 API calls 50365->50593 50366->50365 50367 7ff6ce51810c 50596 7ff6ce519320 19 API calls 50367->50596 50371 7ff6ce51808c 50371->50360 50373 7ff6ce518098 free 50371->50373 50371->50396 50372 7ff6ce51811e 50372->50396 50373->50360 50374 7ff6ce5180ce 50374->50367 50375 7ff6ce518144 50374->50375 50374->50396 50597 7ff6ce542030 8 API calls 50375->50597 50377 7ff6ce51816b 50378 7ff6ce518192 50377->50378 50379 7ff6ce518175 _strdup 50377->50379 50378->50396 50598 7ff6ce542030 8 API calls 50378->50598 50379->50378 50379->50396 50381 7ff6ce5181b5 50382 7ff6ce5181bf _strdup 50381->50382 50383 7ff6ce5181d8 50381->50383 50382->50383 50382->50396 50383->50396 50599 7ff6ce542030 8 API calls 50383->50599 50385 7ff6ce5181f8 50386 7ff6ce51828d 50385->50386 50387 7ff6ce518202 _strdup 50385->50387 50386->50396 50600 7ff6ce542030 8 API calls 50386->50600 50387->50386 50387->50396 50389 7ff6ce5182a8 50389->50396 50601 7ff6ce542030 8 API calls 50389->50601 50391 7ff6ce5182dd 50391->50396 50602 7ff6ce542030 8 API calls 50391->50602 50393 7ff6ce518321 50394 7ff6ce518341 strtoul 50393->50394 50395 7ff6ce518325 50393->50395 50394->50395 50395->50396 50603 7ff6ce542030 8 API calls 50395->50603 50396->50249 50396->50250 50396->50330 50398 7ff6ce5183bd _strdup 50398->50396 50399 7ff6ce518380 50399->50398 50399->50399 50604 7ff6ce518ff0 20 API calls 50399->50604 50402 7ff6ce516dfd 50401->50402 50403 7ff6ce516d2d memset memset 50401->50403 50404 7ff6ce516e09 _strdup 50402->50404 50405 7ff6ce516e30 50402->50405 50406 7ff6ce516d78 50403->50406 50407 7ff6ce516d60 strncpy 50403->50407 50404->50405 50408 7ff6ce516e17 50404->50408 50409 7ff6ce516e3c _strdup 50405->50409 50414 7ff6ce516e4f 50405->50414 50410 7ff6ce516d9f 50406->50410 50411 7ff6ce516d84 strncpy 50406->50411 50407->50406 50607 7ff6ce519320 19 API calls 50408->50607 50409->50408 50409->50414 50605 7ff6ce52fa30 malloc strtoul free 50410->50605 50411->50410 50439 7ff6ce516eae 50414->50439 50608 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50414->50608 50416 7ff6ce516dbf 50419 7ff6ce516dec 50416->50419 50606 7ff6ce52fa30 malloc strtoul free 50416->50606 50417 7ff6ce516e26 50420 7ff6ce517357 free free 50417->50420 50418 7ff6ce516e70 50421 7ff6ce516e8c 50418->50421 50609 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50418->50609 50419->50402 50419->50420 50424 7ff6ce553060 8 API calls 50420->50424 50428 7ff6ce5194a0 15 API calls 50421->50428 50421->50439 50423 7ff6ce517111 free 50425 7ff6ce51714e 50423->50425 50426 7ff6ce517121 50423->50426 50429 7ff6ce5163c7 50424->50429 50431 7ff6ce517178 50425->50431 50435 7ff6ce517168 free 50425->50435 50426->50425 50430 7ff6ce517142 free 50426->50430 50428->50439 50429->50256 50429->50257 50429->50330 50430->50425 50436 7ff6ce51717d 50431->50436 50614 7ff6ce517bf0 47 API calls 50431->50614 50432 7ff6ce517006 50432->50423 50433 7ff6ce517059 50432->50433 50437 7ff6ce517040 tolower 50432->50437 50610 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50433->50610 50434 7ff6ce517194 free free free 50446 7ff6ce517187 50434->50446 50435->50431 50436->50446 50457 7ff6ce517231 50436->50457 50615 7ff6ce517bf0 47 API calls 50436->50615 50437->50433 50437->50437 50439->50432 50439->50434 50439->50439 50441 7ff6ce516f1e strchr 50439->50441 50459 7ff6ce516f37 50439->50459 50441->50432 50441->50459 50443 7ff6ce5170bc 50447 7ff6ce5170ef 50443->50447 50612 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50443->50612 50444 7ff6ce5171df free 50444->50436 50444->50446 50445 7ff6ce517213 free 50445->50446 50445->50457 50446->50420 50449 7ff6ce5194a0 15 API calls 50447->50449 50452 7ff6ce51710c 50447->50452 50449->50452 50450 7ff6ce517080 50450->50443 50611 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50450->50611 50451 7ff6ce5170d8 50451->50447 50613 7ff6ce52f8f0 realloc GetEnvironmentVariableA realloc free 50451->50613 50452->50423 50453 7ff6ce516f60 strchr 50453->50459 50456 7ff6ce516f90 strchr 50456->50459 50457->50446 50458 7ff6ce5172a7 free 50457->50458 50458->50446 50459->50432 50459->50434 50459->50453 50459->50456 50461 7ff6ce517594 50460->50461 50462 7ff6ce517561 50460->50462 50463 7ff6ce5175a9 free _strdup 50461->50463 50464 7ff6ce5175cb 50461->50464 50462->50461 50465 7ff6ce517580 50462->50465 50466 7ff6ce517574 free 50462->50466 50463->50464 50475 7ff6ce5176c8 50463->50475 50467 7ff6ce517601 50464->50467 50468 7ff6ce5175df free _strdup 50464->50468 50465->50461 50469 7ff6ce517588 free 50465->50469 50466->50465 50470 7ff6ce51763f 50467->50470 50471 7ff6ce517615 free _strdup 50467->50471 50468->50467 50468->50475 50469->50461 50470->50475 50616 7ff6ce543de0 36 API calls 50470->50616 50471->50470 50471->50475 50473 7ff6ce5176ae 50474 7ff6ce5194a0 15 API calls 50473->50474 50473->50475 50474->50475 50475->50258 50478 7ff6ce5179d0 50476->50478 50479 7ff6ce517aa8 strchr 50478->50479 50481 7ff6ce516507 50478->50481 50483 7ff6ce517b4a free 50478->50483 50484 7ff6ce5194a0 15 API calls 50478->50484 50485 7ff6ce517a77 free 50478->50485 50617 7ff6ce51c760 15 API calls 50478->50617 50618 7ff6ce5177a0 22 API calls 50478->50618 50479->50478 50482 7ff6ce517abd strtol 50479->50482 50481->50330 50486 7ff6ce515070 50481->50486 50482->50478 50483->50478 50484->50478 50485->50478 50485->50483 50488 7ff6ce5150a5 50486->50488 50493 7ff6ce5150bf 50486->50493 50487 7ff6ce553060 8 API calls 50489 7ff6ce5150d1 50487->50489 50488->50493 50619 7ff6ce543d30 18 API calls 50488->50619 50489->50267 50489->50269 50489->50330 50491 7ff6ce5150f8 50492 7ff6ce51510b GetLastError 50491->50492 50491->50493 50620 7ff6ce505ff0 21 API calls 50492->50620 50493->50487 50495 7ff6ce515123 50621 7ff6ce519320 19 API calls 50495->50621 50497 7ff6ce515139 50497->50493 50499 7ff6ce512896 _strdup 50498->50499 50500 7ff6ce5128b5 50498->50500 50499->50500 50501 7ff6ce5128a5 50499->50501 50502 7ff6ce5128e1 50500->50502 50503 7ff6ce5128c2 _strdup 50500->50503 50501->50275 50505 7ff6ce51290d 50502->50505 50506 7ff6ce5128ee _strdup 50502->50506 50503->50502 50504 7ff6ce5128d1 50503->50504 50504->50275 50508 7ff6ce512939 50505->50508 50509 7ff6ce51291a _strdup 50505->50509 50506->50505 50507 7ff6ce5128fd 50506->50507 50507->50275 50511 7ff6ce512946 _strdup 50508->50511 50512 7ff6ce512965 50508->50512 50509->50508 50510 7ff6ce512929 50509->50510 50510->50275 50511->50512 50513 7ff6ce512955 50511->50513 50514 7ff6ce512991 50512->50514 50515 7ff6ce512972 _strdup 50512->50515 50513->50275 50517 7ff6ce51299e _strdup 50514->50517 50519 7ff6ce5129bd 50514->50519 50515->50514 50516 7ff6ce512981 50515->50516 50516->50275 50518 7ff6ce5129ad 50517->50518 50517->50519 50518->50275 50520 7ff6ce5129ca _strdup 50519->50520 50521 7ff6ce5129d9 50519->50521 50520->50521 50521->50275 50523 7ff6ce521160 2 API calls 50522->50523 50532 7ff6ce518413 50523->50532 50524 7ff6ce5168e7 50524->50287 50580 7ff6ce513fb0 15 API calls 50524->50580 50526 7ff6ce521ed0 9 API calls 50526->50532 50527 7ff6ce5446c0 8 API calls 50527->50532 50529 7ff6ce5194a0 15 API calls 50529->50532 50531 7ff6ce519f80 closesocket free 50531->50532 50532->50524 50532->50526 50532->50527 50532->50529 50532->50531 50533 7ff6ce518586 30 API calls 50532->50533 50622 7ff6ce522890 free free free free 50532->50622 50623 7ff6ce5442d0 50532->50623 50626 7ff6ce50e5b0 50532->50626 50640 7ff6ce516250 free free 50533->50640 50578->50283 50579->50278 50588 7ff6ce541ec0 13 API calls 50587->50588 50589 7ff6ce517f54 50588->50589 50589->50354 50589->50355 50590->50358 50592->50363 50593->50364 50594->50371 50595->50374 50596->50372 50597->50377 50598->50381 50599->50385 50600->50389 50601->50391 50602->50393 50603->50399 50604->50398 50605->50416 50606->50419 50607->50417 50608->50418 50609->50421 50610->50450 50611->50443 50612->50451 50613->50447 50614->50444 50615->50445 50616->50473 50617->50478 50618->50478 50619->50491 50620->50495 50621->50497 50622->50532 50627 7ff6ce50ea20 50626->50627 50652 7ff6ce52cb90 50655 7ff6ce545e30 50652->50655 50656 7ff6ce545e3e 50655->50656 50661 7ff6ce52cb99 50655->50661 50657 7ff6ce51c1b0 14 API calls 50656->50657 50658 7ff6ce545e51 50657->50658 50663 7ff6ce51c010 GetModuleHandleA 50658->50663 50660 7ff6ce545e6a 50660->50661 50662 7ff6ce545e76 GetProcAddressForCaller 50660->50662 50662->50661 50664 7ff6ce51c03a GetProcAddress strpbrk 50663->50664 50665 7ff6ce51c032 50663->50665 50666 7ff6ce51c067 50664->50666 50667 7ff6ce51c09e 50664->50667 50665->50660 50670 7ff6ce51c088 LoadLibraryA 50666->50670 50671 7ff6ce51c06f 50666->50671 50668 7ff6ce51c0d6 GetSystemDirectoryA 50667->50668 50669 7ff6ce51c0a3 GetProcAddress 50667->50669 50673 7ff6ce51c198 50668->50673 50674 7ff6ce51c0f0 malloc 50668->50674 50669->50668 50672 7ff6ce51c0b8 LoadLibraryExA 50669->50672 50670->50660 50671->50660 50672->50660 50673->50660 50676 7ff6ce51c18a free 50674->50676 50677 7ff6ce51c11d GetSystemDirectoryA 50674->50677 50676->50673 50677->50676 50678 7ff6ce51c12d 50677->50678 50679 7ff6ce51c176 50678->50679 50680 7ff6ce51c181 LoadLibraryA 50678->50680 50679->50676 50680->50679 50681 7ff6ce52c810 50682 7ff6ce513d80 50681->50682 50683 7ff6ce52c825 50681->50683 50686 7ff6ce52c860 50682->50686 50687 7ff6ce52c8ac 50686->50687 50688 7ff6ce5194a0 15 API calls 50687->50688 50693 7ff6ce52c8f0 50688->50693 50689 7ff6ce52ca65 50692 7ff6ce52ca7f free 50689->50692 50696 7ff6ce52caa2 50689->50696 50690 7ff6ce52caf7 free 50691 7ff6ce52cb30 50690->50691 50694 7ff6ce52cb39 free 50691->50694 50695 7ff6ce52c97c 50691->50695 50692->50696 50693->50689 50697 7ff6ce52c954 50693->50697 50705 7ff6ce52c977 50693->50705 50694->50695 50701 7ff6ce553060 8 API calls 50695->50701 50699 7ff6ce52cad5 50696->50699 50704 7ff6ce52cacc free 50696->50704 50709 7ff6ce5056c0 22 API calls 50697->50709 50699->50690 50699->50691 50700 7ff6ce52c965 50710 7ff6ce519320 19 API calls 50700->50710 50703 7ff6ce513d9c 50701->50703 50704->50699 50705->50689 50705->50695 50706 7ff6ce519be0 48 API calls 50705->50706 50707 7ff6ce52ca24 50706->50707 50707->50689 50708 7ff6ce5194a0 15 API calls 50707->50708 50708->50689 50709->50700 50710->50705 50711 7ff6ce50eb50 50712 7ff6ce51c830 13 API calls 50711->50712 50713 7ff6ce50eb8f 50712->50713 50730 7ff6ce52c080 getaddrinfo 50713->50730 50716 7ff6ce50ebab WSAGetLastError 50718 7ff6ce50ebca 50716->50718 50719 7ff6ce50ebb5 WSAGetLastError 50716->50719 50717 7ff6ce50ebcd EnterCriticalSection 50720 7ff6ce50ebf8 50717->50720 50721 7ff6ce50ebdc LeaveCriticalSection 50717->50721 50718->50717 50719->50717 50723 7ff6ce50ec26 LeaveCriticalSection 50720->50723 50724 7ff6ce50ec02 send 50720->50724 50748 7ff6ce50eae0 7 API calls 50721->50748 50726 7ff6ce50ec36 50723->50726 50724->50723 50725 7ff6ce50ec1d WSAGetLastError 50724->50725 50725->50723 50728 7ff6ce553060 8 API calls 50726->50728 50727 7ff6ce50ebed free 50727->50726 50729 7ff6ce50ec45 50728->50729 50731 7ff6ce50eba5 50730->50731 50734 7ff6ce52c0b3 50730->50734 50731->50716 50731->50717 50732 7ff6ce52c224 WSASetLastError 50732->50731 50733 7ff6ce52c19e 50736 7ff6ce52c1e7 50733->50736 50737 7ff6ce52c1e1 freeaddrinfo 50733->50737 50734->50732 50734->50733 50735 7ff6ce52c109 malloc 50734->50735 50740 7ff6ce52c1cc 50735->50740 50741 7ff6ce52c120 malloc 50735->50741 50738 7ff6ce52c1ec 50736->50738 50739 7ff6ce52c21f 50736->50739 50737->50736 50738->50731 50742 7ff6ce52c1f1 free free free 50738->50742 50739->50731 50739->50732 50740->50733 50743 7ff6ce52c157 memcpy 50741->50743 50744 7ff6ce52c1bb free 50741->50744 50742->50731 50742->50742 50745 7ff6ce52c17e 50743->50745 50746 7ff6ce52c16f _strdup 50743->50746 50744->50733 50745->50734 50746->50745 50747 7ff6ce52c1a0 free free 50746->50747 50747->50733 50748->50727 50749 7ff6ce522590 50750 7ff6ce5225de 50749->50750 50751 7ff6ce522900 18 API calls 50750->50751 50752 7ff6ce5225fb 50751->50752 50753 7ff6ce5194a0 15 API calls 50752->50753 50762 7ff6ce522617 50752->50762 50753->50762 50754 7ff6ce52b2b0 13 API calls 50756 7ff6ce522696 50754->50756 50755 7ff6ce553060 8 API calls 50757 7ff6ce522792 50755->50757 50758 7ff6ce5226bb 50756->50758 50759 7ff6ce52269a 50756->50759 50761 7ff6ce52b2b0 13 API calls 50758->50761 50783 7ff6ce52c260 15 API calls 50759->50783 50764 7ff6ce5226cd 50761->50764 50762->50754 50782 7ff6ce522765 50762->50782 50763 7ff6ce5226af 50763->50758 50765 7ff6ce5227aa 50763->50765 50766 7ff6ce5226d1 50764->50766 50772 7ff6ce5226f2 50764->50772 50767 7ff6ce5227b4 50765->50767 50784 7ff6ce52c260 15 API calls 50766->50784 50788 7ff6ce521b10 27 API calls 50767->50788 50770 7ff6ce5226e6 50770->50765 50770->50772 50771 7ff6ce5227d6 50776 7ff6ce52275e 50771->50776 50789 7ff6ce52c030 free free free 50771->50789 50775 7ff6ce522723 50772->50775 50772->50782 50785 7ff6ce546360 532 API calls 50772->50785 50775->50765 50777 7ff6ce522740 50775->50777 50776->50782 50778 7ff6ce522759 50777->50778 50779 7ff6ce522760 50777->50779 50777->50782 50786 7ff6ce546560 314 API calls 50778->50786 50787 7ff6ce50e7b0 51 API calls 50779->50787 50782->50755 50783->50763 50784->50770 50785->50775 50786->50776 50787->50782 50788->50771 50789->50776 50790 7ff6ce52d9b5 50826 7ff6ce52d9b9 50790->50826 50791 7ff6ce52da87 50792 7ff6ce52daa6 strchr 50791->50792 50793 7ff6ce52df45 calloc 50791->50793 50796 7ff6ce52dc0b 50792->50796 50797 7ff6ce52dabf strncmp 50792->50797 50794 7ff6ce52dfe8 50793->50794 50795 7ff6ce52df6c 50793->50795 50809 7ff6ce52e04a 50794->50809 50810 7ff6ce52e044 CertFreeCertificateContext 50794->50810 50902 7ff6ce519320 19 API calls 50795->50902 50804 7ff6ce52dfcb 50796->50804 50805 7ff6ce52dd1e fopen 50796->50805 50799 7ff6ce52dadc 50797->50799 50800 7ff6ce52db00 strncmp 50797->50800 50802 7ff6ce52dbd9 strchr 50799->50802 50800->50799 50803 7ff6ce52db22 strncmp 50800->50803 50801 7ff6ce52df7b 50806 7ff6ce52df89 CertFreeCertificateContext 50801->50806 50894 7ff6ce52e206 50801->50894 50802->50796 50808 7ff6ce52dbf3 _strdup 50802->50808 50803->50799 50811 7ff6ce52db44 strncmp 50803->50811 50904 7ff6ce519320 19 API calls 50804->50904 50805->50804 50812 7ff6ce52dd37 fseek 50805->50812 50806->50894 50808->50796 50814 7ff6ce52dc13 50808->50814 50816 7ff6ce52e04e 50809->50816 50817 7ff6ce52e0b3 50809->50817 50810->50809 50811->50799 50813 7ff6ce52db63 strncmp 50811->50813 50818 7ff6ce52dd6d 50812->50818 50819 7ff6ce52dd61 ftell 50812->50819 50813->50802 50824 7ff6ce52db7a strncmp 50813->50824 50814->50796 50839 7ff6ce52dc34 CertOpenStore 50814->50839 50815 7ff6ce52da40 strtol 50825 7ff6ce52da62 strchr 50815->50825 50815->50826 50905 7ff6ce5056c0 22 API calls 50816->50905 50832 7ff6ce52b2b0 13 API calls 50817->50832 50822 7ff6ce52df99 fclose 50818->50822 50823 7ff6ce52dd7e fseek 50818->50823 50819->50818 50820 7ff6ce553060 8 API calls 50827 7ff6ce52e3bc 50820->50827 50903 7ff6ce519320 19 API calls 50822->50903 50823->50822 50829 7ff6ce52dd9b malloc 50823->50829 50824->50799 50830 7ff6ce52db99 strncmp 50824->50830 50825->50791 50825->50826 50826->50791 50826->50815 50826->50825 50840 7ff6ce52dae7 50826->50840 50896 7ff6ce52cde0 62 API calls 50826->50896 50828 7ff6ce52e062 50906 7ff6ce519320 19 API calls 50828->50906 50829->50822 50835 7ff6ce52ddb4 fread 50829->50835 50830->50799 50836 7ff6ce52dbb8 strncmp 50830->50836 50838 7ff6ce52e0cc 50832->50838 50835->50822 50842 7ff6ce52ddd2 fclose 50835->50842 50836->50796 50836->50799 50837 7ff6ce52dfb8 free 50837->50894 50843 7ff6ce52e0df 50838->50843 50851 7ff6ce52b2b0 13 API calls 50838->50851 50844 7ff6ce52dc87 free CryptStringToBinaryA 50839->50844 50845 7ff6ce52dc57 GetLastError 50839->50845 50897 7ff6ce519320 19 API calls 50840->50897 50841 7ff6ce52e074 free 50876 7ff6ce52daf6 50841->50876 50841->50894 50848 7ff6ce52ddff malloc 50842->50848 50849 7ff6ce52ddef 50842->50849 50852 7ff6ce5194a0 15 API calls 50843->50852 50858 7ff6ce52e0f2 50843->50858 50846 7ff6ce52df11 CertCloseStore 50844->50846 50847 7ff6ce52dcd2 CertFindCertificateInStore 50844->50847 50898 7ff6ce519320 19 API calls 50845->50898 50846->50894 50854 7ff6ce52df2a CertCloseStore 50847->50854 50855 7ff6ce52dd04 50847->50855 50856 7ff6ce52de19 MultiByteToWideChar 50848->50856 50857 7ff6ce52de43 PFXImportCertStore free free 50848->50857 50849->50848 50851->50843 50852->50858 50854->50793 50855->50846 50856->50857 50865 7ff6ce52deca CertFindCertificateInStore 50857->50865 50866 7ff6ce52de74 GetLastError 50857->50866 50860 7ff6ce5194a0 15 API calls 50858->50860 50863 7ff6ce52e13b 50858->50863 50859 7ff6ce52dc76 free 50859->50894 50860->50863 50862 7ff6ce52e19d calloc 50864 7ff6ce52e1f7 50862->50864 50875 7ff6ce52e210 50862->50875 50863->50862 50907 7ff6ce519320 19 API calls 50864->50907 50868 7ff6ce52df26 50865->50868 50869 7ff6ce52def2 GetLastError 50865->50869 50870 7ff6ce52de89 50866->50870 50871 7ff6ce52deb1 50866->50871 50868->50854 50901 7ff6ce519320 19 API calls 50869->50901 50899 7ff6ce519320 19 API calls 50870->50899 50900 7ff6ce519320 19 API calls 50871->50900 50877 7ff6ce52e279 free 50875->50877 50878 7ff6ce52e31c 50875->50878 50875->50894 50876->50894 50879 7ff6ce52e2f6 50877->50879 50880 7ff6ce52e2aa 50877->50880 50881 7ff6ce519be0 48 API calls 50878->50881 50912 7ff6ce5056c0 22 API calls 50879->50912 50883 7ff6ce52e2d0 50880->50883 50884 7ff6ce52e2b2 50880->50884 50885 7ff6ce52e33d 50881->50885 50910 7ff6ce5056c0 22 API calls 50883->50910 50908 7ff6ce5056c0 22 API calls 50884->50908 50885->50894 50914 7ff6ce519320 19 API calls 50885->50914 50886 7ff6ce52e300 50913 7ff6ce519320 19 API calls 50886->50913 50890 7ff6ce52e2b9 50909 7ff6ce519320 19 API calls 50890->50909 50891 7ff6ce52e2da 50911 7ff6ce519320 19 API calls 50891->50911 50894->50820 50896->50826 50897->50876 50898->50859 50899->50876 50900->50876 50901->50846 50902->50801 50903->50837 50904->50876 50905->50828 50906->50841 50907->50894 50908->50890 50909->50876 50910->50891 50911->50876 50912->50886 50913->50876 50914->50894 50915 7ff6ce553190 50916 7ff6ce5531a9 50915->50916 50917 7ff6ce5532e7 50916->50917 50918 7ff6ce5531b1 __scrt_acquire_startup_lock 50916->50918 51034 7ff6ce55391c 9 API calls 50917->51034 50920 7ff6ce5532f1 50918->50920 50921 7ff6ce5531cf __scrt_release_startup_lock 50918->50921 51035 7ff6ce55391c 9 API calls 50920->51035 50924 7ff6ce5531f4 50921->50924 50926 7ff6ce55327a _get_initial_narrow_environment __p___argv __p___argc 50921->50926 50929 7ff6ce553272 _register_thread_local_exe_atexit_callback 50921->50929 50923 7ff6ce5532fc 50925 7ff6ce553304 _exit 50923->50925 50935 7ff6ce504d00 9 API calls 50926->50935 50929->50926 50936 7ff6ce504ec2 6 API calls 50935->50936 50937 7ff6ce504dcd system system system 50935->50937 51050 7ff6ce504510 50936->51050 51036 7ff6ce504990 50937->51036 50940 7ff6ce504f33 51071 7ff6ce4f36d0 50940->51071 50943 7ff6ce504990 50945 7ff6ce504e52 system system system 50943->50945 50946 7ff6ce504990 50945->50946 50948 7ff6ce504e8c system 50946->50948 51038 7ff6ce4f6080 50948->51038 51034->50920 51035->50923 51037 7ff6ce504996 system system system system 51036->51037 51037->50943 51039 7ff6ce4f60b0 51038->51039 51040 7ff6ce4f6110 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 51039->51040 51041 7ff6ce4f60fd 51039->51041 51040->51041 51043 7ff6ce4f617c ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 51041->51043 51045 7ff6ce4f6134 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 51041->51045 51048 7ff6ce4f6156 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 51041->51048 51044 7ff6ce4f6199 51043->51044 51043->51045 51044->51045 51049 7ff6ce4f61a5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 51044->51049 51046 7ff6ce4f620d ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 51045->51046 51047 7ff6ce4f6217 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z exit 51045->51047 51046->51047 51047->50936 51048->51041 51048->51045 51049->51044 51049->51045 51051 7ff6ce504560 51050->51051 51051->51051 51052 7ff6ce504570 system 51051->51052 51053 7ff6ce5045c0 51052->51053 51053->51053 51054 7ff6ce5045d0 system 51053->51054 51055 7ff6ce504610 51054->51055 51055->51055 51056 7ff6ce504620 system 51055->51056 51057 7ff6ce504680 51056->51057 51057->51057 51058 7ff6ce504690 system 51057->51058 51059 7ff6ce5046e0 51058->51059 51059->51059 51060 7ff6ce5046f0 system 51059->51060 51061 7ff6ce504740 51060->51061 51061->51061 51062 7ff6ce504750 system 51061->51062 51063 7ff6ce5047a0 51062->51063 51063->51063 51064 7ff6ce5047b0 system 51063->51064 51065 7ff6ce504800 51064->51065 51065->51065 51066 7ff6ce504810 system 51065->51066 51067 7ff6ce504860 51066->51067 51067->51067 51068 7ff6ce504870 system 51067->51068 51069 7ff6ce5048c0 51068->51069 51069->51069 51070 7ff6ce5048d0 system 51069->51070 51070->50940 51157 7ff6ce4f3470 51071->51157 51073 7ff6ce4f371a 51074 7ff6ce4f3cd8 51073->51074 51170 7ff6ce4f3d90 51073->51170 51286 7ff6ce4f3d50 7 API calls 51074->51286 51076 7ff6ce4f3d34 Sleep exit 51079 7ff6ce4f3d48 51076->51079 51078 7ff6ce4f379f 51182 7ff6ce4f52a0 51078->51182 51287 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 51079->51287 51082 7ff6ce4f37ac 51189 7ff6ce4f3f00 51082->51189 51083 7ff6ce4f3d4d 51158 7ff6ce4f34c0 51157->51158 51158->51158 51159 7ff6ce4f34d0 system 51158->51159 51160 7ff6ce4f3530 51159->51160 51160->51160 51161 7ff6ce4f3540 system 51160->51161 51162 7ff6ce4f3590 51161->51162 51162->51162 51163 7ff6ce4f35a0 system 51162->51163 51164 7ff6ce4f35e0 51163->51164 51164->51164 51165 7ff6ce4f35f0 system 51164->51165 51166 7ff6ce4f3630 51165->51166 51166->51166 51167 7ff6ce4f3640 system 51166->51167 51168 7ff6ce4f36a0 51167->51168 51168->51168 51169 7ff6ce4f36b0 system 51168->51169 51169->51073 51171 7ff6ce4f3dae 51170->51171 51172 7ff6ce4f3df8 51171->51172 51173 7ff6ce4f5980 7 API calls 51171->51173 51174 7ff6ce4f3e57 51172->51174 51175 7ff6ce4f5980 7 API calls 51172->51175 51173->51172 51288 7ff6ce4f7480 51174->51288 51175->51174 51178 7ff6ce4f3ea6 51180 7ff6ce4f3ee0 _invalid_parameter_noinfo_noreturn 51178->51180 51181 7ff6ce4f3ee7 51178->51181 51179 7ff6ce4f3e9f _invalid_parameter_noinfo_noreturn 51179->51178 51180->51181 51181->51078 51183 7ff6ce4f52bd 51182->51183 51184 7ff6ce4f52d3 memcpy 51183->51184 51185 7ff6ce4f5318 51183->51185 51184->51082 51315 7ff6ce4f6560 9 API calls 2 library calls 51185->51315 51188 7ff6ce4f532b 51188->51082 51190 7ff6ce4f3f1e 51189->51190 51191 7ff6ce4f5980 7 API calls 51190->51191 51192 7ff6ce4f3f68 51190->51192 51191->51192 51316 7ff6ce4f85a0 51192->51316 51286->51076 51287->51083 51289 7ff6ce4f751f 51288->51289 51290 7ff6ce4f74ca 51288->51290 51292 7ff6ce4f7527 memcpy 51289->51292 51299 7ff6ce4f757b 51289->51299 51290->51289 51291 7ff6ce4f74cf memcpy 51290->51291 51298 7ff6ce4f3e6a 51291->51298 51293 7ff6ce4f7564 memcpy 51292->51293 51294 7ff6ce4f7561 51292->51294 51293->51298 51294->51293 51295 7ff6ce4f7661 51314 7ff6ce4f2260 ?_Xlength_error@std@@YAXPEBD 51295->51314 51298->51178 51298->51179 51299->51295 51300 7ff6ce4f75f9 51299->51300 51302 7ff6ce4f765c 51299->51302 51303 7ff6ce4f75d7 51299->51303 51306 7ff6ce552cc8 std::_Facet_Register 3 API calls 51300->51306 51311 7ff6ce4f75e4 memcpy 51300->51311 51313 7ff6ce4f21c0 __std_exception_copy Concurrency::cancel_current_task 51302->51313 51305 7ff6ce552cc8 std::_Facet_Register 3 API calls 51303->51305 51308 7ff6ce4f75df 51305->51308 51306->51311 51308->51311 51312 7ff6ce4f75f2 _invalid_parameter_noinfo_noreturn 51308->51312 51309 7ff6ce4f7633 memcpy 51309->51298 51310 7ff6ce4f7630 51310->51309 51311->51309 51311->51310 51312->51300 51313->51295 51315->51188 51317 7ff6ce4f8665 51316->51317 51320 7ff6ce4f85d0 memcpy memcpy memcpy 51316->51320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$strchr$_strdup$callocmemcpystrstr
                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                          • API String ID: 2045874074-4264080130
                          • Opcode ID: 8f83aba3311d1b321c561d2b37f579abd4217c5cfa5a9480348ccf3bad937963
                          • Instruction ID: e309fea1b35aa8a2244cfab355d16894727ec4919afed5091bb211b69b63c138
                          • Opcode Fuzzy Hash: 8f83aba3311d1b321c561d2b37f579abd4217c5cfa5a9480348ccf3bad937963
                          • Instruction Fuzzy Hash: 1403CD61E0968385FB688F25D4683B927B1AF71B8AF844031EE9DA7795DF3EE445C300

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 689 7ff6ce504d00-7ff6ce504dc7 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode IsDebuggerPresent 690 7ff6ce504ec2-7ff6ce504f4f GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow call 7ff6ce504510 call 7ff6ce4f36d0 689->690 691 7ff6ce504dcd-7ff6ce504ec1 system * 3 call 7ff6ce504990 system * 4 call 7ff6ce504990 system * 3 call 7ff6ce504990 system call 7ff6ce4f6080 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z exit 689->691 700 7ff6ce504f50-7ff6ce504f5e 690->700 691->690 700->700 702 7ff6ce504f60-7ff6ce50514d system GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute 700->702 732 7ff6ce505150-7ff6ce50515e 702->732 732->732 733 7ff6ce505160-7ff6ce505220 call 7ff6ce4f6080 call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 GetStdHandle SetConsoleTextAttribute call 7ff6ce505420 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 732->733 744 7ff6ce505245-7ff6ce50541f system call 7ff6ce504cd0 call 7ff6ce505420 * 2 call 7ff6ce504cd0 call 7ff6ce505420 call 7ff6ce504cd0 call 7ff6ce505420 call 7ff6ce504cd0 call 7ff6ce502cd0 call 7ff6ce504cd0 call 7ff6ce502ca0 call 7ff6ce504cd0 call 7ff6ce502d10 call 7ff6ce502a60 call 7ff6ce4f53e0 call 7ff6ce4f4280 system call 7ff6ce504cd0 call 7ff6ce502d50 Sleep system Beep call 7ff6ce4f53a0 * 2 call 7ff6ce4f5180 * 2 call 7ff6ce552bf0 system * 2 exit 733->744 745 7ff6ce505222-7ff6ce505244 call 7ff6ce553060 733->745
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Console$Handle$system$AttributeText$U?$char_traits@$D@std@@@std@@$Window$?width@ios_base@std@@Mode$V01@$?rdbuf@?$basic_ios@BufferD@std@@@2@InfoLongScreenV?$basic_streambuf@exit$??5?$basic_istream@??6?$basic_ostream@?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?uncaught_exception@std@@BeepDebuggerIpfx@?$basic_istream@MoveOsfx@?$basic_ostream@PresentRectSleepV01@@Vlocale@2@__acrt_iob_func__stdio_common_vfprintf
                          • String ID: Selecione uma opcao: $ Status > Valorant Plus | $##########################################################$##########################################################$C:\Windows\System\winver32.exe$Stop debugging u yerk$Undetected.$[ Coloque sua key: ]$[ Astrix Private Plus ]$[ Selecione uma opcao: ]$cd C:\$cls$http://185.101.104.92/as.exe$start C:\Windows\System\winver32.exe$taskkill /IM ProcessHacker.exe /F$taskkill /IM cheatengine-x86_64.exe /F$taskkill /IM dnSpy.exe /F$taskkill /IM ida.exe /F$taskkill /IM ida64.exe /F$taskkill /IM ollydbg.exe /F$taskkill /IM radare2.exe /F$taskkill /IM x64dbg.exe /F$valorantplus
                          • API String ID: 2248261355-2666367489
                          • Opcode ID: 67d59743ecfa8e3095966c0ec17e486ad83056ec5717fb9159eb6c54ca3e9787
                          • Instruction ID: fa5cf9e8b377605efe2aff2171fdc3e673e5079c80baa0a04d0e180570a63d8c
                          • Opcode Fuzzy Hash: 67d59743ecfa8e3095966c0ec17e486ad83056ec5717fb9159eb6c54ca3e9787
                          • Instruction Fuzzy Hash: 4712F021A1AAC386EA009F64E8341B97371FFA4756FC00135F59EA76E5DFBEE4488740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupstrncmpstrtol
                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                          • API String ID: 707411602-3372543188
                          • Opcode ID: 62ecdbbecd750d5a78154b92169a217d3bfc27757623a547c6e53a1737111044
                          • Instruction ID: 388d5f1c47147e1ce38d4f11ebca2eaf8657b49c812676c6222c8fb194af6e8c
                          • Opcode Fuzzy Hash: 62ecdbbecd750d5a78154b92169a217d3bfc27757623a547c6e53a1737111044
                          • Instruction Fuzzy Hash: 4142AF71A09B4282EB248F25E8646B933B0FF75796F805135EA8EA7790DF3EE544C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 975 7ff6ce51c330-7ff6ce51c34c 976 7ff6ce51c396-7ff6ce51c39d call 7ff6ce545e30 975->976 977 7ff6ce51c34e-7ff6ce51c360 WSAStartup 975->977 986 7ff6ce51c65f-7ff6ce51c676 call 7ff6ce553060 976->986 987 7ff6ce51c3a3-7ff6ce51c3d0 GetModuleHandleA 976->987 979 7ff6ce51c379-7ff6ce51c395 call 7ff6ce553060 977->979 980 7ff6ce51c362-7ff6ce51c369 977->980 983 7ff6ce51c36b-7ff6ce51c371 980->983 984 7ff6ce51c373 WSACleanup 980->984 983->976 983->984 984->979 989 7ff6ce51c3de-7ff6ce51c413 GetProcAddress strpbrk 987->989 990 7ff6ce51c3d2-7ff6ce51c3d9 987->990 993 7ff6ce51c43b-7ff6ce51c43e 989->993 994 7ff6ce51c415-7ff6ce51c41b 989->994 992 7ff6ce51c563-7ff6ce51c657 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 990->992 992->986 997 7ff6ce51c46a-7ff6ce51c481 GetSystemDirectoryA 993->997 998 7ff6ce51c440-7ff6ce51c453 GetProcAddress 993->998 995 7ff6ce51c42d-7ff6ce51c436 LoadLibraryA 994->995 996 7ff6ce51c41d-7ff6ce51c428 994->996 1001 7ff6ce51c52a-7ff6ce51c53c 995->1001 996->1001 999 7ff6ce51c487-7ff6ce51c49a malloc 997->999 1000 7ff6ce51c522 997->1000 998->997 1002 7ff6ce51c455-7ff6ce51c465 LoadLibraryExA 998->1002 1003 7ff6ce51c519-7ff6ce51c51c free 999->1003 1004 7ff6ce51c49c-7ff6ce51c4aa GetSystemDirectoryA 999->1004 1000->1001 1001->992 1005 7ff6ce51c53e-7ff6ce51c55c GetProcAddress 1001->1005 1002->1001 1003->1000 1004->1003 1007 7ff6ce51c4ac-7ff6ce51c4b6 1004->1007 1005->992 1008 7ff6ce51c4c0-7ff6ce51c4c9 1007->1008 1008->1008 1009 7ff6ce51c4cb-7ff6ce51c4d0 1008->1009 1010 7ff6ce51c4d4-7ff6ce51c4db 1009->1010 1010->1010 1011 7ff6ce51c4dd-7ff6ce51c4e6 1010->1011 1012 7ff6ce51c4f0-7ff6ce51c4fc 1011->1012 1012->1012 1013 7ff6ce51c4fe-7ff6ce51c504 1012->1013 1014 7ff6ce51c506-7ff6ce51c50e 1013->1014 1015 7ff6ce51c510 LoadLibraryA 1013->1015 1016 7ff6ce51c516 1014->1016 1015->1016 1016->1003
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                          • API String ID: 2612373469-2794540096
                          • Opcode ID: 673d33687149de1745d9ac90fe4f89c1a679f1b078d88af68f66ad415b7cd04d
                          • Instruction ID: 67240a20a5622cb9d37d9a33812f359f87a1f7312df551939e5a37f47bec83a6
                          • Opcode Fuzzy Hash: 673d33687149de1745d9ac90fe4f89c1a679f1b078d88af68f66ad415b7cd04d
                          • Instruction Fuzzy Hash: 92918325A0D7C282EB64CF11A4243B973B1FBA9B82F844135E9CEA6755EF6EE045C710

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1272 7ff6ce51b670-7ff6ce51b6dd 1273 7ff6ce51b6df 1272->1273 1274 7ff6ce51b6e2-7ff6ce51b6f2 1272->1274 1273->1274 1275 7ff6ce51b701-7ff6ce51b719 memcpy 1274->1275 1276 7ff6ce51b6f4-7ff6ce51b6fc 1274->1276 1277 7ff6ce51b748-7ff6ce51b75b socket 1275->1277 1278 7ff6ce51b71b-7ff6ce51b746 call 7ff6ce509c40 * 2 1275->1278 1276->1275 1279 7ff6ce51b75e-7ff6ce51b76a 1277->1279 1278->1279 1281 7ff6ce51bbff 1279->1281 1282 7ff6ce51b770-7ff6ce51b778 1279->1282 1286 7ff6ce51bc04-7ff6ce51bc2d call 7ff6ce553060 1281->1286 1284 7ff6ce51b787-7ff6ce51b790 1282->1284 1285 7ff6ce51b77a-7ff6ce51b782 call 7ff6ce528640 1282->1285 1288 7ff6ce51b7a0-7ff6ce51b7a9 1284->1288 1289 7ff6ce51b792-7ff6ce51b79d 1284->1289 1285->1284 1292 7ff6ce51b7ab-7ff6ce51b7ae 1288->1292 1293 7ff6ce51b7bc-7ff6ce51b7c0 1288->1293 1289->1288 1296 7ff6ce51bbaa-7ff6ce51bbfd _errno * 3 call 7ff6ce505eb0 call 7ff6ce519320 call 7ff6ce519f80 1292->1296 1297 7ff6ce51b7b4-7ff6ce51b7ba 1292->1297 1298 7ff6ce51b7c5-7ff6ce51b7d7 call 7ff6ce544b70 1293->1298 1296->1286 1297->1298 1298->1296 1305 7ff6ce51b7dd-7ff6ce51b805 htons call 7ff6ce5194a0 1298->1305 1310 7ff6ce51b807-7ff6ce51b80a 1305->1310 1311 7ff6ce51b80c-7ff6ce51b811 1305->1311 1310->1311 1313 7ff6ce51b87e 1310->1313 1311->1313 1314 7ff6ce51b813-7ff6ce51b81d 1311->1314 1316 7ff6ce51b881-7ff6ce51b89d 1313->1316 1315 7ff6ce51b81f-7ff6ce51b84b setsockopt 1314->1315 1314->1316 1317 7ff6ce51b879-7ff6ce51b87c 1315->1317 1318 7ff6ce51b84d-7ff6ce51b874 WSAGetLastError call 7ff6ce505eb0 call 7ff6ce5194a0 1315->1318 1319 7ff6ce51b8cd-7ff6ce51b8d0 1316->1319 1320 7ff6ce51b89f-7ff6ce51b8b3 call 7ff6ce51c1b0 1316->1320 1317->1316 1318->1317 1321 7ff6ce51b8d2-7ff6ce51b8f7 getsockopt 1319->1321 1322 7ff6ce51b924-7ff6ce51b927 1319->1322 1335 7ff6ce51b8c1-7ff6ce51b8cb 1320->1335 1336 7ff6ce51b8b5-7ff6ce51b8bf 1320->1336 1325 7ff6ce51b8f9-7ff6ce51b901 1321->1325 1326 7ff6ce51b903-7ff6ce51b91e setsockopt 1321->1326 1327 7ff6ce51b92d-7ff6ce51b934 1322->1327 1328 7ff6ce51ba0f-7ff6ce51ba16 1322->1328 1325->1322 1325->1326 1326->1322 1327->1328 1333 7ff6ce51b93a-7ff6ce51b965 setsockopt 1327->1333 1331 7ff6ce51ba18-7ff6ce51ba45 call 7ff6ce509c40 * 2 1328->1331 1332 7ff6ce51ba4a-7ff6ce51ba51 1328->1332 1365 7ff6ce51ba47 1331->1365 1366 7ff6ce51ba95-7ff6ce51ba97 1331->1366 1340 7ff6ce51ba58-7ff6ce51ba78 call 7ff6ce544ae0 call 7ff6ce51afe0 1332->1340 1341 7ff6ce51ba53-7ff6ce51ba56 1332->1341 1338 7ff6ce51b967-7ff6ce51b979 call 7ff6ce5194a0 1333->1338 1339 7ff6ce51b97e-7ff6ce51b9f2 call 7ff6ce51bd20 * 2 WSAIoctl 1333->1339 1335->1321 1336->1322 1338->1328 1339->1328 1359 7ff6ce51b9f4-7ff6ce51ba0a WSAGetLastError call 7ff6ce5194a0 1339->1359 1345 7ff6ce51baae-7ff6ce51bad8 call 7ff6ce528640 call 7ff6ce521160 1340->1345 1360 7ff6ce51ba7a-7ff6ce51ba88 call 7ff6ce519f80 1340->1360 1341->1340 1341->1345 1367 7ff6ce51bada-7ff6ce51baea call 7ff6ce5091a0 1345->1367 1368 7ff6ce51baef-7ff6ce51baf2 1345->1368 1359->1328 1360->1281 1375 7ff6ce51ba8e-7ff6ce51ba90 1360->1375 1365->1332 1366->1332 1373 7ff6ce51ba99-7ff6ce51baa9 call 7ff6ce519f80 1366->1373 1367->1368 1370 7ff6ce51baf8-7ff6ce51bb00 1368->1370 1371 7ff6ce51bb9f-7ff6ce51bba8 1368->1371 1370->1371 1374 7ff6ce51bb06-7ff6ce51bb0d 1370->1374 1371->1286 1373->1286 1377 7ff6ce51bb38-7ff6ce51bb43 WSAGetLastError 1374->1377 1378 7ff6ce51bb0f-7ff6ce51bb24 connect 1374->1378 1375->1286 1381 7ff6ce51bb92-7ff6ce51bb94 1377->1381 1382 7ff6ce51bb45-7ff6ce51bb4e 1377->1382 1378->1377 1380 7ff6ce51bb26-7ff6ce51bb28 1378->1380 1383 7ff6ce51bb9b-7ff6ce51bb9d 1380->1383 1384 7ff6ce51bb2a-7ff6ce51bb33 1380->1384 1381->1383 1382->1381 1385 7ff6ce51bb50-7ff6ce51bb90 call 7ff6ce505eb0 call 7ff6ce5194a0 call 7ff6ce519f80 1382->1385 1383->1286 1384->1286 1385->1286
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                          • API String ID: 3453287622-3868455274
                          • Opcode ID: 9901918d985003610e96a397e0676bf6ccac9ccacce26bcac8654692eab6c441
                          • Instruction ID: 7171ebd4c19a93c2dd455deaaf31aea84457118a4eb2fd7e14a7bf18e5ffc810
                          • Opcode Fuzzy Hash: 9901918d985003610e96a397e0676bf6ccac9ccacce26bcac8654692eab6c441
                          • Instruction Fuzzy Hash: 7AF1BE71E0828286E7909F65D4642BE73B0FB54B49F804135FA8DE7AA5DF3EE945CB00

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00007FF6CE502D90: memcpy.VCRUNTIME140(?,?,?,?,00007FF6CE4F1052), ref: 00007FF6CE502DC8
                            • Part of subcall function 00007FF6CE502D90: memcpy.VCRUNTIME140(?,?,?,?,00007FF6CE4F1052), ref: 00007FF6CE502E69
                            • Part of subcall function 00007FF6CE502D90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6CE4F1052), ref: 00007FF6CE502E3D
                            • Part of subcall function 00007FF6CE502D90: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE502E87
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F1DE3
                            • Part of subcall function 00007FF6CE552CC8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE552CF8
                            • Part of subcall function 00007FF6CE552CC8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE552CFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$memcpy$_beginthreadex_invalid_parameter_noinfo_noreturnmalloc
                          • String ID: aqua$black$blue$bright white$green$grey$light aqua$light blue$light green$light purple$light red$light yellow$purple$red$white$yellow
                          • API String ID: 41608588-1613386935
                          • Opcode ID: 2f957afa67e90aada8e42a86225cda717ce7a827b3db9356893e2eeb278857fc
                          • Instruction ID: 0fd3be5ac75d6a8422efc81ba690ec4dc5eed859f2e829d0cf1c10b8c7818664
                          • Opcode Fuzzy Hash: 2f957afa67e90aada8e42a86225cda717ce7a827b3db9356893e2eeb278857fc
                          • Instruction Fuzzy Hash: 48E1BF32914BC689E720CF30E8516EA3374FBA9349F909235F68CA7A55DF79E685C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1947 7ff6ce504510-7ff6ce504556 1948 7ff6ce504560-7ff6ce50456e 1947->1948 1948->1948 1949 7ff6ce504570-7ff6ce5045b9 system 1948->1949 1950 7ff6ce5045c0-7ff6ce5045ce 1949->1950 1950->1950 1951 7ff6ce5045d0-7ff6ce504608 system 1950->1951 1952 7ff6ce504610-7ff6ce50461e 1951->1952 1952->1952 1953 7ff6ce504620-7ff6ce504677 system 1952->1953 1954 7ff6ce504680-7ff6ce50468e 1953->1954 1954->1954 1955 7ff6ce504690-7ff6ce5046d8 system 1954->1955 1956 7ff6ce5046e0-7ff6ce5046ee 1955->1956 1956->1956 1957 7ff6ce5046f0-7ff6ce50473a system 1956->1957 1958 7ff6ce504740-7ff6ce50474e 1957->1958 1958->1958 1959 7ff6ce504750-7ff6ce50479f system 1958->1959 1960 7ff6ce5047a0-7ff6ce5047ae 1959->1960 1960->1960 1961 7ff6ce5047b0-7ff6ce5047ff system 1960->1961 1962 7ff6ce504800-7ff6ce50480e 1961->1962 1962->1962 1963 7ff6ce504810-7ff6ce50485c system 1962->1963 1964 7ff6ce504860-7ff6ce50486e 1963->1964 1964->1964 1965 7ff6ce504870-7ff6ce5048b9 system 1964->1965 1966 7ff6ce5048c0-7ff6ce5048ce 1965->1966 1966->1966 1967 7ff6ce5048d0-7ff6ce5048eb system 1966->1967
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: system
                          • String ID: !NTN$*$-z`z$7*'<$>$jht2
                          • API String ID: 3377271179-319890355
                          • Opcode ID: fdef32d83dd7d3cf955ed9b32d818ebf344c5666f4f197112ba7d8ca2d1adbe2
                          • Instruction ID: 84a773a587c0bdfed817dc08c201861e6b5dbe393acdcc19896bfc735a7efb33
                          • Opcode Fuzzy Hash: fdef32d83dd7d3cf955ed9b32d818ebf344c5666f4f197112ba7d8ca2d1adbe2
                          • Instruction Fuzzy Hash: 10C14E22E297D28DF701CFB8A8211BC7B70BBA9709F901628DEC575D15EFA95208C754

                          Control-flow Graph

                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,00007FF6CE545E6A,?,?,?,?,00007FF6CE51C39B), ref: 00007FF6CE51C024
                          • GetProcAddress.KERNEL32(?,?,00007FF6CE545E6A,?,?,?,?,00007FF6CE51C39B), ref: 00007FF6CE51C049
                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF6CE545E6A,?,?,?,?,00007FF6CE51C39B), ref: 00007FF6CE51C05C
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcstrpbrk
                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                          • API String ID: 27745253-3327535076
                          • Opcode ID: 7c4f2fc369ceef35da4cc00e9ce75a277ea8312e9eea679c65a3c8a41ba914d0
                          • Instruction ID: 43be111d2722729cb5b5d8cc62c530b4af706ee6945e252f9587219917cde2fa
                          • Opcode Fuzzy Hash: 7c4f2fc369ceef35da4cc00e9ce75a277ea8312e9eea679c65a3c8a41ba914d0
                          • Instruction Fuzzy Hash: 7741F916F4E64242EB098F52A92013967B0EF95BD2F884134EE8DA3790DE3FD486C300

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2017 7ff6ce528410-7ff6ce52845e socket 2018 7ff6ce528460 2017->2018 2019 7ff6ce528465-7ff6ce5284be htonl setsockopt 2017->2019 2020 7ff6ce528614-7ff6ce528632 call 7ff6ce553060 2018->2020 2021 7ff6ce5285eb-7ff6ce528607 closesocket * 3 2019->2021 2022 7ff6ce5284c4-7ff6ce5284d9 bind 2019->2022 2023 7ff6ce52860c 2021->2023 2022->2021 2025 7ff6ce5284df-7ff6ce5284f5 getsockname 2022->2025 2023->2020 2025->2021 2027 7ff6ce5284fb-7ff6ce52850a listen 2025->2027 2027->2021 2028 7ff6ce528510-7ff6ce528525 socket 2027->2028 2028->2021 2029 7ff6ce52852b-7ff6ce528540 connect 2028->2029 2029->2021 2030 7ff6ce528546-7ff6ce52855c accept 2029->2030 2030->2021 2031 7ff6ce528562-7ff6ce52857e call 7ff6ce51c830 2030->2031 2034 7ff6ce528585-7ff6ce52858c 2031->2034 2034->2034 2035 7ff6ce52858e-7ff6ce5285a8 send 2034->2035 2035->2021 2036 7ff6ce5285aa-7ff6ce5285c6 recv 2035->2036 2036->2021 2037 7ff6ce5285c8-7ff6ce5285dc memcmp 2036->2037 2037->2021 2038 7ff6ce5285de-7ff6ce5285e9 closesocket 2037->2038 2038->2023
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                          • String ID:
                          • API String ID: 3699910901-0
                          • Opcode ID: 0d4c7ab26ed7e8ab0f7134864bffdbdd0db549245289935f3c944496672256d1
                          • Instruction ID: c05eb0f61ec843c083f45a07663e3fc421b610314420a5012a3b51d7e9711e18
                          • Opcode Fuzzy Hash: 0d4c7ab26ed7e8ab0f7134864bffdbdd0db549245289935f3c944496672256d1
                          • Instruction Fuzzy Hash: 3951A431609A4281D7609F25E86416973B1FBA4BB6F904331FABE936E4DF7DE449C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2039 7ff6ce51a330-7ff6ce51a37d 2040 7ff6ce51a388-7ff6ce51a3c3 call 7ff6ce521160 2039->2040 2041 7ff6ce51a37f-7ff6ce51a383 2039->2041 2047 7ff6ce51a3c8-7ff6ce51a3cb 2040->2047 2048 7ff6ce51a3c5 2040->2048 2042 7ff6ce51a8a6-7ff6ce51a8c4 call 7ff6ce553060 2041->2042 2049 7ff6ce51a3e8 2047->2049 2050 7ff6ce51a3cd-7ff6ce51a3d0 2047->2050 2048->2047 2053 7ff6ce51a3eb-7ff6ce51a417 call 7ff6ce5211f0 2049->2053 2051 7ff6ce51a3e3-7ff6ce51a3e6 2050->2051 2052 7ff6ce51a3d2-7ff6ce51a3d5 2050->2052 2051->2053 2052->2053 2054 7ff6ce51a3d7-7ff6ce51a3e1 2052->2054 2057 7ff6ce51a419-7ff6ce51a42d call 7ff6ce519320 2053->2057 2058 7ff6ce51a432-7ff6ce51a43a 2053->2058 2054->2053 2067 7ff6ce51a896-7ff6ce51a89e 2057->2067 2060 7ff6ce51a469-7ff6ce51a487 2058->2060 2061 7ff6ce51a43c-7ff6ce51a44e call 7ff6ce51b500 2058->2061 2062 7ff6ce51a490-7ff6ce51a4a5 2060->2062 2071 7ff6ce51a450-7ff6ce51a452 2061->2071 2072 7ff6ce51a462-7ff6ce51a464 2061->2072 2065 7ff6ce51a4ab-7ff6ce51a4bf call 7ff6ce529990 2062->2065 2066 7ff6ce51a72a 2062->2066 2077 7ff6ce51a640-7ff6ce51a643 2065->2077 2078 7ff6ce51a4c5-7ff6ce51a4f0 call 7ff6ce5211f0 2065->2078 2070 7ff6ce51a72e-7ff6ce51a73f 2066->2070 2067->2042 2070->2062 2075 7ff6ce51a745-7ff6ce51a747 2070->2075 2071->2072 2073 7ff6ce51a454-7ff6ce51a45d call 7ff6ce51b610 2071->2073 2072->2067 2073->2072 2079 7ff6ce51a74d-7ff6ce51a764 call 7ff6ce51bc30 2075->2079 2080 7ff6ce51a88c 2075->2080 2082 7ff6ce51a645-7ff6ce51a64c 2077->2082 2083 7ff6ce51a6b4-7ff6ce51a6fa SleepEx getsockopt 2077->2083 2094 7ff6ce51a509-7ff6ce51a50c 2078->2094 2095 7ff6ce51a4f2-7ff6ce51a504 call 7ff6ce5194a0 2078->2095 2096 7ff6ce51a817-7ff6ce51a819 2079->2096 2097 7ff6ce51a76a-7ff6ce51a771 2079->2097 2081 7ff6ce51a88e 2080->2081 2081->2067 2082->2083 2086 7ff6ce51a64e-7ff6ce51a650 2082->2086 2089 7ff6ce51a706 2083->2089 2090 7ff6ce51a6fc-7ff6ce51a704 WSAGetLastError 2083->2090 2092 7ff6ce51a656-7ff6ce51a69c SleepEx getsockopt 2086->2092 2093 7ff6ce51a55f-7ff6ce51a561 2086->2093 2091 7ff6ce51a70a-7ff6ce51a70c 2089->2091 2090->2091 2098 7ff6ce51a70e-7ff6ce51a714 2091->2098 2099 7ff6ce51a783-7ff6ce51a7d1 2091->2099 2101 7ff6ce51a6ab-7ff6ce51a6af 2092->2101 2102 7ff6ce51a69e-7ff6ce51a6a6 WSAGetLastError 2092->2102 2093->2066 2100 7ff6ce51a567-7ff6ce51a57c WSASetLastError 2093->2100 2106 7ff6ce51a55b 2094->2106 2107 7ff6ce51a50e-7ff6ce51a515 2094->2107 2095->2094 2096->2081 2104 7ff6ce51a777-7ff6ce51a77e 2097->2104 2105 7ff6ce51a81b-7ff6ce51a822 2097->2105 2098->2099 2111 7ff6ce51a716-7ff6ce51a725 call 7ff6ce5194a0 2098->2111 2108 7ff6ce51a7e6-7ff6ce51a7fb call 7ff6ce51b500 2099->2108 2109 7ff6ce51a7d3-7ff6ce51a7db call 7ff6ce519f80 2099->2109 2100->2066 2112 7ff6ce51a582-7ff6ce51a5ec call 7ff6ce522550 call 7ff6ce505eb0 call 7ff6ce5194a0 2100->2112 2101->2093 2102->2093 2116 7ff6ce51a846-7ff6ce51a889 call 7ff6ce505eb0 call 7ff6ce519320 2104->2116 2113 7ff6ce51a82d-7ff6ce51a834 2105->2113 2114 7ff6ce51a824-7ff6ce51a82b 2105->2114 2106->2093 2107->2106 2110 7ff6ce51a517-7ff6ce51a543 call 7ff6ce5211f0 2107->2110 2108->2081 2133 7ff6ce51a801-7ff6ce51a803 2108->2133 2109->2108 2110->2106 2132 7ff6ce51a545-7ff6ce51a556 call 7ff6ce51bc30 2110->2132 2111->2066 2142 7ff6ce51a60e-7ff6ce51a624 call 7ff6ce51bc30 2112->2142 2143 7ff6ce51a5ee-7ff6ce51a5f5 2112->2143 2123 7ff6ce51a836-7ff6ce51a83d 2113->2123 2124 7ff6ce51a83f 2113->2124 2114->2116 2116->2080 2123->2116 2124->2116 2132->2106 2133->2081 2137 7ff6ce51a809-7ff6ce51a812 call 7ff6ce51b610 2133->2137 2137->2096 2149 7ff6ce51a637-7ff6ce51a63b 2142->2149 2150 7ff6ce51a626-7ff6ce51a631 2142->2150 2143->2142 2144 7ff6ce51a5f7-7ff6ce51a5fe 2143->2144 2146 7ff6ce51a600-7ff6ce51a603 2144->2146 2146->2142 2148 7ff6ce51a605-7ff6ce51a60c 2146->2148 2148->2142 2148->2146 2149->2070 2150->2066 2150->2149
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                          • API String ID: 0-3307081561
                          • Opcode ID: 994ea3f9bb0d9fadcdb01d677eb0d464cbdb416cbc24e5e0e6c73f16636ec1b9
                          • Instruction ID: 86d1d2115defcc5bbbbf9c5220d3901ef84cec63b2561213fcb2a4fac41ccae6
                          • Opcode Fuzzy Hash: 994ea3f9bb0d9fadcdb01d677eb0d464cbdb416cbc24e5e0e6c73f16636ec1b9
                          • Instruction Fuzzy Hash: E2E10366B086C282EB568F6494643BD6371FB98795F804235FA9DA77C6DF3EE441C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freerecv
                          • String ID:
                          • API String ID: 2032557106-0
                          • Opcode ID: e0d5220d61dc43b26c976585556dbcefb18984b26525e93c61f20345ab19815e
                          • Instruction ID: ad0d64d078777bc7d49d48438472213860177b9205ca55aeaae75f044a87792d
                          • Opcode Fuzzy Hash: e0d5220d61dc43b26c976585556dbcefb18984b26525e93c61f20345ab19815e
                          • Instruction Fuzzy Hash: B8C1C7B260C6C245EB658F2594603B962B0FF947A9F946235FEDE937C8DE3ED4418700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1018 7ff6ce4f36d0-7ff6ce4f371f call 7ff6ce4f3470 1021 7ff6ce4f3725-7ff6ce4f372a 1018->1021 1022 7ff6ce4f3cd8-7ff6ce4f3d47 call 7ff6ce4f3d50 Sleep exit 1018->1022 1021->1022 1024 7ff6ce4f3730-7ff6ce4f384e call 7ff6ce4f3d90 call 7ff6ce4f52a0 call 7ff6ce4f3f00 call 7ff6ce4f52a0 call 7ff6ce4f4000 call 7ff6ce4f52a0 1021->1024 1028 7ff6ce4f3d48-7ff6ce4f3d4f call 7ff6ce4f21c0 1022->1028 1041 7ff6ce4f3884-7ff6ce4f389d 1024->1041 1042 7ff6ce4f3850-7ff6ce4f3861 1024->1042 1043 7ff6ce4f38d5-7ff6ce4f38dd 1041->1043 1044 7ff6ce4f389f-7ff6ce4f38b1 1041->1044 1045 7ff6ce4f3863-7ff6ce4f3876 1042->1045 1046 7ff6ce4f387f call 7ff6ce552d04 1042->1046 1049 7ff6ce4f3913-7ff6ce4f392b 1043->1049 1050 7ff6ce4f38df-7ff6ce4f38f0 1043->1050 1047 7ff6ce4f38b3-7ff6ce4f38c6 1044->1047 1048 7ff6ce4f38cf-7ff6ce4f38d4 call 7ff6ce552d04 1044->1048 1045->1046 1051 7ff6ce4f3878-7ff6ce4f387e _invalid_parameter_noinfo_noreturn 1045->1051 1046->1041 1047->1048 1053 7ff6ce4f38c8-7ff6ce4f38ce _invalid_parameter_noinfo_noreturn 1047->1053 1048->1043 1057 7ff6ce4f3962-7ff6ce4f396a 1049->1057 1058 7ff6ce4f392d-7ff6ce4f393e 1049->1058 1055 7ff6ce4f38f2-7ff6ce4f3905 1050->1055 1056 7ff6ce4f390e call 7ff6ce552d04 1050->1056 1051->1046 1053->1048 1055->1056 1062 7ff6ce4f3907-7ff6ce4f390d _invalid_parameter_noinfo_noreturn 1055->1062 1056->1049 1059 7ff6ce4f39a0-7ff6ce4f39e7 1057->1059 1060 7ff6ce4f396c-7ff6ce4f397d 1057->1060 1064 7ff6ce4f3940-7ff6ce4f3953 1058->1064 1065 7ff6ce4f395c-7ff6ce4f3961 call 7ff6ce552d04 1058->1065 1070 7ff6ce4f39f8-7ff6ce4f3a1b 1059->1070 1071 7ff6ce4f39e9-7ff6ce4f39f6 1059->1071 1068 7ff6ce4f397f-7ff6ce4f3992 1060->1068 1069 7ff6ce4f399b call 7ff6ce552d04 1060->1069 1062->1056 1064->1065 1066 7ff6ce4f3955-7ff6ce4f395b _invalid_parameter_noinfo_noreturn 1064->1066 1065->1057 1066->1065 1068->1069 1073 7ff6ce4f3994-7ff6ce4f399a _invalid_parameter_noinfo_noreturn 1068->1073 1069->1059 1076 7ff6ce4f3a4f-7ff6ce4f3a52 1070->1076 1077 7ff6ce4f3a1d-7ff6ce4f3a24 1070->1077 1075 7ff6ce4f3a72-7ff6ce4f3ac8 call 7ff6ce4f4bc0 call 7ff6ce4f3470 call 7ff6ce4f6280 call 7ff6ce4f5f40 1071->1075 1073->1069 1096 7ff6ce4f3bd3-7ff6ce4f3c43 call 7ff6ce4f5f40 call 7ff6ce552cc8 call 7ff6ce4f5980 call 7ff6ce4f70b0 call 7ff6ce4f54c0 1075->1096 1097 7ff6ce4f3ace-7ff6ce4f3add call 7ff6ce4f5f40 1075->1097 1078 7ff6ce4f3a54-7ff6ce4f3a59 call 7ff6ce552cc8 1076->1078 1079 7ff6ce4f3a5b 1076->1079 1077->1028 1081 7ff6ce4f3a2a-7ff6ce4f3a38 call 7ff6ce552cc8 1077->1081 1083 7ff6ce4f3a5e-7ff6ce4f3a6d memcpy 1078->1083 1079->1083 1089 7ff6ce4f3a3a-7ff6ce4f3a46 1081->1089 1090 7ff6ce4f3a48-7ff6ce4f3a4e _invalid_parameter_noinfo_noreturn 1081->1090 1083->1075 1089->1083 1090->1076 1123 7ff6ce4f3c45-7ff6ce4f3c90 call 7ff6ce4f5f40 call 7ff6ce4f6020 call 7ff6ce4f5180 ShellExecuteA exit 1096->1123 1124 7ff6ce4f3c91-7ff6ce4f3cd7 call 7ff6ce4f5f40 call 7ff6ce4f63b0 call 7ff6ce4f5180 MessageBoxA call 7ff6ce4f5340 exit 1096->1124 1102 7ff6ce4f3ae5 1097->1102 1103 7ff6ce4f3adf-7ff6ce4f3ae3 1097->1103 1106 7ff6ce4f3ae8-7ff6ce4f3af1 1102->1106 1103->1106 1108 7ff6ce4f3af3 1106->1108 1109 7ff6ce4f3af6-7ff6ce4f3b19 call 7ff6ce4f5980 call 7ff6ce4f54c0 1106->1109 1108->1109 1119 7ff6ce4f3b4f-7ff6ce4f3b63 1109->1119 1120 7ff6ce4f3b1b-7ff6ce4f3b2c 1109->1120 1121 7ff6ce4f3b65-7ff6ce4f3b73 1119->1121 1122 7ff6ce4f3b99-7ff6ce4f3bd2 call 7ff6ce553060 1119->1122 1125 7ff6ce4f3b2e-7ff6ce4f3b41 1120->1125 1126 7ff6ce4f3b4a call 7ff6ce552d04 1120->1126 1129 7ff6ce4f3b75-7ff6ce4f3b88 1121->1129 1130 7ff6ce4f3b91-7ff6ce4f3b94 call 7ff6ce552d04 1121->1130 1123->1124 1124->1022 1125->1126 1127 7ff6ce4f3b43-7ff6ce4f3b49 _invalid_parameter_noinfo_noreturn 1125->1127 1126->1119 1127->1126 1129->1130 1135 7ff6ce4f3b8a-7ff6ce4f3b90 _invalid_parameter_noinfo_noreturn 1129->1135 1130->1122 1135->1130
                          APIs
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F34D7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3547
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F35A7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F35F7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3647
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3878
                            • Part of subcall function 00007FF6CE4F5F40: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6000
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F38C8
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3907
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3955
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3994
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3A48
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE4F3A6D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3B43
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3B8A
                          • ShellExecuteA.SHELL32 ref: 00007FF6CE4F3C82
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3C8A
                          • MessageBoxA.USER32 ref: 00007FF6CE4F3CC0
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3CD1
                          • Sleep.KERNEL32 ref: 00007FF6CE4F3D39
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3D41
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4F3D48
                            • Part of subcall function 00007FF6CE4F3D90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3E9F
                            • Part of subcall function 00007FF6CE4F3D90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3EE0
                            • Part of subcall function 00007FF6CE4F52A0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F52F3
                            • Part of subcall function 00007FF6CE4F3F00: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3FE0
                            • Part of subcall function 00007FF6CE4F4000: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F40E0
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                          • String ID: Failure$download$invalidver$message$open$sessionid$success
                          • API String ID: 3283070336-3881042241
                          • Opcode ID: efa8badad9e1f88c70e21c7859164edb3027d15fb94ea58b4cbfa374ef5f5acd
                          • Instruction ID: bc9c9de68789cd5509436e18dbc372bba73e1a2aeee68a5bbfe43d8456967e18
                          • Opcode Fuzzy Hash: efa8badad9e1f88c70e21c7859164edb3027d15fb94ea58b4cbfa374ef5f5acd
                          • Instruction Fuzzy Hash: A402C162A0878285EB00DF24D4543AD3771EB61B95F809235FAEDA6BDADF7DE484C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1149 7ff6ce52ef70-7ff6ce52efed 1150 7ff6ce52f00e-7ff6ce52f013 1149->1150 1151 7ff6ce52efef-7ff6ce52eff3 1149->1151 1152 7ff6ce52f015-7ff6ce52f02d call 7ff6ce5194a0 1150->1152 1153 7ff6ce52f032-7ff6ce52f036 1150->1153 1151->1150 1154 7ff6ce52eff5-7ff6ce52f009 call 7ff6ce5194a0 1151->1154 1164 7ff6ce52f453-7ff6ce52f456 1152->1164 1156 7ff6ce52f038-7ff6ce52f04c call 7ff6ce5194a0 1153->1156 1157 7ff6ce52f051-7ff6ce52f054 1153->1157 1167 7ff6ce52f45c-7ff6ce52f469 1154->1167 1156->1164 1161 7ff6ce52f36a 1157->1161 1162 7ff6ce52f05a-7ff6ce52f05e 1157->1162 1170 7ff6ce52f372-7ff6ce52f37a 1161->1170 1162->1161 1166 7ff6ce52f064-7ff6ce52f079 1162->1166 1164->1167 1168 7ff6ce52f575-7ff6ce52f57b 1164->1168 1171 7ff6ce52f07b-7ff6ce52f07e 1166->1171 1172 7ff6ce52f080-7ff6ce52f0ab realloc 1166->1172 1167->1168 1169 7ff6ce52f46f-7ff6ce52f473 1167->1169 1174 7ff6ce52f58d-7ff6ce52f5a3 1168->1174 1175 7ff6ce52f57d-7ff6ce52f580 1168->1175 1169->1168 1173 7ff6ce52f479-7ff6ce52f47d 1169->1173 1176 7ff6ce52f37e 1170->1176 1171->1172 1177 7ff6ce52f0fd-7ff6ce52f112 call 7ff6ce5196a0 1171->1177 1178 7ff6ce52f0ad-7ff6ce52f0c9 call 7ff6ce519320 1172->1178 1179 7ff6ce52f0ce-7ff6ce52f0fb 1172->1179 1173->1168 1181 7ff6ce52f483-7ff6ce52f498 call 7ff6ce51c1b0 1173->1181 1184 7ff6ce52f5eb-7ff6ce52f5f1 1174->1184 1185 7ff6ce52f5a5-7ff6ce52f5e9 memcpy * 2 1174->1185 1175->1174 1182 7ff6ce52f582-7ff6ce52f58a 1175->1182 1183 7ff6ce52f386-7ff6ce52f38c 1176->1183 1187 7ff6ce52f117-7ff6ce52f11d 1177->1187 1178->1167 1179->1177 1209 7ff6ce52f55e-7ff6ce52f570 call 7ff6ce5194a0 1181->1209 1210 7ff6ce52f49e-7ff6ce52f4a0 1181->1210 1182->1174 1189 7ff6ce52f422-7ff6ce52f428 1183->1189 1190 7ff6ce52f392-7ff6ce52f3a7 call 7ff6ce5194a0 1183->1190 1193 7ff6ce52f605-7ff6ce52f608 1184->1193 1194 7ff6ce52f5f3-7ff6ce52f5f6 1184->1194 1191 7ff6ce52f615-7ff6ce52f637 call 7ff6ce553060 1185->1191 1198 7ff6ce52f322-7ff6ce52f32a 1187->1198 1199 7ff6ce52f123-7ff6ce52f12f 1187->1199 1202 7ff6ce52f150-7ff6ce52f15f 1189->1202 1203 7ff6ce52f42e-7ff6ce52f43e 1189->1203 1222 7ff6ce52f3a9-7ff6ce52f3ac 1190->1222 1223 7ff6ce52f3b2-7ff6ce52f3c2 1190->1223 1196 7ff6ce52f60a-7ff6ce52f60e 1193->1196 1197 7ff6ce52f610-7ff6ce52f612 1193->1197 1194->1193 1195 7ff6ce52f5f8-7ff6ce52f600 1194->1195 1195->1193 1196->1197 1197->1191 1205 7ff6ce52f32c-7ff6ce52f33d 1198->1205 1206 7ff6ce52f342 1198->1206 1207 7ff6ce52f149-7ff6ce52f14e 1199->1207 1208 7ff6ce52f131-7ff6ce52f137 1199->1208 1202->1164 1212 7ff6ce52f165-7ff6ce52f167 1202->1212 1203->1164 1213 7ff6ce52f440-7ff6ce52f444 1203->1213 1205->1202 1206->1207 1217 7ff6ce52f348-7ff6ce52f365 1206->1217 1207->1202 1215 7ff6ce52f13d-7ff6ce52f144 call 7ff6ce5194a0 1208->1215 1216 7ff6ce52f30e-7ff6ce52f31d call 7ff6ce5194a0 1208->1216 1209->1168 1210->1209 1218 7ff6ce52f4a6-7ff6ce52f4b2 1210->1218 1212->1164 1220 7ff6ce52f16d-7ff6ce52f170 1212->1220 1221 7ff6ce52f44b 1213->1221 1215->1207 1216->1207 1217->1202 1218->1168 1229 7ff6ce52f182-7ff6ce52f200 call 7ff6ce51bd70 1220->1229 1230 7ff6ce52f172-7ff6ce52f176 1220->1230 1231 7ff6ce52f44e call 7ff6ce5194a0 1221->1231 1222->1223 1224 7ff6ce52f532-7ff6ce52f539 1222->1224 1226 7ff6ce52f3c8-7ff6ce52f409 call 7ff6ce5194a0 call 7ff6ce52d430 1223->1226 1227 7ff6ce52f54a-7ff6ce52f559 1223->1227 1224->1221 1244 7ff6ce52f53e-7ff6ce52f545 1226->1244 1245 7ff6ce52f40f-7ff6ce52f41d call 7ff6ce5194a0 1226->1245 1227->1231 1242 7ff6ce52f214-7ff6ce52f219 1229->1242 1243 7ff6ce52f202-7ff6ce52f207 1229->1243 1230->1229 1234 7ff6ce52f178-7ff6ce52f17c 1230->1234 1231->1164 1234->1164 1234->1229 1247 7ff6ce52f2be-7ff6ce52f2c2 1242->1247 1248 7ff6ce52f21f-7ff6ce52f249 1242->1248 1243->1242 1246 7ff6ce52f209-7ff6ce52f20e 1243->1246 1244->1231 1245->1202 1246->1242 1250 7ff6ce52f4b7-7ff6ce52f4bd 1246->1250 1247->1170 1254 7ff6ce52f2c8-7ff6ce52f2cd 1247->1254 1251 7ff6ce52f24b-7ff6ce52f24e 1248->1251 1252 7ff6ce52f250-7ff6ce52f26b realloc 1248->1252 1258 7ff6ce52f4e6-7ff6ce52f511 call 7ff6ce5056c0 call 7ff6ce5194a0 1250->1258 1259 7ff6ce52f4bf-7ff6ce52f4d0 1250->1259 1251->1252 1255 7ff6ce52f295-7ff6ce52f299 1251->1255 1256 7ff6ce52f516-7ff6ce52f52d call 7ff6ce519320 1252->1256 1257 7ff6ce52f271-7ff6ce52f291 1252->1257 1254->1170 1260 7ff6ce52f2d3-7ff6ce52f2e5 1254->1260 1262 7ff6ce52f2bc 1255->1262 1263 7ff6ce52f29b-7ff6ce52f2b8 memcpy 1255->1263 1256->1164 1257->1255 1258->1164 1264 7ff6ce52f4da-7ff6ce52f4e1 1259->1264 1265 7ff6ce52f4d2 1259->1265 1260->1183 1267 7ff6ce52f2eb-7ff6ce52f30c memcpy 1260->1267 1262->1247 1263->1262 1264->1221 1265->1264 1267->1176
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                          • API String ID: 3510742995-857957974
                          • Opcode ID: 2b695a1137e97254246a1ab44243a13d41a2c4160949021752e9243e96901486
                          • Instruction ID: 701348e24de578f057c64796c675d23500dc486647f39f6939ba2b0f3494ca9a
                          • Opcode Fuzzy Hash: 2b695a1137e97254246a1ab44243a13d41a2c4160949021752e9243e96901486
                          • Instruction Fuzzy Hash: A302E072A08A8585EB60DF19E46836937B4FB74B96F904136EA8DE77A4CF7BD440C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1392 7ff6ce52e400-7ff6ce52e46e 1393 7ff6ce52e490 1392->1393 1394 7ff6ce52e470-7ff6ce52e485 1392->1394 1396 7ff6ce52e497-7ff6ce52e4b1 1393->1396 1394->1393 1395 7ff6ce52e487-7ff6ce52e48e 1394->1395 1395->1396 1397 7ff6ce52e4b7-7ff6ce52e4bc 1396->1397 1398 7ff6ce52eb7b 1396->1398 1397->1398 1399 7ff6ce52e4c2-7ff6ce52e4d0 1397->1399 1400 7ff6ce52e512-7ff6ce52e516 1399->1400 1401 7ff6ce52e4d2-7ff6ce52e50c malloc 1399->1401 1403 7ff6ce52e518-7ff6ce52e55d malloc 1400->1403 1404 7ff6ce52e563-7ff6ce52e574 1400->1404 1401->1400 1402 7ff6ce52eb6f 1401->1402 1402->1398 1403->1402 1403->1404 1405 7ff6ce52e5e8-7ff6ce52e5ea 1404->1405 1406 7ff6ce52e576-7ff6ce52e590 realloc 1404->1406 1407 7ff6ce52e5ec-7ff6ce52e610 call 7ff6ce5196a0 1405->1407 1408 7ff6ce52e64a-7ff6ce52e6f1 call 7ff6ce51bd70 malloc 1405->1408 1409 7ff6ce52e5d0-7ff6ce52e5e6 1406->1409 1410 7ff6ce52e592-7ff6ce52e59c call 7ff6ce519320 1406->1410 1415 7ff6ce52e615-7ff6ce52e618 1407->1415 1408->1402 1417 7ff6ce52e6f7-7ff6ce52e711 memcpy 1408->1417 1409->1405 1414 7ff6ce52e5a1 1410->1414 1418 7ff6ce52e5a6-7ff6ce52e5cf call 7ff6ce553060 1414->1418 1419 7ff6ce52e61e-7ff6ce52e620 1415->1419 1420 7ff6ce52e88f-7ff6ce52e896 1415->1420 1417->1414 1421 7ff6ce52e717-7ff6ce52e783 free 1417->1421 1423 7ff6ce52e876-7ff6ce52e88a call 7ff6ce519320 1419->1423 1424 7ff6ce52e626-7ff6ce52e62e 1419->1424 1425 7ff6ce52eb68-7ff6ce52eb6a 1420->1425 1426 7ff6ce52e89c-7ff6ce52e8a8 1420->1426 1432 7ff6ce52e789-7ff6ce52e790 1421->1432 1433 7ff6ce52eb53-7ff6ce52eb5a 1421->1433 1423->1418 1424->1423 1429 7ff6ce52e634-7ff6ce52e646 1424->1429 1425->1418 1426->1418 1429->1408 1435 7ff6ce52e796-7ff6ce52e79d 1432->1435 1436 7ff6ce52eafc-7ff6ce52eb08 1432->1436 1434 7ff6ce52eb5e 1433->1434 1434->1425 1437 7ff6ce52e7a8-7ff6ce52e7af 1435->1437 1438 7ff6ce52e79f-7ff6ce52e7a2 1435->1438 1439 7ff6ce52eb0a-7ff6ce52eb36 call 7ff6ce5056c0 call 7ff6ce519320 1436->1439 1440 7ff6ce52eb3b-7ff6ce52eb4e 1436->1440 1442 7ff6ce52e7b0-7ff6ce52e7b4 1437->1442 1438->1437 1441 7ff6ce52e8ad-7ff6ce52e8b4 1438->1441 1439->1418 1440->1418 1447 7ff6ce52e8b6-7ff6ce52e8bd 1441->1447 1448 7ff6ce52e8f4-7ff6ce52e91d call 7ff6ce5056c0 call 7ff6ce519320 1441->1448 1444 7ff6ce52e7b6-7ff6ce52e7ba 1442->1444 1445 7ff6ce52e7f3-7ff6ce52e7fa 1442->1445 1444->1445 1450 7ff6ce52e7bc-7ff6ce52e7d7 call 7ff6ce519be0 1444->1450 1452 7ff6ce52e809-7ff6ce52e812 1445->1452 1453 7ff6ce52e7fc 1445->1453 1447->1439 1454 7ff6ce52e8c3-7ff6ce52e8ef call 7ff6ce5056c0 call 7ff6ce519320 1447->1454 1448->1414 1464 7ff6ce52e7dc-7ff6ce52e7e2 1450->1464 1452->1442 1456 7ff6ce52e814-7ff6ce52e818 1452->1456 1453->1452 1454->1418 1461 7ff6ce52e948-7ff6ce52e94f 1456->1461 1462 7ff6ce52e81e-7ff6ce52e823 1456->1462 1468 7ff6ce52e957-7ff6ce52e95e 1461->1468 1462->1461 1466 7ff6ce52e829-7ff6ce52e83a 1462->1466 1469 7ff6ce52e7e8-7ff6ce52e7ed 1464->1469 1470 7ff6ce52e922-7ff6ce52e943 call 7ff6ce519320 1464->1470 1466->1468 1472 7ff6ce52e840-7ff6ce52e864 memcpy 1466->1472 1468->1434 1474 7ff6ce52e964-7ff6ce52e967 1468->1474 1469->1445 1469->1470 1470->1418 1472->1474 1475 7ff6ce52e86a-7ff6ce52e86f 1472->1475 1477 7ff6ce52e969 1474->1477 1478 7ff6ce52e973-7ff6ce52e97b 1474->1478 1475->1423 1477->1478 1479 7ff6ce52e97d-7ff6ce52e997 1478->1479 1480 7ff6ce52e9a3 1478->1480 1479->1480 1481 7ff6ce52e999-7ff6ce52e9a1 1479->1481 1482 7ff6ce52e9ab-7ff6ce52e9ae 1480->1482 1481->1482 1483 7ff6ce52ead0-7ff6ce52ead8 1482->1483 1484 7ff6ce52e9b4-7ff6ce52e9e5 1482->1484 1483->1425 1485 7ff6ce52eade-7ff6ce52eae9 1483->1485 1489 7ff6ce52e9eb-7ff6ce52e9f3 1484->1489 1490 7ff6ce52eaa3-7ff6ce52eace call 7ff6ce5056c0 call 7ff6ce519320 1484->1490 1485->1425 1486 7ff6ce52eaeb-7ff6ce52eaf7 call 7ff6ce549480 1485->1486 1486->1418 1489->1490 1493 7ff6ce52e9f9-7ff6ce52e9fc 1489->1493 1496 7ff6ce52ea75-7ff6ce52ea78 1490->1496 1495 7ff6ce52e9fe-7ff6ce52ea05 1493->1495 1493->1496 1500 7ff6ce52ea07-7ff6ce52ea2e memset call 7ff6ce54be60 1495->1500 1501 7ff6ce52ea70 1495->1501 1498 7ff6ce52ea7a CertFreeCertificateContext 1496->1498 1499 7ff6ce52ea80-7ff6ce52ea82 1496->1499 1498->1499 1499->1483 1503 7ff6ce52ea84-7ff6ce52ea95 call 7ff6ce519320 1499->1503 1508 7ff6ce52ea6b 1500->1508 1509 7ff6ce52ea30-7ff6ce52ea3a 1500->1509 1501->1496 1503->1418 1508->1501 1510 7ff6ce52ea3c-7ff6ce52ea46 1509->1510 1511 7ff6ce52ea9a-7ff6ce52eaa1 1509->1511 1510->1511 1512 7ff6ce52ea48-7ff6ce52ea5a call 7ff6ce512a90 1510->1512 1513 7ff6ce52ea63-7ff6ce52ea66 call 7ff6ce519320 1511->1513 1512->1508 1517 7ff6ce52ea5c 1512->1517 1513->1508 1517->1513
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                          • API String ID: 860210379-3059304359
                          • Opcode ID: 7fb0d3548eb4696715b61b4d34b3ffc1fb1c834f0369d31dd022699ec7e78fe4
                          • Instruction ID: 5709bdabe3d0e754582c1ba77018f534654f7d93b29f8f9da8a64331c4579f41
                          • Opcode Fuzzy Hash: 7fb0d3548eb4696715b61b4d34b3ffc1fb1c834f0369d31dd022699ec7e78fe4
                          • Instruction Fuzzy Hash: 3612A572708B4185EB61CF29D4643AE77B0FB64B96F900136EA8EA7794DF3AD445C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1518 7ff6ce52d620-7ff6ce52d690 1519 7ff6ce52d6af 1518->1519 1520 7ff6ce52d692-7ff6ce52d6a4 1518->1520 1522 7ff6ce52d6b6-7ff6ce52d6d0 call 7ff6ce51c1b0 1519->1522 1520->1519 1521 7ff6ce52d6a6-7ff6ce52d6ad 1520->1521 1521->1522 1525 7ff6ce52d6e1-7ff6ce52d6e8 1522->1525 1526 7ff6ce52d6d2-7ff6ce52d6dc call 7ff6ce5194a0 1522->1526 1528 7ff6ce52d728 1525->1528 1529 7ff6ce52d6ea-7ff6ce52d70a GetModuleHandleA GetProcAddress 1525->1529 1526->1525 1531 7ff6ce52d72a-7ff6ce52d73b 1528->1531 1529->1528 1530 7ff6ce52d70c-7ff6ce52d722 call 7ff6ce51c1b0 1529->1530 1530->1528 1538 7ff6ce52d724-7ff6ce52d726 1530->1538 1533 7ff6ce52d73d-7ff6ce52d755 1531->1533 1534 7ff6ce52d760 1531->1534 1533->1534 1536 7ff6ce52d757-7ff6ce52d75e 1533->1536 1537 7ff6ce52d767-7ff6ce52d76a 1534->1537 1536->1537 1539 7ff6ce52d76c-7ff6ce52d783 call 7ff6ce51c1b0 1537->1539 1540 7ff6ce52d7ab-7ff6ce52d7b2 1537->1540 1538->1531 1548 7ff6ce52d785-7ff6ce52d790 1539->1548 1549 7ff6ce52d792-7ff6ce52d7a6 call 7ff6ce519320 1539->1549 1541 7ff6ce52d7b6-7ff6ce52d7c7 1540->1541 1543 7ff6ce52d7c9-7ff6ce52d7e1 1541->1543 1544 7ff6ce52d7ec 1541->1544 1543->1544 1546 7ff6ce52d7e3-7ff6ce52d7ea 1543->1546 1547 7ff6ce52d7f3-7ff6ce52d7f5 1544->1547 1546->1547 1550 7ff6ce52d838-7ff6ce52d842 1547->1550 1551 7ff6ce52d7f7-7ff6ce52d813 call 7ff6ce513d10 call 7ff6ce513730 1547->1551 1548->1541 1559 7ff6ce52e3ad-7ff6ce52e3d6 call 7ff6ce553060 1549->1559 1553 7ff6ce52d848-7ff6ce52d873 1550->1553 1554 7ff6ce52e0b7-7ff6ce52e0ce call 7ff6ce52b2b0 1550->1554 1579 7ff6ce52d830-7ff6ce52d833 call 7ff6ce513d40 1551->1579 1580 7ff6ce52d815-7ff6ce52d82d 1551->1580 1557 7ff6ce52d8ab 1553->1557 1558 7ff6ce52d875-7ff6ce52d88c 1553->1558 1573 7ff6ce52e0d0-7ff6ce52e0e1 call 7ff6ce52b2b0 1554->1573 1574 7ff6ce52e0e3-7ff6ce52e0ed call 7ff6ce5194a0 1554->1574 1565 7ff6ce52d8b0-7ff6ce52d8ba 1557->1565 1563 7ff6ce52d88e-7ff6ce52d893 1558->1563 1564 7ff6ce52d895-7ff6ce52d89c 1558->1564 1563->1565 1569 7ff6ce52d89e-7ff6ce52d8a3 1564->1569 1570 7ff6ce52d8a5-7ff6ce52d8a9 1564->1570 1571 7ff6ce52d8bc-7ff6ce52d8bf 1565->1571 1572 7ff6ce52d8c2-7ff6ce52d8cd 1565->1572 1569->1565 1570->1565 1571->1572 1576 7ff6ce52e09f-7ff6ce52e0ae call 7ff6ce519320 1572->1576 1577 7ff6ce52d8d3-7ff6ce52d8e8 1572->1577 1573->1574 1585 7ff6ce52e0f2-7ff6ce52e0fd 1573->1585 1574->1585 1576->1554 1591 7ff6ce52e3a8 1576->1591 1577->1576 1579->1550 1580->1579 1587 7ff6ce52e186-7ff6ce52e198 1585->1587 1588 7ff6ce52e103-7ff6ce52e184 call 7ff6ce5194a0 call 7ff6ce51bd30 1585->1588 1590 7ff6ce52e19d-7ff6ce52e1f5 calloc 1587->1590 1588->1590 1593 7ff6ce52e1f7-7ff6ce52e201 call 7ff6ce519320 1590->1593 1594 7ff6ce52e210-7ff6ce52e213 1590->1594 1591->1559 1596 7ff6ce52e206-7ff6ce52e20b 1593->1596 1594->1596 1597 7ff6ce52e215-7ff6ce52e273 1594->1597 1596->1559 1601 7ff6ce52e279-7ff6ce52e2a8 free 1597->1601 1602 7ff6ce52e31c-7ff6ce52e338 call 7ff6ce519be0 1597->1602 1603 7ff6ce52e2f6-7ff6ce52e317 call 7ff6ce5056c0 call 7ff6ce519320 1601->1603 1604 7ff6ce52e2aa-7ff6ce52e2b0 1601->1604 1609 7ff6ce52e33d-7ff6ce52e35a 1602->1609 1603->1559 1607 7ff6ce52e2d0-7ff6ce52e2f1 call 7ff6ce5056c0 call 7ff6ce519320 1604->1607 1608 7ff6ce52e2b2-7ff6ce52e2cb call 7ff6ce5056c0 call 7ff6ce519320 1604->1608 1607->1559 1608->1591 1620 7ff6ce52e399-7ff6ce52e3a0 1609->1620 1621 7ff6ce52e35c-7ff6ce52e35f 1609->1621 1620->1591 1625 7ff6ce52e3a3 call 7ff6ce519320 1620->1625 1621->1620 1624 7ff6ce52e361-7ff6ce52e397 1621->1624 1624->1559 1625->1591
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                          • API String ID: 1646373207-2477831187
                          • Opcode ID: 3f68eddcdc12938e3d7424a30c3aca718588809a139331383700c071d1ec7716
                          • Instruction ID: af28ee7c03bad83c7f6ab137ab13bda345d7a6d7f466def8b4b291739dbf51c5
                          • Opcode Fuzzy Hash: 3f68eddcdc12938e3d7424a30c3aca718588809a139331383700c071d1ec7716
                          • Instruction Fuzzy Hash: E102B172A08B8186EB108F25D8643EE37B4FB6578AF904135EA8DA7791DF3EE545C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1693 7ff6ce50ec60-7ff6ce50ecab calloc 1694 7ff6ce50edee-7ff6ce50edf7 _errno 1693->1694 1695 7ff6ce50ecb1-7ff6ce50ed3a malloc 1693->1695 1696 7ff6ce50edf9-7ff6ce50ee15 1694->1696 1697 7ff6ce50ed77-7ff6ce50ed7e 1695->1697 1698 7ff6ce50ed3c-7ff6ce50ed61 InitializeCriticalSectionEx call 7ff6ce528410 1695->1698 1699 7ff6ce50ed90-7ff6ce50eda1 free 1697->1699 1700 7ff6ce50ed80-7ff6ce50ed8a DeleteCriticalSection free 1697->1700 1705 7ff6ce50ee16-7ff6ce50ee2a _strdup 1698->1705 1706 7ff6ce50ed67-7ff6ce50ed6f 1698->1706 1703 7ff6ce50eda8-7ff6ce50edb0 1699->1703 1704 7ff6ce50eda3 call 7ff6ce52c030 1699->1704 1700->1699 1708 7ff6ce50edb8-7ff6ce50ede8 free 1703->1708 1709 7ff6ce50edb2 closesocket 1703->1709 1704->1703 1705->1697 1710 7ff6ce50ee30-7ff6ce50ee50 free _strdup 1705->1710 1706->1697 1708->1694 1709->1708 1711 7ff6ce50ee7e-7ff6ce50ee88 1710->1711 1712 7ff6ce50ee52-7ff6ce50ee61 call 7ff6ce52c700 1710->1712 1713 7ff6ce50ee8a-7ff6ce50eeb2 EnterCriticalSection LeaveCriticalSection 1711->1713 1714 7ff6ce50ef01-7ff6ce50ef1c free 1711->1714 1716 7ff6ce50ee66-7ff6ce50ee6c 1712->1716 1717 7ff6ce50eeb4-7ff6ce50eebc CloseHandle 1713->1717 1718 7ff6ce50eec5-7ff6ce50eec8 1713->1718 1714->1694 1719 7ff6ce50eebe-7ff6ce50eec0 1716->1719 1720 7ff6ce50ee6e-7ff6ce50ee7b _errno 1716->1720 1721 7ff6ce50eee8-7ff6ce50eeeb 1717->1721 1722 7ff6ce50eeca-7ff6ce50eecd call 7ff6ce52c750 1718->1722 1723 7ff6ce50eed2-7ff6ce50eee2 call 7ff6ce50eae0 free 1718->1723 1719->1696 1720->1711 1726 7ff6ce50eef8-7ff6ce50eefb closesocket 1721->1726 1727 7ff6ce50eeed-7ff6ce50eef3 call 7ff6ce5094b0 1721->1727 1722->1723 1723->1721 1726->1714 1727->1726
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                          • String ID:
                          • API String ID: 259767416-0
                          • Opcode ID: 5001c8b9b2bd06600651865901df8cedbbabaf59c43ffc619a4b2716dd299c62
                          • Instruction ID: dbe2b660556890cfab0a96035f6f45f2ba919aaf3c2cc71253567c7e4a8973cf
                          • Opcode Fuzzy Hash: 5001c8b9b2bd06600651865901df8cedbbabaf59c43ffc619a4b2716dd299c62
                          • Instruction Fuzzy Hash: 1F815D26E19B8182EA24DF21E4602697370FBA8B55F545235EBDE937A2DF79F0D4C300
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                          • API String ID: 0-760484938
                          • Opcode ID: 7e5a9ecc9f364a1abff28ad31555aa64131474e0263a4fd0f7626a158c15246f
                          • Instruction ID: b42f2ad90c2671fe16c57e344beeda3889c9ec8aa3ae66a27f9253813b5176c8
                          • Opcode Fuzzy Hash: 7e5a9ecc9f364a1abff28ad31555aa64131474e0263a4fd0f7626a158c15246f
                          • Instruction Fuzzy Hash: 8342E166A09BC292EB588F6595603B873B0FB65B85F884035EEDD97385DF7EE460C300

                          Control-flow Graph

                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE505511,?,?,?,?,00007FF6CE4F4C01), ref: 00007FF6CE515278
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE5152C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: callocfree
                          • String ID: <$<$<$`$v
                          • API String ID: 306872129-2056843887
                          • Opcode ID: 3eef42f8e11f84fd80d09224aaad3287b80bf499d6f8e5f18735260e96aef36e
                          • Instruction ID: e1f7a047a9180ba1fe501b28caed868c51d17cdfc2dd57ac789f472ab8b54575
                          • Opcode Fuzzy Hash: 3eef42f8e11f84fd80d09224aaad3287b80bf499d6f8e5f18735260e96aef36e
                          • Instruction Fuzzy Hash: AE915B72908BC186E310CF24D4143E837A4FB65B6CF485239DF995B39ADFBAA095C720

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                          • API String ID: 2911674258-670633250
                          • Opcode ID: 559b675214bbfd1821bf51f3e6cf208b6a51f128b56bb22836966ea5e2880d44
                          • Instruction ID: 429056cbd1ecd9583ee7fd603302d9e417ff02d8a17e75e2350308feda260feb
                          • Opcode Fuzzy Hash: 559b675214bbfd1821bf51f3e6cf208b6a51f128b56bb22836966ea5e2880d44
                          • Instruction Fuzzy Hash: D2919176A19BC182E710CF25D4642E973B0FBA8B49F845236EE8C97756DF3AE185C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                          • String ID:
                          • API String ID: 2364279375-0
                          • Opcode ID: ca50c8ca88fe1f4457af3d72081aeddcddfa0bca7dd5fbdb425e7f22079f941d
                          • Instruction ID: b23156ed0904a95aa3bcdc67ede584dc67afb89c36efb90d5d9c30a5832f487c
                          • Opcode Fuzzy Hash: ca50c8ca88fe1f4457af3d72081aeddcddfa0bca7dd5fbdb425e7f22079f941d
                          • Instruction Fuzzy Hash: 90518F36A09B4182EA28CF41A52513977B4FFA8B91F844035EECEE7751DF3EE8549700
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastSleep
                          • String ID:
                          • API String ID: 1458359878-0
                          • Opcode ID: b17c9a42e245c7741aaed1d22f339584a59fe42792c13619a6d9d44380aee17a
                          • Instruction ID: af8668140be64bdcd86330ff2966c781b2e0fce4d90f15036340c01aa956c0bc
                          • Opcode Fuzzy Hash: b17c9a42e245c7741aaed1d22f339584a59fe42792c13619a6d9d44380aee17a
                          • Instruction Fuzzy Hash: 1491FAB1B0C68286EB644F1598682B962B1FF74356FD06134FA9EE6BC4DF3FD9418600
                          APIs
                            • Part of subcall function 00007FF6CE502D90: memcpy.VCRUNTIME140(?,?,?,?,00007FF6CE4F1052), ref: 00007FF6CE502DC8
                            • Part of subcall function 00007FF6CE503A50: memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE503AA0
                          • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6CE504A55
                            • Part of subcall function 00007FF6CE502D90: memcpy.VCRUNTIME140(?,?,?,?,00007FF6CE4F1052), ref: 00007FF6CE502E69
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE504AFC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE504BEB
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE504BF2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE504C31
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE504C7F
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$memsetrand
                          • String ID: | Developer : Bronkz $QWERTYUIOPASDFGHJKLZXCVBNMqwertyuiopasdfghjklzxcvbnm1234567890
                          • API String ID: 1615646049-1834593235
                          • Opcode ID: 3c534d76cba189520c6d2fb855150c2b7eac48da072d9367d55a083801a22756
                          • Instruction ID: 6e365e5d863dc546d7f9b2b023100f03741782193b5f9f6cfb98c71165c3a8dd
                          • Opcode Fuzzy Hash: 3c534d76cba189520c6d2fb855150c2b7eac48da072d9367d55a083801a22756
                          • Instruction Fuzzy Hash: 6681C462F18BC189FB10CFA5E4603AC2371EB55799F804631FEADA6AD9DE79D485C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc
                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                          • API String ID: 2635317215-3812100122
                          • Opcode ID: f3fa1684d0793ac13c963c35e78721a6e3a71da14f5f712953180809184ba821
                          • Instruction ID: cb096d74b28c5545dfb451de0004d9f1d951e97b4c6a685b2178fae6aa81457a
                          • Opcode Fuzzy Hash: f3fa1684d0793ac13c963c35e78721a6e3a71da14f5f712953180809184ba821
                          • Instruction Fuzzy Hash: FA51A022A0CB8297FB298F65A4603BD67A0FB94791F940031EBCD93791DF3EE4558710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: system
                          • String ID: .8$h%49
                          • API String ID: 3377271179-4206735779
                          • Opcode ID: 521d45bdb8a55dc01889218d64817cac38f63317c1f3d791648d4055fc5679f5
                          • Instruction ID: c93481b53a7b07c9a99617372ad05b7d487d9b84a1cc36ccb90c9159baa84081
                          • Opcode Fuzzy Hash: 521d45bdb8a55dc01889218d64817cac38f63317c1f3d791648d4055fc5679f5
                          • Instruction Fuzzy Hash: D0614122E187D689F301CF78E8551BC7770BBA9B49F805368EEC5B5A19EFB85148C344
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                          • String ID:
                          • API String ID: 1133592946-0
                          • Opcode ID: 86edb2caa39de90e9cd6f2952ff0692118652086183848987bc26694b561c529
                          • Instruction ID: 8627c417358a18d34bf114ae897117a984d21fc19befe0b2487edaa3d1e20100
                          • Opcode Fuzzy Hash: 86edb2caa39de90e9cd6f2952ff0692118652086183848987bc26694b561c529
                          • Instruction Fuzzy Hash: 4B315C21A0E54A81EA14AF64E4323B933B1AF75786FD45434F6CDEB6DBCE2FA4048710
                          APIs
                            • Part of subcall function 00007FF6CE52C080: getaddrinfo.WS2_32 ref: 00007FF6CE52C0A2
                            • Part of subcall function 00007FF6CE52C080: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C10E
                            • Part of subcall function 00007FF6CE52C080: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C148
                            • Part of subcall function 00007FF6CE52C080: memcpy.VCRUNTIME140(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C161
                            • Part of subcall function 00007FF6CE52C080: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C16F
                            • Part of subcall function 00007FF6CE52C080: freeaddrinfo.WS2_32(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C1E1
                            • Part of subcall function 00007FF6CE52C080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C1F5
                            • Part of subcall function 00007FF6CE52C080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C1FF
                            • Part of subcall function 00007FF6CE52C080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE50EBA5), ref: 00007FF6CE52C20C
                          • WSAGetLastError.WS2_32 ref: 00007FF6CE50EBAB
                          • WSAGetLastError.WS2_32 ref: 00007FF6CE50EBB5
                          • EnterCriticalSection.KERNEL32 ref: 00007FF6CE50EBD0
                          • LeaveCriticalSection.KERNEL32 ref: 00007FF6CE50EBDF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50EBF0
                          • send.WS2_32 ref: 00007FF6CE50EC13
                          • WSAGetLastError.WS2_32 ref: 00007FF6CE50EC1D
                          • LeaveCriticalSection.KERNEL32 ref: 00007FF6CE50EC30
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                          • String ID:
                          • API String ID: 506363382-0
                          • Opcode ID: 5b0755b5e0d2ce06b35841c5bc2c5bce5d465279ad45c3f2c2743dd5cf135806
                          • Instruction ID: 95e783d6c3f36d30caf91676f0e01aedfb19d3f0fde50c8bc30c1bac555d3e16
                          • Opcode Fuzzy Hash: 5b0755b5e0d2ce06b35841c5bc2c5bce5d465279ad45c3f2c2743dd5cf135806
                          • Instruction Fuzzy Hash: 79317271B08A8286EB509F35E46026933B0FF54B99F904132FA9EE36A4DF7EE445C750
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastSleep
                          • String ID:
                          • API String ID: 1458359878-0
                          • Opcode ID: 584ff7c4a0ade376e1590f5c5be4166b00c7f66651601a01946c64729a27996f
                          • Instruction ID: c97b96c864f7a6c05113aeba78f726727f4331cfcf81092297f29ce62985dfe7
                          • Opcode Fuzzy Hash: 584ff7c4a0ade376e1590f5c5be4166b00c7f66651601a01946c64729a27996f
                          • Instruction Fuzzy Hash: 6DA13AB1A1968286EB694F14D4243B962B5FF75BA1F946234F99EE67C4DF3FD8008300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                          • API String ID: 1294909896-116363806
                          • Opcode ID: 2fa0a04dca0a2d736e9febbc5c35a769116f2a2a83354f8b04f79121c240596a
                          • Instruction ID: 1bfd9e18883c82b76640740e10740db2e2dfacbfcd5a954398eccc7491c2fb28
                          • Opcode Fuzzy Hash: 2fa0a04dca0a2d736e9febbc5c35a769116f2a2a83354f8b04f79121c240596a
                          • Instruction Fuzzy Hash: FF914A32A08B8186EB10CF25D8646AD37B4FB54B9AF940135EE8DA77A4DF3AD455CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpy
                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                          • API String ID: 3056473165-3891197721
                          • Opcode ID: 115eca9854ca0fd17bac56368392ffc65c445426865f8d94ac47b19f7d186ac1
                          • Instruction ID: edd8a60de2c7fa2265d34745b762d07d3291ddf3958340afdbdee3da0b012ce6
                          • Opcode Fuzzy Hash: 115eca9854ca0fd17bac56368392ffc65c445426865f8d94ac47b19f7d186ac1
                          • Instruction Fuzzy Hash: 2671B372B08B018AEB10CF65E4646AD73B5FB68BA9F400235EE6DA77D4DE3AD405C350
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F6113
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F6167
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F618E
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F61B6
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F61FC
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F6203
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF6CE4F3D7B,?,?,?,00007FF6CE4F3D34), ref: 00007FF6CE4F6210
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 1492985063-0
                          • Opcode ID: 208fa52b44a035180f7d91b060c35db5a5747a70b1b81ebf8405fb8aa7e967d3
                          • Instruction ID: 2cd5470ccc938e62525b2e8daea673e17cd12c3fcaeab06ec2f34fcb6a0ba2f4
                          • Opcode Fuzzy Hash: 208fa52b44a035180f7d91b060c35db5a5747a70b1b81ebf8405fb8aa7e967d3
                          • Instruction Fuzzy Hash: 2D517432609A4281EB208F19E590238A7B0FB95F96F15C671DE9E937E1CF3EE446C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s$Connection #%ld to host %s left intact
                          • API String ID: 1294909896-118628944
                          • Opcode ID: e77895a9751036b21535ac73da886d50c503ef3642a7971e689c0f5a40f0e31f
                          • Instruction ID: 967358d9758d4d102f05689f724c2b9b53009cdfe8498c0c6d9a5319eeb031ea
                          • Opcode Fuzzy Hash: e77895a9751036b21535ac73da886d50c503ef3642a7971e689c0f5a40f0e31f
                          • Instruction Fuzzy Hash: AD919735B086C182E759DF2595603B963B0FB64B8AF844432FE9EA7356CF3EE4618740
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6CE51634B), ref: 00007FF6CE515AE7
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6CE51634B), ref: 00007FF6CE515B18
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc
                          • String ID:
                          • API String ID: 2635317215-0
                          • Opcode ID: 0254dc93bb3bd32d0669771128c780dc98bea4f5bf358c96edf4e62052080987
                          • Instruction ID: 6933df668b35309e3218f2eaaf579e02c1b47496190b372741117e8fa3e92a1a
                          • Opcode Fuzzy Hash: 0254dc93bb3bd32d0669771128c780dc98bea4f5bf358c96edf4e62052080987
                          • Instruction Fuzzy Hash: 47919D22609BC189D7558F3494503AD37A0F765B29F480236DBAC8B3DACF3AA1A4C721
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE514B6B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE514B81
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE51499D
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149BA
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149CE
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149EA
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A07
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A2A
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A3E
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A52
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A78
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A8C
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AA0
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AEF
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AFC
                            • Part of subcall function 00007FF6CE514920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514B25
                          • memset.VCRUNTIME140 ref: 00007FF6CE514BB5
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memset
                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                          • API String ID: 2717317152-3248832348
                          • Opcode ID: 7afb2b27abbf41bfa3c672d527035cb6dc133b315ca04ec1a04d1086fe65b9a4
                          • Instruction ID: 99f2dcb1fa8443ab79e3a471b7c90a292a097693686f0b4540edbc7a9b841f00
                          • Opcode Fuzzy Hash: 7afb2b27abbf41bfa3c672d527035cb6dc133b315ca04ec1a04d1086fe65b9a4
                          • Instruction Fuzzy Hash: E671826290CBC281EB51DF65D4203BD2770EBA1B99F885135EB9EA7285DF3EE4418310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memcpy
                          • String ID: 1.1
                          • API String ID: 4107583993-2150719395
                          • Opcode ID: 5300e14513d8f7ebe35a0b8dd6fefa137ce1587b572c5d9cb8c8937d774a9538
                          • Instruction ID: 1c40784d6d4415d4066edea72c1142f2d6efe017cf7618e7fd24792d5a7074e7
                          • Opcode Fuzzy Hash: 5300e14513d8f7ebe35a0b8dd6fefa137ce1587b572c5d9cb8c8937d774a9538
                          • Instruction Fuzzy Hash: 76517E72608B8586DA64CF62E4543AA73B4FB64B85F844031EEDE97759CF3DE054C301
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastmallocrecvsend
                          • String ID: Send failure: %s
                          • API String ID: 25851408-857917747
                          • Opcode ID: 863de7c726ec3fc0b01bb3668a44103df19d21e46b8851c7976f4897b69886ac
                          • Instruction ID: 95755a345269d7a985e2eb646bc4a83a486ce497232ce4fd3023979338eac6f2
                          • Opcode Fuzzy Hash: 863de7c726ec3fc0b01bb3668a44103df19d21e46b8851c7976f4897b69886ac
                          • Instruction Fuzzy Hash: 4B41E4B270578545EB608F65E8607B962B0BB58BA9F845235EEED933C4DF3ED050C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Resolving timed out after %I64d milliseconds
                          • API String ID: 1294909896-3343404259
                          • Opcode ID: e645904f14e393138d41cc4d956c1f5d7b4f2d7e58b8321eccfaa764749d0a0a
                          • Instruction ID: 9bc194e2ab65bb4743072980d7a24d2f9105efb305d5427a8b2d41319a78f141
                          • Opcode Fuzzy Hash: e645904f14e393138d41cc4d956c1f5d7b4f2d7e58b8321eccfaa764749d0a0a
                          • Instruction Fuzzy Hash: 9FD1A471E0868285FB658F6590653B923B1FF60B8EF845431FE8DA729ADF3AE4418340
                          APIs
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F34D7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3547
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F35A7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F35F7
                            • Part of subcall function 00007FF6CE4F3470: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F3647
                          • MessageBoxA.USER32 ref: 00007FF6CE4F4D97
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F4DFA
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                          • String ID: keyauth.win$null
                          • API String ID: 3545939226-2841560827
                          • Opcode ID: ed64171637d9b5b9956b76b2d1e9ffefe921fba106e267350f9c5ed2697d310b
                          • Instruction ID: 75e500db9b1620aa1a855db2c911efe732f69a54ab04e32199dfc793446c0ef5
                          • Opcode Fuzzy Hash: ed64171637d9b5b9956b76b2d1e9ffefe921fba106e267350f9c5ed2697d310b
                          • Instruction Fuzzy Hash: 6751D232B1879285FB04DF75E4643AC2371AB55B89F808134EE8D67B9ADF7D91828344
                          APIs
                            • Part of subcall function 00007FF6CE51C010: GetModuleHandleA.KERNEL32(?,?,?,00007FF6CE545E6A,?,?,?,?,00007FF6CE51C39B), ref: 00007FF6CE51C024
                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF6CE51C39B), ref: 00007FF6CE545E80
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressCallerHandleModuleProc
                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                          • API String ID: 2084706301-3788156360
                          • Opcode ID: 82a0fb6484f3e8b6611add1df3e0e797bdb1d519db4f7b5807b093002f62a582
                          • Instruction ID: 077bcb7f4ebe4e16ae184b382c117af33868356b92e400aa20bd97724336d532
                          • Opcode Fuzzy Hash: 82a0fb6484f3e8b6611add1df3e0e797bdb1d519db4f7b5807b093002f62a582
                          • Instruction Fuzzy Hash: FDF03CA1E1AB0340FF589F11A9B177013B4AF74746FC80475E48CE6391EE6FE5A58310
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Resolving timed out after %I64d milliseconds
                          • API String ID: 0-3343404259
                          • Opcode ID: 6d10da8ec952336e027cf8c184e3c1e9517f343eba6b145a19ff8fa48737c229
                          • Instruction ID: 4c2e4f9c82f537d55346193f52dcbf19736b03bc147da26c644d6b8c0267caf0
                          • Opcode Fuzzy Hash: 6d10da8ec952336e027cf8c184e3c1e9517f343eba6b145a19ff8fa48737c229
                          • Instruction Fuzzy Hash: 22B18931E0868286FBA48F2594B427D23B1FF61B4EF945535FA9EA7295DE3EE440C340
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE524D80
                            • Part of subcall function 00007FF6CE525310: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE52536A
                            • Part of subcall function 00007FF6CE5250C0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE525158
                            • Part of subcall function 00007FF6CE5250C0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE525161
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc
                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                          • API String ID: 3095843317-1242256665
                          • Opcode ID: 04a00c3a825b976bc83a577d51352bb5e16238101738be73d0353c13f482c4b5
                          • Instruction ID: 8e85e9e02987beeda4478cb731118c72f4eae2010dc83a24db90be4e82d95504
                          • Opcode Fuzzy Hash: 04a00c3a825b976bc83a577d51352bb5e16238101738be73d0353c13f482c4b5
                          • Instruction Fuzzy Hash: 1A41C371A0C6C246F760CF24A4253BA37B1ABA5785F885032EACDE7286DE3ED404CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: closesocket$calloc
                          • String ID:
                          • API String ID: 2958813939-0
                          • Opcode ID: 2e311719630227007828969db5fa304b32be0e1b8abce2cd6af2a0a5e0c61705
                          • Instruction ID: ba2f8f5f21bb0df0985fd5e9534111a29743dc24b6e0a5f1eadf49b93ca816b8
                          • Opcode Fuzzy Hash: 2e311719630227007828969db5fa304b32be0e1b8abce2cd6af2a0a5e0c61705
                          • Instruction Fuzzy Hash: 5F414236A08A8181E740DF31D4642E92371EFB8769FC84235FE9DD62DAEF3AD5458350
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 3006004123-0
                          • Opcode ID: 5976bfd24160100ad2df36c3457a3cdc8c7beb3fbc45187ce150c2c9b6e4d792
                          • Instruction ID: 41cd63ccb21660728906c7a0801b6ad7e9f411fb8570337900644c762ca77a73
                          • Opcode Fuzzy Hash: 5976bfd24160100ad2df36c3457a3cdc8c7beb3fbc45187ce150c2c9b6e4d792
                          • Instruction Fuzzy Hash: 50212B22B067C641FA169F11A55037822B09F24BFAF944730FEAC67BD2DE3D64939300
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                          • API String ID: 0-3791222319
                          • Opcode ID: 1062d8c4fcfa794554350b31ae4101be37d5c586297e745c5e4bc9d7aa0bb695
                          • Instruction ID: 05b446ea11c79c8a842ef8a8679c9f2dd739938660951aa2caf14c427fcd0a32
                          • Opcode Fuzzy Hash: 1062d8c4fcfa794554350b31ae4101be37d5c586297e745c5e4bc9d7aa0bb695
                          • Instruction Fuzzy Hash: F351E522B0968289EB10DF219568279B3B1EB757A9F948231EA9DD73D4DE7EE041C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                          • API String ID: 1294909896-3248832348
                          • Opcode ID: 1772b3dbdd24c40b34deb516f0790b8f8902f8ea61525a4a851735ece554d061
                          • Instruction ID: b174da94a2d0c356a56d4f48e806b3b1e200e33b4d4a1c58f4d3d2c603465bae
                          • Opcode Fuzzy Hash: 1772b3dbdd24c40b34deb516f0790b8f8902f8ea61525a4a851735ece554d061
                          • Instruction Fuzzy Hash: B9518162A08AC181E7418F65D4643BD6770EB94BA9F485131EFCCAB39ADFBED490C311
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE552CF8
                            • Part of subcall function 00007FF6CE553734: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6CE55373D
                            • Part of subcall function 00007FF6CE553734: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF6CE552CFD,?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333), ref: 00007FF6CE55374E
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE552CFE
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 594857686-0
                          • Opcode ID: d45501a47fe0c93f163af86d8cedd9b663048174fb29c1dc453c45f1ca705199
                          • Instruction ID: 82175ee25c516af9136a59d450565de7e91054acd522a0e99c0fe1beff760d15
                          • Opcode Fuzzy Hash: d45501a47fe0c93f163af86d8cedd9b663048174fb29c1dc453c45f1ca705199
                          • Instruction Fuzzy Hash: 7BE0EC44E5F14B15F9582E6218261B521B01F75772EA81730FEFEE92C7ED1EB4918A10
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ConsoleTitle_invalid_parameter_noinfo_noreturnmemcpyrand
                          • String ID:
                          • API String ID: 2197930578-0
                          • Opcode ID: d94dddc29e53a8d47172155ad00cd63a78f076d89053cbda679b758f1adc2db4
                          • Instruction ID: ecc1cdd83f76b3b52ef73e72c6669dc7adaec375a595ef7b109111518426f263
                          • Opcode Fuzzy Hash: d94dddc29e53a8d47172155ad00cd63a78f076d89053cbda679b758f1adc2db4
                          • Instruction Fuzzy Hash: 26F0C271A08AC681ED209F10E06433C2270FF95BAAFD04631F6EE927E4CE3EE4409200
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastrecv
                          • String ID:
                          • API String ID: 2514157807-0
                          • Opcode ID: 4c901c4136b4487d5cfc523d5afe1cbdefb8dc3579f7cbc50ae47f02235c701e
                          • Instruction ID: ef500019b9221fc615c444f48be6b566382bdeb94b41b0a81f5efb9a4dc171eb
                          • Opcode Fuzzy Hash: 4c901c4136b4487d5cfc523d5afe1cbdefb8dc3579f7cbc50ae47f02235c701e
                          • Instruction Fuzzy Hash: F5E0DFA1F0450582FF284FB1A86433821A09B64732F845734EA7A863C0DE6C44D24700
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __acrt_iob_func__stdio_common_vfprintf
                          • String ID:
                          • API String ID: 2168557111-0
                          • Opcode ID: 64a6dfbbf8d296f68d70b9412b4b18a72c97af2256e479083ee554ed7de60f30
                          • Instruction ID: c40d7643bb129db2e7c43b2d10afae0adf182ab4b102bcb04b94fa4c8bc90932
                          • Opcode Fuzzy Hash: 64a6dfbbf8d296f68d70b9412b4b18a72c97af2256e479083ee554ed7de60f30
                          • Instruction Fuzzy Hash: 56E03072608B8192D6009F50F81455AB3B4FBA87C5F804039EBCC57A64CF7CC165C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: closesocket
                          • String ID:
                          • API String ID: 2781271927-0
                          • Opcode ID: 999616c77db2e3887c3f9f8fe01128bb6490dea282ff98eb386819be609384fd
                          • Instruction ID: f06562b49a082ae73da08cb40f81d37e5cc95e9085ecbaede40d73857e461a25
                          • Opcode Fuzzy Hash: 999616c77db2e3887c3f9f8fe01128bb6490dea282ff98eb386819be609384fd
                          • Instruction Fuzzy Hash: D50196A1B055C181EB45DF6AD1A836D63B0FFD8B89F485031FB4D87299CE2ED4958340
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: socket
                          • String ID:
                          • API String ID: 98920635-0
                          • Opcode ID: cf5e51d1a4bf7630574794120a43a3685bcdb6461cb0384ef6396c409ada1fc3
                          • Instruction ID: db9253a9f7067935227707c50341f06540b159a663f55008498f3ea206f524c6
                          • Opcode Fuzzy Hash: cf5e51d1a4bf7630574794120a43a3685bcdb6461cb0384ef6396c409ada1fc3
                          • Instruction Fuzzy Hash: 2AE0223AE0268182CE08AF2284A12B92371AB60735FC44375E63D563C0CE2EE2569B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _beginthreadex
                          • String ID:
                          • API String ID: 3014514943-0
                          • Opcode ID: 8bb45da2976d398286988acd8fadef8bf7f34971bb97ccd64d6bbb3ca771250e
                          • Instruction ID: 447e25a75a31be97b9df9914d1bc15e8ab15aa7aa49449963a06565f1226d9fc
                          • Opcode Fuzzy Hash: 8bb45da2976d398286988acd8fadef8bf7f34971bb97ccd64d6bbb3ca771250e
                          • Instruction Fuzzy Hash: 6FD0C263718A00429F108F61A850029E252F798774B884738EE7D827E0DB38D1458600
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ioctlsocket
                          • String ID:
                          • API String ID: 3577187118-0
                          • Opcode ID: 0ab89bf5b60c86f36ef367bbb247df94a50ec002144ef512cae682d7c32797fb
                          • Instruction ID: 9528fe81c06979cab6281da8760961e80847f9a02ad47d114de27cc4495ec887
                          • Opcode Fuzzy Hash: 0ab89bf5b60c86f36ef367bbb247df94a50ec002144ef512cae682d7c32797fb
                          • Instruction Fuzzy Hash: 32C08066F155C2C2C3445F615485197B771BBC4205FD55435E147C112CED3CC2A58B40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$#211$fwrite$#217calloc
                          • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                          • API String ID: 2742731861-78870445
                          • Opcode ID: 0fc67a95772723a82de9b6a323919df84d450f64d6f651ef3d23f7d3c2a81af6
                          • Instruction ID: 6bd7df16f9154d5a776301e5ff33af41c1e3605c37111ec27b5ea635423d55aa
                          • Opcode Fuzzy Hash: 0fc67a95772723a82de9b6a323919df84d450f64d6f651ef3d23f7d3c2a81af6
                          • Instruction Fuzzy Hash: A1428472B09B4286E710DF6295642B933B1FB64B89F804432EE8EA7794DE3EE455D340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                          • String ID: array$number overflow parsing '$object$object key$object separator
                          • API String ID: 1664669839-85532522
                          • Opcode ID: 897081a7bd7634a7eeeefdb572b3a23f29dc86dd5a4ccd0dde15270ec1d942b8
                          • Instruction ID: afa396d9fbb84dd40d5a0df21687343b20090ae9eac5a66c2893d44d4840438f
                          • Opcode Fuzzy Hash: 897081a7bd7634a7eeeefdb572b3a23f29dc86dd5a4ccd0dde15270ec1d942b8
                          • Instruction Fuzzy Hash: C0A2C662A18B8686EF10CF68D4443AD2371FB55BA5F509235EADDA7AD9DF7CE081C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                          • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                          • API String ID: 1025660337-777782649
                          • Opcode ID: c9dcd3d3987a12d53f45995fa24dec8f457d42c5b6b5cc3b40d9e4318cb59d90
                          • Instruction ID: 0a06d5291fc26873c85299636ee3f99b095443fbe6da9ebdbd8109eb0f2bad0b
                          • Opcode Fuzzy Hash: c9dcd3d3987a12d53f45995fa24dec8f457d42c5b6b5cc3b40d9e4318cb59d90
                          • Instruction Fuzzy Hash: E1129F75A08A8282EB648F15A4643B973B0FB65B86F844135EECEE7794DF7EE444C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocstrncmp
                          • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                          • API String ID: 1436789207-471711153
                          • Opcode ID: f5aa2a3b72427ac3efbd59ab5ff24d4843ba125c3f1a9a7ec2f0d467d4f9c03f
                          • Instruction ID: fd1e2ca43ee9cf23644c04b7bf284a70fbfbca5bedd74272e465b63428a7d926
                          • Opcode Fuzzy Hash: f5aa2a3b72427ac3efbd59ab5ff24d4843ba125c3f1a9a7ec2f0d467d4f9c03f
                          • Instruction Fuzzy Hash: 96A1B125B0D64281FE509F62A4302B963B0AF65BD2FC44535FE8EA7794DF3EE4459300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateFile_errnofree
                          • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                          • API String ID: 1377488173-902404565
                          • Opcode ID: 4ef997890e21ee2b6ede1455b427ae8585ab3804f843de745b925b65734bc92f
                          • Instruction ID: be81350c780baf23cf9c34cd32940c8dc609d9b6fd73ad96436283aaa9008e5f
                          • Opcode Fuzzy Hash: 4ef997890e21ee2b6ede1455b427ae8585ab3804f843de745b925b65734bc92f
                          • Instruction Fuzzy Hash: 52B1A1A5B0874282EA208F65E4206AA63B5BF64785FC01436FDCEE7B95DF7EE505C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                          • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                          • API String ID: 1339443121-1021110354
                          • Opcode ID: 417984568cb3bb09a9ec995b3f70e0b3dbd78b579f572f14e818ca5481ebab13
                          • Instruction ID: 74084dc01409feeb28b141d9cdafe2c77569916f00d0d40f3ab4749db4f941a3
                          • Opcode Fuzzy Hash: 417984568cb3bb09a9ec995b3f70e0b3dbd78b579f572f14e818ca5481ebab13
                          • Instruction Fuzzy Hash: 4202B222A0D7C289EA51CF55A4643BA67B4EF66B86F881035EECD97785DF7EE404C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                          • API String ID: 2190258309-2223379150
                          • Opcode ID: 0c826b8d39769713cb702df9992078b6bb46f2c3275ed240e172b7baba578129
                          • Instruction ID: b8e4a99c340aea7302e63930064ff9c7687eb390cfb5412e3763023b196077b6
                          • Opcode Fuzzy Hash: 0c826b8d39769713cb702df9992078b6bb46f2c3275ed240e172b7baba578129
                          • Instruction Fuzzy Hash: 23127F72A08B458AEB11CF61E4642AD37B4FB54B86F840036EECE97B98DF3AD514C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp$memset
                          • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                          • API String ID: 3268688168-2769131373
                          • Opcode ID: 3a2d566405f58e07a26b211ce09203f59ecb060a0523437c51504bf8719f1765
                          • Instruction ID: 79b8b867202463994cbfb323e751b17708b89b1d73ed6a3c8fbb101d53f268be
                          • Opcode Fuzzy Hash: 3a2d566405f58e07a26b211ce09203f59ecb060a0523437c51504bf8719f1765
                          • Instruction Fuzzy Hash: 3FE1C266E18682C5EB50CF61D4602BD6370FBA9789F805236FE8EA3765DF6ED444C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                          • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                          • API String ID: 4221717217-4282655970
                          • Opcode ID: 4f112af17fb67a23f2d20053220846bfce6bc761a204968eec3052061f775bdd
                          • Instruction ID: ed576c08cdc3bde8cae7f89ee4d9556a9032921aedbc7ba59ef3f086c200aa39
                          • Opcode Fuzzy Hash: 4f112af17fb67a23f2d20053220846bfce6bc761a204968eec3052061f775bdd
                          • Instruction Fuzzy Hash: 8B818E61B0964286FB598F2198743B927B0BF75B96FC44535EA9EE63D0EF3EE4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                          • String ID: array$number overflow parsing '$object
                          • API String ID: 958247072-579821726
                          • Opcode ID: 1f85228a8e1dcd96c5749357920a7be9297188ea7e4e065a2d09485e3d617784
                          • Instruction ID: eb63ef22055370efcbda833e8cdb6161eda2054fa69ca3b34e1068294015bdf5
                          • Opcode Fuzzy Hash: 1f85228a8e1dcd96c5749357920a7be9297188ea7e4e065a2d09485e3d617784
                          • Instruction Fuzzy Hash: 2C329262A18A8685EF10CF68D4443ED2371FB65BA5F409235EADDA7AD9DF7CE181C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                          • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                          • API String ID: 4221717217-1887299029
                          • Opcode ID: d81118415de279e1bd8c7ef0bff756aefff24ffe37d1422fcd19cfe41d797d7c
                          • Instruction ID: 683173973eb85ebc062ac0d5b64d279af6c2ff620f6f0745ee15baa4873b5119
                          • Opcode Fuzzy Hash: d81118415de279e1bd8c7ef0bff756aefff24ffe37d1422fcd19cfe41d797d7c
                          • Instruction Fuzzy Hash: 44819F61B0964286FB598F2198643B927B0BF75B96F844535EA9EE63D0EF3EE4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup$fclosefgetsfopen
                          • String ID: $default$login$machine$password
                          • API String ID: 431015889-155862542
                          • Opcode ID: 120d301832f87ea5628d90ead2db6dd58f88ec22e2c86d66c45c4a88094fe9e5
                          • Instruction ID: 2fc1aa270247e987b30001d9d681c2f88c8e40f311951b47bfbd90a61d91ba9c
                          • Opcode Fuzzy Hash: 120d301832f87ea5628d90ead2db6dd58f88ec22e2c86d66c45c4a88094fe9e5
                          • Instruction Fuzzy Hash: 7EA1B962A4D6C245FA619F11A43037A66B0BFB4786F885032FECDE6794DE3EE4648700
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$memcpy$_invalid_parameter_noinfo_noreturnmalloc
                          • String ID: 1.0$aqua$black$blue$bright white$green$grey$light aqua$light blue$light green$light purple$light red$light yellow$purple$red$uaHQW8FPzW$valorantplus$valorantplus$white$yellow
                          • API String ID: 2521954609-3145754764
                          • Opcode ID: 69b15d03ec6337db883e88422c229bc7fd9d859ecb5634d82d7c52e76ca82bd6
                          • Instruction ID: ab14d888f9d6f1b1683d5dd44f4475ee38fd4f0398efa58ac4a7babda6dfe870
                          • Opcode Fuzzy Hash: 69b15d03ec6337db883e88422c229bc7fd9d859ecb5634d82d7c52e76ca82bd6
                          • Instruction Fuzzy Hash: B532C232914BC699E760CF30D8902EA3374FBA434DF909326F68C66956DF79A789C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                          • String ID: @
                          • API String ID: 2041421932-2766056989
                          • Opcode ID: 1eb8a48e2300e5bf157cfc237dde58775f69cb9af600b55eba24a45786b79056
                          • Instruction ID: aaf25e906c8105955cd21832b45142eb43c6951448cb42a1f69e7292aaca5e1d
                          • Opcode Fuzzy Hash: 1eb8a48e2300e5bf157cfc237dde58775f69cb9af600b55eba24a45786b79056
                          • Instruction Fuzzy Hash: 2F311D366196C186EB60CF11E854A6A7B74FFE5B81F844135EE8EA3B64CF3DD4458B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchr
                          • String ID: Unknown error %u (0x%08X)
                          • API String ID: 1897771742-1058733786
                          • Opcode ID: d84f3f5b4417d24dde26fdb44b697695d289cb837b7e06a603b2ceecd887a71f
                          • Instruction ID: 7454a48dd6a359c1db7eb75d3f7e3a7503c4041536e7d04859b8a96d74cf88e8
                          • Opcode Fuzzy Hash: d84f3f5b4417d24dde26fdb44b697695d289cb837b7e06a603b2ceecd887a71f
                          • Instruction Fuzzy Hash: 9E21C831A497C1C6E7515F21A42422A76B0AF64BD6F844134FECEA3B95CFBEE5408701
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                          • API String ID: 0-2774518510
                          • Opcode ID: 9c467e42603e081e45cec4e688cc9939d413c5be2b5618097dbca3e2b5c45818
                          • Instruction ID: 1d81d2dea87cb5d4943045241e79a6e81b7034fd7c693655b2cc8692fba23dfa
                          • Opcode Fuzzy Hash: 9c467e42603e081e45cec4e688cc9939d413c5be2b5618097dbca3e2b5c45818
                          • Instruction Fuzzy Hash: BC42DA61A0C7C245EB558EA581203B937F1FB62B4AF886035EFDEA7285DF2EE451C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                          • String ID: @
                          • API String ID: 3606780921-2766056989
                          • Opcode ID: 082323a5f092b46e25be36ed7ee31bbafcb87e115c1c4ceae835060f559dbb31
                          • Instruction ID: 246af4e78544ce6006fdb9de616efdb66b3ad14d1948a71261e1b62effc7f54d
                          • Opcode Fuzzy Hash: 082323a5f092b46e25be36ed7ee31bbafcb87e115c1c4ceae835060f559dbb31
                          • Instruction Fuzzy Hash: F4219132619785C6EB608F11E46066AB370FBD9B86F805135FACE93A58CF3ED4458B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 313767242-0
                          • Opcode ID: 8bab5ded550b86401e2723e37e838836c295cd33c65aafcb946cd39ac4b2147a
                          • Instruction ID: 640064b0cc55592fda4bddbc098fdd018d2e2e634b66993c852c9942d51e9b62
                          • Opcode Fuzzy Hash: 8bab5ded550b86401e2723e37e838836c295cd33c65aafcb946cd39ac4b2147a
                          • Instruction Fuzzy Hash: B9315E7260AB8586EB608F60E8503FD7370FB94745F84403AEA8E97B99DF79D648C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                          • String ID: @
                          • API String ID: 3016261861-2766056989
                          • Opcode ID: 1788b0ae83449a45a2ade76b7383e2518fda4de1d4ee8bc5fad836e17e610514
                          • Instruction ID: cfd84e6bec4a87ec4925999046e8448a8af35a3a9aa12f08a50938857748e79e
                          • Opcode Fuzzy Hash: 1788b0ae83449a45a2ade76b7383e2518fda4de1d4ee8bc5fad836e17e610514
                          • Instruction Fuzzy Hash: 9941AD22A056A08EF7108FB5E4603EE3BB0E75A349F444025EE8963A9ACF3DD11AD750
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF6CE52FF78,?,?,?,?,?,?,00007FF6CE5471BE), ref: 00007FF6CE52FFF6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF6CE52FF78,?,?,?,?,?,?,00007FF6CE5471BE), ref: 00007FF6CE53015D
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE5302BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: %c%c%c%c$%c%c%c=$%c%c==
                          • API String ID: 3985033223-3943651191
                          • Opcode ID: cacad52c925f5218b3d33db38ab2126b830451db61f18385c2c7449608d761c1
                          • Instruction ID: 000419d640ebd44d363f97f2c663f74ad8e1e88c2a690e96b95c559ede07ab56
                          • Opcode Fuzzy Hash: cacad52c925f5218b3d33db38ab2126b830451db61f18385c2c7449608d761c1
                          • Instruction Fuzzy Hash: 4891D732908AD185E7658F25A4243BA7BB0EBA5795F884231FADD977D6CF3ED401C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$ErrorLastbind
                          • String ID: bind() failed; %s
                          • API String ID: 2604820300-1141498939
                          • Opcode ID: d5849b88b19d97702c076809e3d371474d12a2961274c776bb8a89410a3bac8a
                          • Instruction ID: 7a99c25fb22e4be9c7b223e5c80b95f334702f4b4cda5e6b708e3f8d7050b753
                          • Opcode Fuzzy Hash: d5849b88b19d97702c076809e3d371474d12a2961274c776bb8a89410a3bac8a
                          • Instruction Fuzzy Hash: 2E519135A0878281EB258F25D8613F962B0FB58B85F844035EA9D97785DF3FE4518720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$ErrorLastbind
                          • String ID: bind() failed; %s
                          • API String ID: 2604820300-1141498939
                          • Opcode ID: ce2d296cf8783bc94a88b2c1d0c80a5ce672f6c6ce68c514c241579a7bac9d96
                          • Instruction ID: 7af5ba862e6ce414c21f37543b3f81e4e5194e4cb4cee27d22bc35e64e3ae909
                          • Opcode Fuzzy Hash: ce2d296cf8783bc94a88b2c1d0c80a5ce672f6c6ce68c514c241579a7bac9d96
                          • Instruction Fuzzy Hash: 1041BE32A08B8286EB148F25D4643B933B0FB58B95F844136EA8DCB781DF7EE465C710
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                          • API String ID: 0-2102732564
                          • Opcode ID: 2a48ad6cef984a9ea5c1fae6b38a6bb216c9540a4b5d462fd645c5f3228d850f
                          • Instruction ID: 0680070420da1da90c63b114bf2fa4a51095c1ba9ef0d3d840d62ebe7cdb8374
                          • Opcode Fuzzy Hash: 2a48ad6cef984a9ea5c1fae6b38a6bb216c9540a4b5d462fd645c5f3228d850f
                          • Instruction Fuzzy Hash: 1721BA91E0AA4A43FE08CFD5A4347F452305FB4782EC44432F88EA63A1DF7EA986C240
                          APIs
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6CE553D3B
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 1848478996-631824599
                          • Opcode ID: e6cef69aee3141f14ee97e917ddaed074d2a29b6d4041a8ca2c1c7a45bda0501
                          • Instruction ID: 0dda9a24ad135030dd02a85c2d9ea7ef9815201c9794942a4fac87e8423b83cc
                          • Opcode Fuzzy Hash: e6cef69aee3141f14ee97e917ddaed074d2a29b6d4041a8ca2c1c7a45bda0501
                          • Instruction Fuzzy Hash: 2D11823261478292E7448F21DA6137932B4FF24746F804134E68DD6A94DF7EE474C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Context$Release$AcquireRandom
                          • String ID: @
                          • API String ID: 2916321625-2766056989
                          • Opcode ID: e05c50b21d959d8e395491d60bbc47aa5adc7d80906625a7559923a369537477
                          • Instruction ID: ec5a8938f1c0579ada2a9f40cbef2dffa1dcc6391386b40b8cefd177c65cd775
                          • Opcode Fuzzy Hash: e05c50b21d959d8e395491d60bbc47aa5adc7d80906625a7559923a369537477
                          • Instruction Fuzzy Hash: AAF03165B08B81C2E7108F65F85432BB770EFA8BD5F944430EF8DA66A9DE7DC4858B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 99ceee5d647225e7261e63e45ab74b95ec5175b664bee8bc72b1c3e7bc0a526f
                          • Instruction ID: 2e749669f092082ec2e9840db8e120a76b3c91d94a309dcfdf680ba017b731ca
                          • Opcode Fuzzy Hash: 99ceee5d647225e7261e63e45ab74b95ec5175b664bee8bc72b1c3e7bc0a526f
                          • Instruction Fuzzy Hash: 90114C22B15B0589EF408F60E8652A833B4FB28769F841E31EAADD67A4DF79D1548340
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                          • String ID:
                          • API String ID: 2110207923-0
                          • Opcode ID: 34c936b0a9c703c2195cdcb355cbdb83e9601ea6e0023119d1c346eafcc79f3c
                          • Instruction ID: 876adb89cfd330abcd4c058886fdbc379c4fbd8431ab9aba140e3537bb2ca59b
                          • Opcode Fuzzy Hash: 34c936b0a9c703c2195cdcb355cbdb83e9601ea6e0023119d1c346eafcc79f3c
                          • Instruction Fuzzy Hash: 4E017136609681C2EB50CF21E46532AB330EB95B8AF544531EB8D56A68CF7EC488CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$AcquireContextCreateHash
                          • String ID: @
                          • API String ID: 1914063823-2766056989
                          • Opcode ID: b862b517ba0bd64001c480fe4c624aace2dc47611f69372d84f0203f44008b0f
                          • Instruction ID: 9efda6fd323eb0dec0e84284a588e0aeb4be5352119eb519ae811d50d8e5b6a8
                          • Opcode Fuzzy Hash: b862b517ba0bd64001c480fe4c624aace2dc47611f69372d84f0203f44008b0f
                          • Instruction Fuzzy Hash: 77E04862B1469283F7608F65E415B167360EBA4749F884030DFCC56B54DF7EC1558F14
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Xbad_function_call@std@@
                          • String ID:
                          • API String ID: 1029415015-0
                          • Opcode ID: 782d4cc1314472888749f682ab7d939439a3d052ee13c76280ac9d32abdb7d4d
                          • Instruction ID: 819d934f60c3f561fd32921ee176da8d4097988a2bdf9f1e6b5ed2d4c69291be
                          • Opcode Fuzzy Hash: 782d4cc1314472888749f682ab7d939439a3d052ee13c76280ac9d32abdb7d4d
                          • Instruction Fuzzy Hash: 70817C62B19B9A89EB00CF69D4943AC37B0E765B89F548026EF8DA7795DF3DD041C340
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 25ca6de128e55fb6ce216344201d591ed70013569d8b0f4d9d2315b49ebf49f1
                          • Instruction ID: efadba9f716916065e3f5b8b142f8902e3ee68189823e0593877ac56b0e85c85
                          • Opcode Fuzzy Hash: 25ca6de128e55fb6ce216344201d591ed70013569d8b0f4d9d2315b49ebf49f1
                          • Instruction Fuzzy Hash: F761D562A19B8682DA10CF19E4446796371FB69BE6F11D235EF9E97B84EF3CE1418300
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                          • Instruction ID: adac722210679cd33418add525afdfe46a8004d4ccb00f8c173f55bf6f0db514
                          • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                          • Instruction Fuzzy Hash: C9F05829325767AAFE008A3B4624FAD2E509B90741FA36864CCC0420CBCA9E5493D714
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12047c80ebe4bcc38adf0cdfcd9573bb89e240435a430d77410cd1ca2cdc25a8
                          • Instruction ID: 55c55531b2fb732ff6694e868d44e29157398c75e64366510423720cf3b8587b
                          • Opcode Fuzzy Hash: 12047c80ebe4bcc38adf0cdfcd9573bb89e240435a430d77410cd1ca2cdc25a8
                          • Instruction Fuzzy Hash: 7BA00162A4AA8AC0A6108B16E6A0E266660FBA8B5A7959021D94E96860CE6A95428200
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2deab06299b5b0072e02a87b154cca8802c303cad1b5a34a14635d41f16380f5
                          • Instruction ID: 03237a2caaaf7617b7775c3175710ab0b86878b4e36ee4f62fb42f260c88843b
                          • Opcode Fuzzy Hash: 2deab06299b5b0072e02a87b154cca8802c303cad1b5a34a14635d41f16380f5
                          • Instruction Fuzzy Hash: 66A00121A0A84690E6048F20E9600307330EB60302B810435E18DA54A9DE7EA5108300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strcmp$strncpy$strchr
                          • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                          • API String ID: 1395212091-3550120021
                          • Opcode ID: f4201c3ebc7a936199a8356e3c549b6c306c6fe13998301a96da1393634263f1
                          • Instruction ID: d4b5c7ad2be4b4f05bb6cafbeb36d4c0c7bc5dfbf7b1f6bd5dc1414aaf809514
                          • Opcode Fuzzy Hash: f4201c3ebc7a936199a8356e3c549b6c306c6fe13998301a96da1393634263f1
                          • Instruction Fuzzy Hash: 6E021612F19517A1FB509F24D9641B923B5AF3034BFE04032F98EEA099EE5EF546C381
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                          • API String ID: 1294909896-2200874227
                          • Opcode ID: 23678354ea3f23a5995a636bf68add3aadb59c8ca7b5c683519bd05585954df7
                          • Instruction ID: 46cb13ac35baff30e72c44fe86da15e5f26bbca43a7706338d9a83fdf82b51a1
                          • Opcode Fuzzy Hash: 23678354ea3f23a5995a636bf68add3aadb59c8ca7b5c683519bd05585954df7
                          • Instruction Fuzzy Hash: 6D02A325A0978281EA64DF21E4603B963B1EF60786FC40036EEDDE7796EF3EE4458310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memcpy$htonl
                          • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                          • API String ID: 82385936-242323837
                          • Opcode ID: a8397c215724f632e5744daf35831221ed87b7b74fff3a08a4de72df6ab63d0a
                          • Instruction ID: 0a07a9b65deeb477a38d9b1a164a31af0c6816b27271e9936302d0f9ef507ed7
                          • Opcode Fuzzy Hash: a8397c215724f632e5744daf35831221ed87b7b74fff3a08a4de72df6ab63d0a
                          • Instruction Fuzzy Hash: C0C16072A19B4286EB10CF65E4602AD77B4FB54B95F804035EE8EA7B98DF3EE405C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: aa421b02ee1a9bb1142f222c8ef83d204ac9fdbd3b2a9a50c4576232eef0ff70
                          • Instruction ID: bf2405c721dd99a00cc643c3732183361a878cec3f019d3bdc07b2a767fc1643
                          • Opcode Fuzzy Hash: aa421b02ee1a9bb1142f222c8ef83d204ac9fdbd3b2a9a50c4576232eef0ff70
                          • Instruction Fuzzy Hash: A071FB76918B8181DB40DF61E4A53BC33B8FB94F9AF481431DE9E9A318CF3A91658331
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                          • String ID: array$number overflow parsing '$object
                          • API String ID: 1391767211-579821726
                          • Opcode ID: ea2d0396c8f191f992d0f2f5919d327607649db06ba931623e2468fee896ad31
                          • Instruction ID: 68557bcd56532d12273bfa084044a8f879d078c76eb3ce7a0a4a9833c84fa9dc
                          • Opcode Fuzzy Hash: ea2d0396c8f191f992d0f2f5919d327607649db06ba931623e2468fee896ad31
                          • Instruction Fuzzy Hash: 4E22C662A18B8686EB10CF78E4443AD3371FB55BA5F505235EA9DA7AD9DF7CE081C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$_strdupfreehtonsmemset
                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                          • API String ID: 130798683-4053692942
                          • Opcode ID: 3ab14d4c703a9b1e3d824fdd9e47185ccd7e52835745cbace91c64c7b1cb41c7
                          • Instruction ID: bd21778c0762c6124937e4bd55ae191d96ca7145b1c8d93038e0843397c3ceae
                          • Opcode Fuzzy Hash: 3ab14d4c703a9b1e3d824fdd9e47185ccd7e52835745cbace91c64c7b1cb41c7
                          • Instruction Fuzzy Hash: 33E1B372A08A8286EB60CF11D4603BD77B4FB64B95F844036EA8EA7785DF7EE554C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                          • String ID: array$number overflow parsing '$object
                          • API String ID: 1346393832-579821726
                          • Opcode ID: 83047499cedd7b0348272822f581b2d2d9134c76b4fb3a593c779d18fe0018a6
                          • Instruction ID: 80dedd7b0480fed73e5a67b4ec7bedfec67f02986f6c568255b7bce4dd64e207
                          • Opcode Fuzzy Hash: 83047499cedd7b0348272822f581b2d2d9134c76b4fb3a593c779d18fe0018a6
                          • Instruction Fuzzy Hash: 05129662E18A8685FF00CF68E4443AD2371EB657A5F509235EADDA7AD9DF7DE081C300
                          APIs
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509107
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509113
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FA44
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FA4C
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FA73
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FA7C
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FB00
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50FB09
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                          • API String ID: 1294909896-1595554923
                          • Opcode ID: 3b251fc1422559d088b0442fe48444d67342af4a5fc5820eebc5f1f98a3d2395
                          • Instruction ID: 828e7ffc9211a67d714cde1e2897e86711f3f253e94b1ce30e696a5fda4ed33e
                          • Opcode Fuzzy Hash: 3b251fc1422559d088b0442fe48444d67342af4a5fc5820eebc5f1f98a3d2395
                          • Instruction Fuzzy Hash: 3CE1B321A0968291EA658F1196212B977B4FF20B8AFC84435FECDE7681DF3FE455C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                          • API String ID: 1294909896-115817326
                          • Opcode ID: 418d22dab3358cf896b8c0334a352bf217a22b17e1ce7865d06ee0be5e9d0993
                          • Instruction ID: 4013e48a6468204de7e3d31c5bc486854157108fe92826f2bc60a05e1f0074eb
                          • Opcode Fuzzy Hash: 418d22dab3358cf896b8c0334a352bf217a22b17e1ce7865d06ee0be5e9d0993
                          • Instruction Fuzzy Hash: 9E918D21E0DB9285FA648F51D4683B927B4EB31B96F844036FA9CA76D5DF3EE811C310
                          APIs
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE4F7C56
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6CE4F7CE8
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6CE4F7D29
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7E73
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7EB2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7F00
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7F41
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7F9E
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F8058
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F8099
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F8166
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F81A7
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4F81CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                          • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                          • API String ID: 264867259-3075834232
                          • Opcode ID: 4484d8fd78b33f8dd988f0e6b9b6adc27fd666d131503a6e7e1b1b9daa30a254
                          • Instruction ID: 83bd0ac1196ff2e8a712e499691c8be5e716c4d3a8dbca8222d16470c5e09d64
                          • Opcode Fuzzy Hash: 4484d8fd78b33f8dd988f0e6b9b6adc27fd666d131503a6e7e1b1b9daa30a254
                          • Instruction Fuzzy Hash: 3312C162A18B8245FB14CF64E40436D2771EB65BA9F809731EAADA77D9DF7CE484C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchrstrrchr$_strdupstrstr
                          • String ID: .$/$/$/$?
                          • API String ID: 2325335452-1821401756
                          • Opcode ID: a17a54aa7133aafaaa9c2ac08328899516170b185ddf7fb9db02016165d41d25
                          • Instruction ID: 0ccb60508dd38ebbe7907bc27fa1337c4f27ccee4934adf80edd7b163e560b4d
                          • Opcode Fuzzy Hash: a17a54aa7133aafaaa9c2ac08328899516170b185ddf7fb9db02016165d41d25
                          • Instruction Fuzzy Hash: 1F81D457A0C28645FB655F1196203796BF1AF65786FC84032EECDA73CADE3EE461A300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$free
                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                          • API String ID: 3578582447-31095704
                          • Opcode ID: 57f8084c941ee84307938c7e196d8c571a2c12fcedb7f3f1afc5e4682f856cc2
                          • Instruction ID: 53f6d087f572af944ed9d8adb8527fe0c8db68a260088008ba1eb9925512b4a0
                          • Opcode Fuzzy Hash: 57f8084c941ee84307938c7e196d8c571a2c12fcedb7f3f1afc5e4682f856cc2
                          • Instruction Fuzzy Hash: B081D361B4D28640FB619F1299302B566F1AF65BC2FC84431FECDE7785DE6EE401C260
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: d658d599a0d1eb89a00984e771f87287ed748dc7128620961ebbc626422fa7af
                          • Instruction ID: 732fb59f16abf4019b219debdce964b5732f066c7c1887e73ddaadfc044835cf
                          • Opcode Fuzzy Hash: d658d599a0d1eb89a00984e771f87287ed748dc7128620961ebbc626422fa7af
                          • Instruction Fuzzy Hash: 6B91D376A18B8193E749CF21E9A02A87378F759F49F041135EFAE87354CF36A2718320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                          • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                          • API String ID: 1094891576-1753329177
                          • Opcode ID: 55ad13cea51b9193daabda6f8ec91d68e53a31f2c389824ba380a7271e4da1ee
                          • Instruction ID: 9d8f89942ff3d6e17b0d6087d02853aa124499302e9706d15832ca114c5ef6ab
                          • Opcode Fuzzy Hash: 55ad13cea51b9193daabda6f8ec91d68e53a31f2c389824ba380a7271e4da1ee
                          • Instruction Fuzzy Hash: 77D1B22AA1968685EB218F21D4283F93770FB75799FC45231EA9DA7AD5DF3EE401C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                          • API String ID: 1294909896-874090715
                          • Opcode ID: 8623f1b333574cf8bcf57701875c6224aec00bc4894f46d89a6a5a544acd2936
                          • Instruction ID: 4e8ae3a46c0ba800b1aa6580bbc2d6348a01186fdcffee660142d0112704feb0
                          • Opcode Fuzzy Hash: 8623f1b333574cf8bcf57701875c6224aec00bc4894f46d89a6a5a544acd2936
                          • Instruction Fuzzy Hash: FDA1CC62E0874289FB10DFA5D4606BD27B5AB6578AF844531EE8DE3785DF3EE904C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                          • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                          • API String ID: 2243338858-131330169
                          • Opcode ID: 7403cf26366828f405d8287ee280245dd47af2536252dbba77c54129c1d1079c
                          • Instruction ID: 6824033bf4222534197b5a35898850bdc95ad235dd949356939804a0b24fbad0
                          • Opcode Fuzzy Hash: 7403cf26366828f405d8287ee280245dd47af2536252dbba77c54129c1d1079c
                          • Instruction Fuzzy Hash: 4B91E122B0C78282EA55CF25A42027963F0FB55B92F944039EBCEA37D5DF7EE4548701
                          APIs
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DDB3
                          • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DE2D
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DE51
                          • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DEA0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DEDA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DEEC
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DEFF
                          • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DF1A
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DF30
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50DF39
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                          • API String ID: 1368378007-4087121635
                          • Opcode ID: 1d56b44139449c6db4f3cf61deeccf1020aca52a27cded63d20186eb9e816fa6
                          • Instruction ID: 6a1b9e9fa8713e8240887c6b1354c2f7cb65f72e260e50a4bdd2610138870271
                          • Opcode Fuzzy Hash: 1d56b44139449c6db4f3cf61deeccf1020aca52a27cded63d20186eb9e816fa6
                          • Instruction Fuzzy Hash: 08514061A1D68246FE659F21A93427A33B0AF75B9AFC45435FDCEE6390DE3EE4058300
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                          • API String ID: 0-3760664348
                          • Opcode ID: 498de5cd744b0741ed3635551fa6fa6e30802d32ec2df0f5d96b0ad602538052
                          • Instruction ID: 0294ad06764698777dc2bb1157e3f596e6e854697567f76804269a9783f54b00
                          • Opcode Fuzzy Hash: 498de5cd744b0741ed3635551fa6fa6e30802d32ec2df0f5d96b0ad602538052
                          • Instruction Fuzzy Hash: 61E1C1A6A0C6C189EB548F15D06437977B0FB65B86F849036FA8EA7786DF7EE044C700
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6C7E
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4F6CAC
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4F6CBA
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6CF4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6D45
                          • memset.VCRUNTIME140 ref: 00007FF6CE4F6B73
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                            • Part of subcall function 00007FF6CE4F7AE0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F7C56
                            • Part of subcall function 00007FF6CE4F2780: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F28F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6EB2
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4F6EDE
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4F6EEC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6F27
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F6F7A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F7061
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6CE4F7079
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6CE4F7086
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                          • String ID: value
                          • API String ID: 2102519606-494360628
                          • Opcode ID: 550cbea3a911ff12450a5818f22cd1eb358e4c722d8d09ac2395583a520f1132
                          • Instruction ID: 107f41bf320411c37a1311cf613f9c6cd14bc3bb68b001d4875c9be15df429e0
                          • Opcode Fuzzy Hash: 550cbea3a911ff12450a5818f22cd1eb358e4c722d8d09ac2395583a520f1132
                          • Instruction Fuzzy Hash: A4F1B322A18A8285EB10CF74E4443AD7770EB95BA9F509331FAED52AE9DF7CD185C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                          • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                          • API String ID: 2572311694-3353508759
                          • Opcode ID: 220337b4bee03760ea6e3943104791c253caa592fa02a501f9afb6be55ceed4e
                          • Instruction ID: fa618c625c3d130fa5aa963497bc5edf0eb9ca72f57ec5e80824693e99f6187d
                          • Opcode Fuzzy Hash: 220337b4bee03760ea6e3943104791c253caa592fa02a501f9afb6be55ceed4e
                          • Instruction Fuzzy Hash: 07B18562B08A8282EB619F15D8643B963B1EFA4B86F845035F98DE77D4DF3EE445C700
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6CE5436DF), ref: 00007FF6CE5509DD
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF6CE5436DF), ref: 00007FF6CE5509FF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6CE5436DF), ref: 00007FF6CE550A10
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6CE5436DF), ref: 00007FF6CE550A3E
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: ../$/..$/../$/./
                          • API String ID: 111713529-456519384
                          • Opcode ID: a75eb33e81dc8e798062f8c5b7953372be5622ec13724452a985b9af31ee4b50
                          • Instruction ID: 4d222aacb32eff103188faddca1e1532e2790380d3587a01251531aa59c35c9c
                          • Opcode Fuzzy Hash: a75eb33e81dc8e798062f8c5b7953372be5622ec13724452a985b9af31ee4b50
                          • Instruction Fuzzy Hash: 5571D721E0E68282FB229F11957027D7B70AB72BB6F844171EADE927D4DE3EE451C311
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID:
                          • API String ID: 2653869212-0
                          • Opcode ID: ecaf645ea1409842e54c2ca9caa86425db3d8e01e42d124ac3ae0b50072ede22
                          • Instruction ID: de1d775156055c70027e4294934ee1b7ee654885ea96ccdc9386b75dbb1ab5cb
                          • Opcode Fuzzy Hash: ecaf645ea1409842e54c2ca9caa86425db3d8e01e42d124ac3ae0b50072ede22
                          • Instruction Fuzzy Hash: E7B17B36A0AB81D6EA25CF95E56037933B4FB64B56F840135EBCE93780DF3AE0649310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                          • API String ID: 111713529-3006446216
                          • Opcode ID: 56071c6eda54952a3fbe1923a43b8368e6934f71e01164f5a98e457e80ea09f4
                          • Instruction ID: 348898fd361af9c442faac0bc76affae9039cbbbefeffcae3469bab1956e4349
                          • Opcode Fuzzy Hash: 56071c6eda54952a3fbe1923a43b8368e6934f71e01164f5a98e457e80ea09f4
                          • Instruction Fuzzy Hash: 6871C4A2E0D7C246EB518F2590642B97BB0EB6574AF984033FACEA3365DE2ED115C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                          • API String ID: 2190258309-1086287758
                          • Opcode ID: 60d6fd4d9496bc5a75371e53f8fa4c1ccef21f004a31d901caf2278722719f1d
                          • Instruction ID: 6bf8ef79b2d6870a31b756fb199126b370c8812ce36b546a22c32d4781799214
                          • Opcode Fuzzy Hash: 60d6fd4d9496bc5a75371e53f8fa4c1ccef21f004a31d901caf2278722719f1d
                          • Instruction Fuzzy Hash: 10B14F72A08B468AEB108F65E4602AD37B4FB58B95F800036EE8DE7B58DF3ED555C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloctolower
                          • String ID: %%%02x
                          • API String ID: 1244608590-4020994737
                          • Opcode ID: 485ca5efc7fac49324a9721e3d63d5cec0a9c744f99b361fb578be1ce2059ea8
                          • Instruction ID: 176ac0f9ce8945671402bef6a99e80bd71a530c3ae55f27b08cb3fbd8e9c1b38
                          • Opcode Fuzzy Hash: 485ca5efc7fac49324a9721e3d63d5cec0a9c744f99b361fb578be1ce2059ea8
                          • Instruction Fuzzy Hash: 55A1E41590D6A245FF628F2194303796BF09F65B86F884432EECEE63D1DE2EE465C320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcmp
                          • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                          • API String ID: 1475443563-555813803
                          • Opcode ID: 3f7a138a4cf8b5a7f6787de4ec62280f8b8da26ad5964f60277828d290879385
                          • Instruction ID: fe4eec282d437cb13b8e3b4aa8baf1ff07c0d03ad45a9188d0a6d26eca45ed5b
                          • Opcode Fuzzy Hash: 3f7a138a4cf8b5a7f6787de4ec62280f8b8da26ad5964f60277828d290879385
                          • Instruction Fuzzy Hash: 3DD18F22B0CB5245FB215F21D5342B967B0AF30B9AFC45432FA9DE7595EEAEE841C301
                          APIs
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                            • Part of subcall function 00007FF6CE4F7AE0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F7C56
                            • Part of subcall function 00007FF6CE4F2780: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F28F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC021
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FC04F
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FC05D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC097
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC0F4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC1AD
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FC1DB
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FC1E9
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC223
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC274
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FC2BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                          • String ID: value
                          • API String ID: 3212548336-494360628
                          • Opcode ID: c76a873ace44862f6349023eed5fc4100f4b45aeeb9fe66a199c4c2371892b46
                          • Instruction ID: 763a9904074e340015737c58698c7eec5ea8c79a87a3099ee5dfe544fda7aec4
                          • Opcode Fuzzy Hash: c76a873ace44862f6349023eed5fc4100f4b45aeeb9fe66a199c4c2371892b46
                          • Instruction Fuzzy Hash: 26A19562A18A8686EB00CF68E4543AD3371EF917A5F505335F6ED62AE9DF7CE081C704
                          APIs
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                            • Part of subcall function 00007FF6CE4F7AE0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F7C56
                            • Part of subcall function 00007FF6CE4F2780: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F28F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FD8B0
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FD8DE
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FD8EC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FD926
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FD983
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FDA3C
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FDA6A
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6CE4FDA78
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FDAB2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FDB03
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4FDB4D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                          • String ID: value
                          • API String ID: 3212548336-494360628
                          • Opcode ID: dd6525d2d8b59f3baa0861859b7e2aff5fafa17bb200aa34994a6428ec064bb0
                          • Instruction ID: f7b56bb67af536cae10306ad48cfc845b65aa9a5c4d846115e4300362d2791da
                          • Opcode Fuzzy Hash: dd6525d2d8b59f3baa0861859b7e2aff5fafa17bb200aa34994a6428ec064bb0
                          • Instruction Fuzzy Hash: EDA19462A18A8286EB00CF68E4543AD3371EF517A5F505331FAAD62AE9DF7CE081C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                          • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                          • API String ID: 4109794434-4095489131
                          • Opcode ID: e5d281810f71373cc68a83eff9d9673e87c10818fe74c7b7b7a3c36cff4c26e8
                          • Instruction ID: 0bf0bbf132fe3d9fa55744cf5205150e2f5fa0975b229a9fb3dedf6a2f6eb685
                          • Opcode Fuzzy Hash: e5d281810f71373cc68a83eff9d9673e87c10818fe74c7b7b7a3c36cff4c26e8
                          • Instruction Fuzzy Hash: 42619021A0D7C282EA559F2594242BA27E4AF65B8AF884434FECDA7791DF3EE401C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                          • String ID: Unknown error %d (%#x)
                          • API String ID: 4262108436-2414550090
                          • Opcode ID: 100a5d9055fd42e0d71a6ea79cb9f566b8e95a090aae1ec8d8803ea44f548d65
                          • Instruction ID: 9ae39b7505511da7d45c72fdef70eff230776207a460cb1acaa6271c70f8e896
                          • Opcode Fuzzy Hash: 100a5d9055fd42e0d71a6ea79cb9f566b8e95a090aae1ec8d8803ea44f548d65
                          • Instruction Fuzzy Hash: 48319461A1978282FA255F21A4302397671AFA4B86FC84435FECEA77D9DF7EE4018300
                          APIs
                          • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF6CE502AA2
                          • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF6CE502ABC
                          • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF6CE502ADD
                          • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF6CE502B2F
                          • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF6CE502B44
                          • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF6CE502B63
                          • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF6CE502B82
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF6CE502B8B
                          • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF6CE502C08
                          • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF6CE502C11
                          • ?width@ios_base@std@@QEAA_J_J@Z.MSVCP140 ref: 00007FF6CE502C3C
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6CE502C59
                          • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF6CE502C6B
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$?rdbuf@?$basic_ios@?width@ios_base@std@@D@std@@@2@V?$basic_streambuf@$?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@Vlocale@2@
                          • String ID:
                          • API String ID: 3119022203-0
                          • Opcode ID: fcbd4062a5c34ff19849290e96dca4d659f73e43909e53f5dd13756736b95600
                          • Instruction ID: 6cd665a76035fbcc3bb5e1952fbab3ad6e735bc3e1aa2809d464932a4c0f99d4
                          • Opcode Fuzzy Hash: fcbd4062a5c34ff19849290e96dca4d659f73e43909e53f5dd13756736b95600
                          • Instruction Fuzzy Hash: 7C618B26B09A8181DB54CF16E5A023977B0FF95F9AB858531FE9E937A1CF3ED0548340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                          • API String ID: 1294909896-3837278924
                          • Opcode ID: 7ec6c5d6a3ff59786ba722c0e9dd02ab78e7bc519b15799cd4420d422ff9ec3c
                          • Instruction ID: 9092c16facec3f084f151673f87a56bd915b8ddc2cc46f49c2d4574adb2a0a6f
                          • Opcode Fuzzy Hash: 7ec6c5d6a3ff59786ba722c0e9dd02ab78e7bc519b15799cd4420d422ff9ec3c
                          • Instruction Fuzzy Hash: 47D1A0B2A08A8281EB11CF24D0603B977B1FB65B89FD49132EA8DA7785DF7ED515C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sendto$ErrorLast
                          • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                          • API String ID: 4042023021-4197595102
                          • Opcode ID: 65eefe5e27c87df2d3a75b0703fe83b340d7fecbdf59bec97b9263cd900bd5df
                          • Instruction ID: bae227be4308c6f6f8061a4f176620eb5ba65f100c6056769be677bdafa3791a
                          • Opcode Fuzzy Hash: 65eefe5e27c87df2d3a75b0703fe83b340d7fecbdf59bec97b9263cd900bd5df
                          • Instruction Fuzzy Hash: 1FB1A172608682C6E721CF29D4603AD37B0FB98B8AF944132EE8D9B758DF3AD441C751
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sendto$_time64
                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                          • API String ID: 2327272419-1785996722
                          • Opcode ID: 89229f8d29204033db2aadbae2a754e7839df9844307faa5689997886ab2f216
                          • Instruction ID: 653bee21470a22c9a73cd19d8f92f32ff8ac1c5f07c2d971937384fde23450f3
                          • Opcode Fuzzy Hash: 89229f8d29204033db2aadbae2a754e7839df9844307faa5689997886ab2f216
                          • Instruction Fuzzy Hash: 5C916E72618781C5D761CF29D4613A977B0FBA8B89F848132EE8D9B758DF3AD406C720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$freestrchrstrncmpstrtol
                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                          • API String ID: 2070079882-2404041592
                          • Opcode ID: f161a98824ad047bc61e83a6a9d709f49cd731e5f255768661b04e2e13741171
                          • Instruction ID: dab69e129bb6f02bba1bd774eb102c7582c99601de38353e5c9c5ef712447061
                          • Opcode Fuzzy Hash: f161a98824ad047bc61e83a6a9d709f49cd731e5f255768661b04e2e13741171
                          • Instruction Fuzzy Hash: 68510561E0C7964AFB119F69943037967F1AF22796F884031FECD962C1EE2EE545C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                          • String ID: Set-Cookie:$none
                          • API String ID: 4109794434-3629594122
                          • Opcode ID: 64170cdf92fb56e899e1510f54d3ee927d434ba8789ac50f8d66b4514f019bdc
                          • Instruction ID: 4259529d32ffee4b1683d24d401409a852afabc0cfe5391d42c2a37a1db50818
                          • Opcode Fuzzy Hash: 64170cdf92fb56e899e1510f54d3ee927d434ba8789ac50f8d66b4514f019bdc
                          • Instruction Fuzzy Hash: D1519621A0D7C242FB559F21653027966F0AF65B9AF884834FECEA6781DF3EE4458740
                          APIs
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F34
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F4A
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F5E
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F72
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F86
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F9A
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518FAE
                            • Part of subcall function 00007FF6CE518F20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518FC2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE517FC2
                            • Part of subcall function 00007FF6CE541EF0: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F05
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F1F
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F3A
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F56
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F72
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F8A
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FA2
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FBA
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FD2
                            • Part of subcall function 00007FF6CE541EF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FEA
                            • Part of subcall function 00007FF6CE541EF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE542004
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE5181C6
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE518209
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF6CE51834E
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE5183CB
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$free$callocstrtoul
                          • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                          • API String ID: 954404409-4150109901
                          • Opcode ID: 4d71343cc8e9c771a04bdd6a4e35518a46228df87ed26e91117d0ae160dc71d8
                          • Instruction ID: 20ae8ef090960e8e25a042bb9eaa21d2da72252e8d98f1d0ea89c1eae78548e3
                          • Opcode Fuzzy Hash: 4d71343cc8e9c771a04bdd6a4e35518a46228df87ed26e91117d0ae160dc71d8
                          • Instruction Fuzzy Hash: 8EC17232B08A8286EB798F65D9603F923B1FB65746F940035EA9DE7685DF3EE514C300
                          APIs
                            • Part of subcall function 00007FF6CE4F2B40: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2C39
                            • Part of subcall function 00007FF6CE4F2B40: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2C78
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                            • Part of subcall function 00007FF6CE4F5220: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F5266
                            • Part of subcall function 00007FF6CE4F7480: memcpy.VCRUNTIME140(?,?,?,00007FF6CE4F258A), ref: 00007FF6CE4F7511
                            • Part of subcall function 00007FF6CE4F52A0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F52F3
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F28F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2941
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2992
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F29D2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2A24
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2A63
                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF6CE4F2AB6
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2B07
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                          • String ID: parse error$parse_error
                          • API String ID: 2484256320-1820534363
                          • Opcode ID: 872615393e60536cf0fdb048e6fefe99b16f7abf7942900c64bb644bcd49a26a
                          • Instruction ID: 596d66059b45994fb235cb4371d3e0622721cb75b50f24062a79e81633e34876
                          • Opcode Fuzzy Hash: 872615393e60536cf0fdb048e6fefe99b16f7abf7942900c64bb644bcd49a26a
                          • Instruction Fuzzy Hash: 7AB1A062E14B8685FB00CF64E4443AD3771EB64BA5F509621EAAD62AE9DF7CE0C1C304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$_time64calloctolower
                          • String ID: :%u$Shuffling %i addresses
                          • API String ID: 133842801-338667637
                          • Opcode ID: b254895a411a1bb72c9a68ccd39e5ac0568eb9fe9291788dac0897c1c0e83ef1
                          • Instruction ID: 98e670e99f3028109ef6d3db3843ced038dd333dc305c2d8615f62fff048e51c
                          • Opcode Fuzzy Hash: b254895a411a1bb72c9a68ccd39e5ac0568eb9fe9291788dac0897c1c0e83ef1
                          • Instruction Fuzzy Hash: 3771C736A19A9281EB148F11E6647BA33B4FB68B95F804531EF8EA7394DF3ED445C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                          • API String ID: 1865132094-1312055526
                          • Opcode ID: 9ce5097fec653cc47e3efa6e9b03e8c9e5773c358994eb20c923880c0cc65715
                          • Instruction ID: 503d64463ca3d1e1e9e4b5841d60c98710dfb89f313398bd84ee8aaa5d003734
                          • Opcode Fuzzy Hash: 9ce5097fec653cc47e3efa6e9b03e8c9e5773c358994eb20c923880c0cc65715
                          • Instruction Fuzzy Hash: 49719262A0C78290E7609F64D4612BD27B1EFA5B95F980035EACDE76A5CF3FD4818320
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE51499D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149BA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149CE
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5149EA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A07
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A2A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A3E
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A52
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A78
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514A8C
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AA0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AEF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514AFC
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE514B25
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 340a58b6c03933ee5c38f7373fab72ede4f501a6453ad0e5311dc76b628382d7
                          • Instruction ID: 1b567973cd7c73cc54c3b93ab4a462c629545a79c1fad9ed01da2517c3fc1ec9
                          • Opcode Fuzzy Hash: 340a58b6c03933ee5c38f7373fab72ede4f501a6453ad0e5311dc76b628382d7
                          • Instruction Fuzzy Hash: 12510F71918A8281EB14DF61E4A12FD2374FF94F86F885431EE8F9B755CE3AD0518320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                          • API String ID: 1294909896-1896214517
                          • Opcode ID: cd88872d4a6fe51d0876285e9ef49b9cd2078b152f76005ffac7db73de5e62a3
                          • Instruction ID: fafd9880358bc6501668ff423aa99ac3c9583a182b91434ffc65b00e5e0f27cc
                          • Opcode Fuzzy Hash: cd88872d4a6fe51d0876285e9ef49b9cd2078b152f76005ffac7db73de5e62a3
                          • Instruction Fuzzy Hash: 61D1BC72A08B8285EB61CF14E8513A977B0FB94799F841136EE8CA7798CF3ED454C720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                          • API String ID: 2190258309-1670639106
                          • Opcode ID: 67cc25c653c019c68edb10205389acf8d6a06812a7f26fc1d5dd01ed8d485a3b
                          • Instruction ID: f1eafff92890a1efe76e7464798462b422f579cbc2de7eabff2811cd2637dafb
                          • Opcode Fuzzy Hash: 67cc25c653c019c68edb10205389acf8d6a06812a7f26fc1d5dd01ed8d485a3b
                          • Instruction Fuzzy Hash: AFA17563909A8285EB658F31D5643B867B0FB6478AF841131FACEE7A85DF3AD491C310
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542AAB
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542B11
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542B1F
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542C1D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542C86
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542C9E
                            • Part of subcall function 00007FF6CE541BF0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE541C00
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542CC6
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542CDD
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542D02
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542D4F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE542D64
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EAC
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EB6
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EC0
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542ECA
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542ED4
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EDE
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EE8
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EF2
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EFC
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542F06
                            • Part of subcall function 00007FF6CE542EA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542F10
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc$_strdup
                          • String ID: ,$:
                          • API String ID: 2460172880-4193410690
                          • Opcode ID: 9fc9f10a5d97b44390ba30cad8ebf6bc625cf12063cbf7b46e71b17a76415179
                          • Instruction ID: 68343e50dd67d34d882feb7a5f62d9f79507c212fb779f015cb00fcc3400dd6a
                          • Opcode Fuzzy Hash: 9fc9f10a5d97b44390ba30cad8ebf6bc625cf12063cbf7b46e71b17a76415179
                          • Instruction Fuzzy Hash: 1A51C516E1CA8642F7219F3595213B963B0BF65785F449231EECEA2656EF2EF1E48300
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F05
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F1F
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F3A
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F56
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F72
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541F8A
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FA2
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FBA
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FD2
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE541FEA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE517F65,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE542004
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$callocfree
                          • String ID:
                          • API String ID: 1183638330-0
                          • Opcode ID: 36a892255754302b1de67aeceaef65683c6eea63486ce9a4ba4bed585b87ef12
                          • Instruction ID: e0c65e4dbacef1c9e7e41a1f7c37c4046216563d66965295657bc37a216ec8fb
                          • Opcode Fuzzy Hash: 36a892255754302b1de67aeceaef65683c6eea63486ce9a4ba4bed585b87ef12
                          • Instruction Fuzzy Hash: DE313736E1AB4291EE69CF55E17023822F4FF58B06B481436EA8ED2744DF3EF4709220
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy$strchr
                          • String ID:
                          • API String ID: 1615377186-0
                          • Opcode ID: aa0ecedb91e18d2e0f992861b877a5e479a5e731e3f0740ec1a9ef4aef4d96ca
                          • Instruction ID: f3e1ee6b8361cd5e4a6d3f38cdca1469b448a400699c7b0babd6e7d46e7ef352
                          • Opcode Fuzzy Hash: aa0ecedb91e18d2e0f992861b877a5e479a5e731e3f0740ec1a9ef4aef4d96ca
                          • Instruction Fuzzy Hash: 6651B025B0EB8585EE25CF55A52527963B1BF64BC2F885430EECEA7748EF3EE4058310
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                          • API String ID: 0-1262176364
                          • Opcode ID: fdcf8f4fb6526b880c534ee3e1f288543f22453b2957d1f778731b14c9a4f5f2
                          • Instruction ID: be38ce935d15075ce397c0ebbb148cd9e1f69b423fe5fb2e69bce0db1c6050e5
                          • Opcode Fuzzy Hash: fdcf8f4fb6526b880c534ee3e1f288543f22453b2957d1f778731b14c9a4f5f2
                          • Instruction Fuzzy Hash: C341B236B0C64286EB289F55E4601BAB371BB60B92FC44035FACDA7691DF7FE8448700
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6CE527EBA), ref: 00007FF6CE51BECF
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6CE527EBA), ref: 00007FF6CE51BF21
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6CE527EBA), ref: 00007FF6CE51BF45
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6CE527EBA), ref: 00007FF6CE51BF95
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6CE527EBA), ref: 00007FF6CE51BFD8
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupstrchr
                          • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                          • API String ID: 153040452-3976116069
                          • Opcode ID: ed90737fc67f69d9f7bd73876c24f222606864a60142b45a307b1d9c19a193b8
                          • Instruction ID: 723e2e1bab17dcf665233b7ba8c3c5eb2187573ed5facb849a6aeff857290036
                          • Opcode Fuzzy Hash: ed90737fc67f69d9f7bd73876c24f222606864a60142b45a307b1d9c19a193b8
                          • Instruction Fuzzy Hash: BE41BB22A08B8692EA608F52E4503AA77B4FB95B85F840035FECD977A0DF3ED556C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                          • API String ID: 2653869212-571364039
                          • Opcode ID: d42a0c74dc1f5ac63ecb98a4d68705edbe97a79fea793a6ec2c416178d0cc8f9
                          • Instruction ID: d1ed12ce5e6f2504948efc007103833e2f82268b3e869721be8d864834860c2f
                          • Opcode Fuzzy Hash: d42a0c74dc1f5ac63ecb98a4d68705edbe97a79fea793a6ec2c416178d0cc8f9
                          • Instruction Fuzzy Hash: 3C4190B5E0878245EB518F61A4242F937B5BB6978AF841432FE8EA7359DF3EE154C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                          • API String ID: 600764987-1965992168
                          • Opcode ID: 0a9bb94958cab05c62ced13aef4a4dd1eb62255108913f9fce7ca65002aab040
                          • Instruction ID: 98caceba0a3b7c5c5b67c2d658aca2353e557d6d38657249db931ab6a3621a5b
                          • Opcode Fuzzy Hash: 0a9bb94958cab05c62ced13aef4a4dd1eb62255108913f9fce7ca65002aab040
                          • Instruction Fuzzy Hash: 8C318022A0D6C186E6718F60E4643AA73B0FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                          • API String ID: 600764987-1052566392
                          • Opcode ID: 10349e349b463c91b3e45d2b73b9638b1978f801fd2bfbc886d290c8f1e25f45
                          • Instruction ID: 9a47413f2dcc1f0b7f365054304e94a3462e6056087511cde9549289cc1fae07
                          • Opcode Fuzzy Hash: 10349e349b463c91b3e45d2b73b9638b1978f801fd2bfbc886d290c8f1e25f45
                          • Instruction Fuzzy Hash: BE316022A1D6C186E6718F60E4643AA73B4FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                          • API String ID: 600764987-3862749013
                          • Opcode ID: 7e573bd92b9d43ac4b00c980f2996411393b2ba7c3b462260107ad405c1a3afa
                          • Instruction ID: 7af119262675ed4e1609a869f64814106983f5472ed7a9fa53d1d2204a4cdfb4
                          • Opcode Fuzzy Hash: 7e573bd92b9d43ac4b00c980f2996411393b2ba7c3b462260107ad405c1a3afa
                          • Instruction Fuzzy Hash: DF316122A1D7C186E7718F60E4643AA73B4FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                          • API String ID: 600764987-1502336670
                          • Opcode ID: 86c921f2142e600db52fea1572ca250adc076ea2aceaf02060be38b575d46afa
                          • Instruction ID: 936540f7ef0a19de9404d35693c34f74b660debacadc2d55b9d537e30dd31922
                          • Opcode Fuzzy Hash: 86c921f2142e600db52fea1572ca250adc076ea2aceaf02060be38b575d46afa
                          • Instruction Fuzzy Hash: 84316022A1D6C186E6718F60E4643AA73B4FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                          • API String ID: 600764987-2628789574
                          • Opcode ID: 7275d5a1b32069eb92776363a42aaa11e3605dda69d1069f9f4704188d27d934
                          • Instruction ID: a86dd77d0cdd0bbca7375efa8a3da49908d1120156182d12c8d52cd069981e1b
                          • Opcode Fuzzy Hash: 7275d5a1b32069eb92776363a42aaa11e3605dda69d1069f9f4704188d27d934
                          • Instruction Fuzzy Hash: 63316122A1D7C186E7718F60E4643AA73B4FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                          • API String ID: 600764987-2710416593
                          • Opcode ID: c9cf7ba51cfa555b86d8c3fe839f14dbdffb7e57fa049164605550cf7a62e235
                          • Instruction ID: 52dd37a637ece7dd6455b219d7ac30ee0a00d151781ce20f0e21b10a1cb02bef
                          • Opcode Fuzzy Hash: c9cf7ba51cfa555b86d8c3fe839f14dbdffb7e57fa049164605550cf7a62e235
                          • Instruction Fuzzy Hash: B0316122A1D7C186E7718F60E4643AA73B4FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                          • API String ID: 600764987-1381340633
                          • Opcode ID: 624e5b73e9b7fadd8b532eb4177c8ca66fcde0382b4aa183f3ea07b19814a7d7
                          • Instruction ID: 17e8b0ec5c4ae0279f386bbde03bf5ed445a319dfb9c9ee145b784b4c945f54c
                          • Opcode Fuzzy Hash: 624e5b73e9b7fadd8b532eb4177c8ca66fcde0382b4aa183f3ea07b19814a7d7
                          • Instruction Fuzzy Hash: 9C316022A1D6C186E6718F60E4643AA73B4FB94746FC40435EACEA2A99DF3ED544CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                          • API String ID: 600764987-618797061
                          • Opcode ID: e9da9d653fdb1614238eb1cb5ecd4d7072818c9c7e3e3b48656d1444eb17cff5
                          • Instruction ID: 25f56f8ea5bfa45ca7547a4786f0c3437ca5f5387f1dfdf77af46dfe9405a6ae
                          • Opcode Fuzzy Hash: e9da9d653fdb1614238eb1cb5ecd4d7072818c9c7e3e3b48656d1444eb17cff5
                          • Instruction Fuzzy Hash: 84317022A0D7C186E7718F60E4643AA73B0FB94746FC40435EACDA2A99DF3ED544CB10
                          APIs
                          • ConvertSidToStringSidA.ADVAPI32 ref: 00007FF6CE501F67
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,?,00007FF6CE50233F), ref: 00007FF6CE501FE9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,?,00007FF6CE50233F), ref: 00007FF6CE501FFC
                          • memcpy.VCRUNTIME140(?,?,?,?,00000000,?,?,00007FF6CE50233F), ref: 00007FF6CE502012
                          • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,?,00007FF6CE50233F), ref: 00007FF6CE502051
                          • LocalFree.KERNEL32(?,?,?,?,00000000,?,?,00007FF6CE50233F), ref: 00007FF6CE502079
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno$ConvertFreeLocalString_invalid_parameter_noinfomemcpy
                          • String ID:
                          • API String ID: 3026804155-0
                          • Opcode ID: 0f4b64368f9d2f7a7760f622469a95e7b617d3fa57f3ffe6efce889550e6e94f
                          • Instruction ID: a8f78ebbf86e40bc85b8e225e95f89b36538fc0c9927cc7077e8f66d04401237
                          • Opcode Fuzzy Hash: 0f4b64368f9d2f7a7760f622469a95e7b617d3fa57f3ffe6efce889550e6e94f
                          • Instruction Fuzzy Hash: DC51EE36A09B8682FA109F11D57423973B0AF64B8AF804135FA8EA7796CF3EE541C701
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                          • API String ID: 0-808606891
                          • Opcode ID: 9a448cd571a5d14d77db0277002d21efe71a7764dbd5e1c13aebef6ccb53991f
                          • Instruction ID: 9d67d39b06dd23622e210aa0fa647058c8c3bd3dcce02e12eb0656e12eaddad0
                          • Opcode Fuzzy Hash: 9a448cd571a5d14d77db0277002d21efe71a7764dbd5e1c13aebef6ccb53991f
                          • Instruction Fuzzy Hash: 8BB17372909A8285E724CF28D04427C3771FB29F49FA49636E68E972D9CF3DE985C350
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE551CBA
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE551D08
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE551D6B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE551EA9
                            • Part of subcall function 00007FF6CE545C50: strchr.VCRUNTIME140(00000000,?,?,00007FF6CE54520F), ref: 00007FF6CE545C96
                            • Part of subcall function 00007FF6CE545C50: strchr.VCRUNTIME140(00000000,?,?,00007FF6CE54520F), ref: 00007FF6CE545CA6
                            • Part of subcall function 00007FF6CE545C50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF6CE54520F), ref: 00007FF6CE545CD0
                            • Part of subcall function 00007FF6CE545C50: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE545D05
                            • Part of subcall function 00007FF6CE545C50: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE545D2A
                            • Part of subcall function 00007FF6CE545C50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE545D4C
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6CE551F34
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$callocmallocstrchr$freestrncpy
                          • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                          • API String ID: 370574955-353107822
                          • Opcode ID: d8a302bfc17b2b022773a9bb669af3435789545df0ee809dd69a92692376ef60
                          • Instruction ID: b7820cde2048d0107412527cd47c31f27aef86a70ec1380cbd80291ece4dbe8a
                          • Opcode Fuzzy Hash: d8a302bfc17b2b022773a9bb669af3435789545df0ee809dd69a92692376ef60
                          • Instruction Fuzzy Hash: 4DA16B33A09F458AEB508F65E4602AD37B5FB54B89F800036EE8DA7B58DF3AE445C750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 1169197092-2292467869
                          • Opcode ID: 8515126be97b4bf8c747823858f4f67fa6dfac8e3fdadc53ef2f576fb2d629af
                          • Instruction ID: 1266cfb263db6f27d61f7e75733f58f9f526cb8b702ae78d79e5dea2112bc3e5
                          • Opcode Fuzzy Hash: 8515126be97b4bf8c747823858f4f67fa6dfac8e3fdadc53ef2f576fb2d629af
                          • Instruction Fuzzy Hash: 61915F62A0D7C649FEB18F21946437977B5EF6674AF880035FACEA2691DE2EE4448310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                          • API String ID: 1169197092-907567932
                          • Opcode ID: 7e383517d18e6633fecbc07f2e436271aabf50af60d7cbf5d3dec0b2297880b1
                          • Instruction ID: 1a984399ab69448aa87e52bb874fd6ce9cbd9aa6f4982dce60a815d0628496b3
                          • Opcode Fuzzy Hash: 7e383517d18e6633fecbc07f2e436271aabf50af60d7cbf5d3dec0b2297880b1
                          • Instruction Fuzzy Hash: 5471F76190C29286FB188E22956827977F1AF71786FC44035FECAEA2C2DF6FE5149301
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                          • API String ID: 1169197092-978722393
                          • Opcode ID: 99665cb1b30f1ca75d68309958105519bf23c389b0a2f1d2f50058e469b29811
                          • Instruction ID: 23dbcf03ff72fb9e9a9525dd46c347743e7e7761df53041132d4b7055ed5cbbe
                          • Opcode Fuzzy Hash: 99665cb1b30f1ca75d68309958105519bf23c389b0a2f1d2f50058e469b29811
                          • Instruction Fuzzy Hash: 4D716F61A0D7C645FF718F21D4643BA67B1AF2675AF880436FACEA2691DF2EE4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$strchrstrtol
                          • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                          • API String ID: 137861075-1224060940
                          • Opcode ID: a34ba1fcc5c3b91e2207fde4e65e0f255651f9bb7b78014b8bc6fa6bf73578dc
                          • Instruction ID: 140883a87fb5220d92960d44c733b3612069cadf343c81fc7200cf02546c6ee8
                          • Opcode Fuzzy Hash: a34ba1fcc5c3b91e2207fde4e65e0f255651f9bb7b78014b8bc6fa6bf73578dc
                          • Instruction Fuzzy Hash: DB51F522608BC248EB219F55E8103AA67B4FB62B99F844135FECD97794DF3ED645C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreestrpbrk
                          • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                          • API String ID: 1812939018-2300960079
                          • Opcode ID: a711f49ee8665fb8d392a8ec7646bbea733b882eec0773715f2169ed68c6cef6
                          • Instruction ID: 70d318ddc84f7c9107d3b65190a6b83587b79b557291ff4b14cdea8ddf0434fb
                          • Opcode Fuzzy Hash: a711f49ee8665fb8d392a8ec7646bbea733b882eec0773715f2169ed68c6cef6
                          • Instruction Fuzzy Hash: 18517C22B1CBC181EA518F15E4207B967B0ABA6B85FC44132FACDA7785DF3EE944C300
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                          • API String ID: 1294909896-1147549499
                          • Opcode ID: 9d1365ddcf2a3d7a4543258a8046ac45d9ecdd769ef46670542d7a2bf49c59b9
                          • Instruction ID: c2d462b70c1213367d929c108dbfdba592f7c24d402aab968683c83a9b196642
                          • Opcode Fuzzy Hash: 9d1365ddcf2a3d7a4543258a8046ac45d9ecdd769ef46670542d7a2bf49c59b9
                          • Instruction Fuzzy Hash: 57418020F0C69281F968AF2595712B96271AF64BC6F984431FE8EE77C2DF3EE4018740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$callocfreestrrchr
                          • String ID: Wildcard - Parsing started
                          • API String ID: 2641349667-2274641867
                          • Opcode ID: bfdcd8a58e5c8a27267d7c664a0b8ec6978e10333f28a9e707146a0d00621057
                          • Instruction ID: 5eeb5db8dc6ecf0f7ed3544c4dce008d21c78cc430011ed3cbf93c37ac45b20c
                          • Opcode Fuzzy Hash: bfdcd8a58e5c8a27267d7c664a0b8ec6978e10333f28a9e707146a0d00621057
                          • Instruction Fuzzy Hash: 55517FB6A09B42C1EB15CF11E4601BC37B5FBA4B46F859435EA8E9B358EF3AE450D310
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D07D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0A7
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0B1
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0BB
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0C5
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0CF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0D9
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0E3
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0ED
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D0F6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6CE514A69,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE50D111
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: af0160b92c750456279e93c005bd0556b293e5d323cef995ca8b7c7c9b7a9386
                          • Instruction ID: 3fb65b0d2f5a48717278ea00ad868d8f5d8d6f1c46c3139d8e770c01e8ff3c5c
                          • Opcode Fuzzy Hash: af0160b92c750456279e93c005bd0556b293e5d323cef995ca8b7c7c9b7a9386
                          • Instruction Fuzzy Hash: 6F21FA76A18A4182DB20DF61F8652286374FB98F96F441431EEDFA3728CE3ED8559320
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EAC
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EB6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EC0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542ECA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542ED4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EDE
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EE8
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EF2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542EFC
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542F06
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE541ED2,?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE542F10
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: c7d199e31ac56aff1b80e80862ff45fb751bba835749bc4e651b7619f6ea5b7e
                          • Instruction ID: 43acc81b9c63a2f0634abe180fd549fd8087692eb0271fec945513a201820613
                          • Opcode Fuzzy Hash: c7d199e31ac56aff1b80e80862ff45fb751bba835749bc4e651b7619f6ea5b7e
                          • Instruction Fuzzy Hash: A001F966E28901C2DB24DF65F8651382334FF98F56B402431DE9FD2324CE2BD865D360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$freemalloc
                          • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                          • API String ID: 3313557100-1003742340
                          • Opcode ID: 625c893156e9c0e7f210fb3cbd4711928e2d388c058d3c6dcd2bc63dc3d61b4f
                          • Instruction ID: c664bb2153f3f262edbe70c34b01263be701aff7e9c2ec81cfb131bea57ff1d6
                          • Opcode Fuzzy Hash: 625c893156e9c0e7f210fb3cbd4711928e2d388c058d3c6dcd2bc63dc3d61b4f
                          • Instruction Fuzzy Hash: 1C81B172708B8192EA548F16D4603A96370FB65B85F849436EFCEAB745DF3EE4A0C341
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3401966785-517259162
                          • Opcode ID: e6d43b0ca54be161a82e472a31f56152227362cbd8ef9b4dfe647629dd50b239
                          • Instruction ID: 08fc07a84036d1aa284617bc70e920ca595a95bf833ba4c59a7164d0a4402e36
                          • Opcode Fuzzy Hash: e6d43b0ca54be161a82e472a31f56152227362cbd8ef9b4dfe647629dd50b239
                          • Instruction Fuzzy Hash: D6611565E0868245FF588F6184342B927B1EF25786F844437EA9FB7786EE2EE1658300
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6CE527E98), ref: 00007FF6CE5449C0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6CE527E98), ref: 00007FF6CE5449F7
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6CE527E98), ref: 00007FF6CE544A1E
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                          • API String ID: 1294909896-3948863929
                          • Opcode ID: 3218e1cb5eaa418985d7c841f200a9c7ff7061579c46474744507d867e542b1b
                          • Instruction ID: 2fb5b03890ce4aa0c351c973061f47fac5637efc11646831bb76b51ef0bbbd73
                          • Opcode Fuzzy Hash: 3218e1cb5eaa418985d7c841f200a9c7ff7061579c46474744507d867e542b1b
                          • Instruction Fuzzy Hash: 6C618D32A08B8285EB60CF05E4687AA73F9FB54B85F840136EA8D97798DF3ED451C700
                          APIs
                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF6CE539FC7
                            • Part of subcall function 00007FF6CE53A570: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A5A6
                            • Part of subcall function 00007FF6CE53A570: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A5FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _fstat64_openstrchr
                          • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                          • API String ID: 3410096895-1509146019
                          • Opcode ID: a381724c99ff37eb3222d012fa12497946043f89d641a5aac803b28b72d52383
                          • Instruction ID: 4b4b987c32bdc5112c9a17589c3e41ee2ad89fffb81f22607c09a86a65fdc698
                          • Opcode Fuzzy Hash: a381724c99ff37eb3222d012fa12497946043f89d641a5aac803b28b72d52383
                          • Instruction Fuzzy Hash: 99C19776A0C68285EB659F6594603BA63B1FFA4785F844031FE8DE7756EE3EE4018700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc$Ioctlsetsockopt
                          • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                          • API String ID: 3352517165-607151321
                          • Opcode ID: 511f203f5d5314bd71be661a8393197f6a7c012e43a87a46478043cd8a218db2
                          • Instruction ID: 8d95048de425581e98b9a75c77d16643a4d1c6f6acf98e2ede3f7a7ce16f071f
                          • Opcode Fuzzy Hash: 511f203f5d5314bd71be661a8393197f6a7c012e43a87a46478043cd8a218db2
                          • Instruction Fuzzy Hash: 06B1A332A09BC585EB658F24D5283FA33A0EB64F99F480131EE8D9A785DF3E9495C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: %s?%s$Failed sending Gopher request
                          • API String ID: 111713529-132698833
                          • Opcode ID: f701b89ca598be0c79add737d892064d220f0fede9963aa146444fe3606fa74c
                          • Instruction ID: 9526f04f84b4de6f3e80860254456b2be2d71218d59f2fc9157c4edba5c75920
                          • Opcode Fuzzy Hash: f701b89ca598be0c79add737d892064d220f0fede9963aa146444fe3606fa74c
                          • Instruction Fuzzy Hash: E251E622A0CA8282F6109F66A5201B963A4BF54BE5F840232FEEED37D5DF3DD5529700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                          • String ID: value
                          • API String ID: 1346393832-494360628
                          • Opcode ID: e8a9ca86550b2b2b1146deeefcf538699ff4cb9f6ecadcd57ff50e59521f5678
                          • Instruction ID: a3c4c74c64bfc9814db3537cb0b64152d6e94e8fae88af57e24e45092eb006a7
                          • Opcode Fuzzy Hash: e8a9ca86550b2b2b1146deeefcf538699ff4cb9f6ecadcd57ff50e59521f5678
                          • Instruction Fuzzy Hash: F061A372E18A8685EB10CF68E4443ED3370EB957A5F504335EAAD62AE9DF7CE081C700
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE55515D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE5551CD
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE55523D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE5552AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: 1.0$uaHQW8FPzW$valorantplus
                          • API String ID: 3668304517-3915017969
                          • Opcode ID: 8d54d66f9210c5d3dd33c28a62f52743d1434943afd998f7c6f900b075d3744a
                          • Instruction ID: 333ddffa950308b7079d4a35dace645c68fed18b155436b4c327ecbc47ca4cba
                          • Opcode Fuzzy Hash: 8d54d66f9210c5d3dd33c28a62f52743d1434943afd998f7c6f900b075d3744a
                          • Instruction Fuzzy Hash: 505170A1E1A68680FA049F55E8653383371AF75B87FD05435F9CDE6769EE6FA4808300
                          APIs
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A5A6
                          • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A5FB
                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A66C
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A679
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6CE53A78B
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _close$_fstat64_openstrchr
                          • String ID: Can't get the size of %s$Can't open %s for writing
                          • API String ID: 423814720-3544860555
                          • Opcode ID: b9fa68d0ded3ae7f2fc9d4ca694eb432e134fc7ff2c929bc374f702eaa2bdbae
                          • Instruction ID: 8772c21fbf239343df0495c9063758ab3c0be0abf3e19484ea5564ad46086b51
                          • Opcode Fuzzy Hash: b9fa68d0ded3ae7f2fc9d4ca694eb432e134fc7ff2c929bc374f702eaa2bdbae
                          • Instruction Fuzzy Hash: BE51BA65B09A4281EA149F25D4603B963F5BFA4BD5FD44035FE9EE7396EE3EE4018300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdupstrtol
                          • String ID: %%%02x
                          • API String ID: 2999891020-4020994737
                          • Opcode ID: b15b70184c1b3d9fec6bca39b3ad5e011db36c3f1746e7354bed85ed88af4da8
                          • Instruction ID: 2ee11418a74dc8cbdabdd9b1613c7390575a72904b62ff4d543394d72e88a300
                          • Opcode Fuzzy Hash: b15b70184c1b3d9fec6bca39b3ad5e011db36c3f1746e7354bed85ed88af4da8
                          • Instruction Fuzzy Hash: 3251B319E0D6A245FB728F1150343782AE1AF65B92F884132EECEA77C1DE2FE555C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1496848336-4020994737
                          • Opcode ID: b862226a7b4cd3a12c0a69f1fbc6cae677337f6b2c10cbb8bbc94ca222c2b0f4
                          • Instruction ID: c9f45866f3bc8399516450a47e9f1dd9648258dd34fb4a452d047cfa9dd76420
                          • Opcode Fuzzy Hash: b862226a7b4cd3a12c0a69f1fbc6cae677337f6b2c10cbb8bbc94ca222c2b0f4
                          • Instruction Fuzzy Hash: 2041C216D0D6A245EB728F1160343782BE1AF66B92F884572EEDEA73C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLasthtonssend
                          • String ID: Sending data failed (%d)
                          • API String ID: 2027122571-2319402659
                          • Opcode ID: 82fad93c0eb16bf3174ce1cf06c355e3951157a6625748c65faa105dfe9072b2
                          • Instruction ID: ad774c0b777aaf5d523af40a946c83cd207155110c69ffc47b1e35595f5881db
                          • Opcode Fuzzy Hash: 82fad93c0eb16bf3174ce1cf06c355e3951157a6625748c65faa105dfe9072b2
                          • Instruction Fuzzy Hash: F9419E32708AD681E7005F75D420AA87771F764F8AF844632EB8993795DFBEE05AC302
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                          • API String ID: 111713529-2901970132
                          • Opcode ID: 9e26764737d080c2be073f7b442ecbd205ca1846c73b6eaf564e30eeedecee04
                          • Instruction ID: 5df33ac57455fbe8621f1a7f94d7fef85890e417350cb1b3f0ec6f0a405e01d3
                          • Opcode Fuzzy Hash: 9e26764737d080c2be073f7b442ecbd205ca1846c73b6eaf564e30eeedecee04
                          • Instruction Fuzzy Hash: 9731AEA1E0878245EB508F6194200F937B5BF6978AF841432FE8EAB359EF3EE014C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-599393795
                          • Opcode ID: 06ddf24efd0fa076a48eabcff3497a828a47eb1f4d2602eff598713185c4c4ed
                          • Instruction ID: d5b6f652a632c058b38112781758e9bc1258567b5aba6834d1a7dfa885bf49fb
                          • Opcode Fuzzy Hash: 06ddf24efd0fa076a48eabcff3497a828a47eb1f4d2602eff598713185c4c4ed
                          • Instruction Fuzzy Hash: 396100A5E087D244EB908F2094241B877B8BB21786FC44436EACDB7796EF3EE125C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memcpy
                          • String ID: Signature: %s$Signature
                          • API String ID: 901724546-1663925961
                          • Opcode ID: f1d4bb2958285a5254e6134ec3c51c69a933ce07328d442b90527371da471c2e
                          • Instruction ID: 5ddc3b3a71e58301d21192b5a4482c7e94a59efeb8403c643b78f0c41f4a893f
                          • Opcode Fuzzy Hash: f1d4bb2958285a5254e6134ec3c51c69a933ce07328d442b90527371da471c2e
                          • Instruction Fuzzy Hash: 66512621E096C242EE598F1690283B927B1FB657E5F840236FADFA7795EE2ED0558300
                          APIs
                          • GetTokenInformation.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE5028CA
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE5028D0
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE50292F
                          • GetTokenInformation.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE50296F
                          • IsValidSid.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE5029BD
                          • GetLengthSid.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE5029CA
                          • CopySid.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE5029E2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE50232E), ref: 00007FF6CE502A06
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: InformationToken$CopyErrorLastLengthValidfreemalloc
                          • String ID:
                          • API String ID: 2357097940-0
                          • Opcode ID: 883d09a2e1d9e6515a238c47c2a98e1b8723ffc81f77615898d8bdd3299b4e0f
                          • Instruction ID: 281be22ed137fc1c8982f83ee7f0fbb9af867b5aca6ce81e93124e4b6e9cc162
                          • Opcode Fuzzy Hash: 883d09a2e1d9e6515a238c47c2a98e1b8723ffc81f77615898d8bdd3299b4e0f
                          • Instruction Fuzzy Hash: 62519426A086C296EB509F21D4602AC33B0FB24B59FC44934FA9DE7BD6DF7EE5558300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                          • API String ID: 1294909896-1642401773
                          • Opcode ID: c572c20152171c174984951bebc71deb12c6684c520613349d18e0525208315b
                          • Instruction ID: 3fa8d347795153fceafd16bdbf1ab767d412ac9bf2b6ea1a56e47228be5388db
                          • Opcode Fuzzy Hash: c572c20152171c174984951bebc71deb12c6684c520613349d18e0525208315b
                          • Instruction Fuzzy Hash: E2518F71E09B8645EB508F6094201F977B5BB6578AFC81432FA8DAB359DF3EE514C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID:
                          • API String ID: 1169197092-0
                          • Opcode ID: 30de8a466343c07363e89482a927076ed63d3cdfbea0eadda4a13491a2fc4e3b
                          • Instruction ID: e407c504766b4ebd4ebf1d04f29aed4ab4885004a04263c3982b1b676936dda7
                          • Opcode Fuzzy Hash: 30de8a466343c07363e89482a927076ed63d3cdfbea0eadda4a13491a2fc4e3b
                          • Instruction Fuzzy Hash: 0E516D36A1AB8082EB55CF59F06012C37B4FB58B85B481535EF8E93B48EF39E4E19710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-3876350232
                          • Opcode ID: 3c189779aaa59688ae4847ca8b8f2708891fa9f94296abc0994125ba12fb05d9
                          • Instruction ID: 1a09095cd6150c104c5bfce0ca97c07ca98675719e67f2de6283f8d10c21db4e
                          • Opcode Fuzzy Hash: 3c189779aaa59688ae4847ca8b8f2708891fa9f94296abc0994125ba12fb05d9
                          • Instruction Fuzzy Hash: 5E51A165A0878284EB508F6094201F967B5FB65786FC80436EACEBB35AEF3EE554C300
                          APIs
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6CE546463), ref: 00007FF6CE5470F8
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6CE546463), ref: 00007FF6CE54713A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6CE546463), ref: 00007FF6CE5471DF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6CE546463), ref: 00007FF6CE5471F2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE5476D7
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memcpystrchr
                          • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                          • API String ID: 1438451818-3030351490
                          • Opcode ID: f85ae67141ccd2159f730b8912617362899918de70a0573beded492c5e2fd068
                          • Instruction ID: 6d69ba9afc2e782eda75f920e233483d1ac837f9c9b6a2903f61b8c326be5067
                          • Opcode Fuzzy Hash: f85ae67141ccd2159f730b8912617362899918de70a0573beded492c5e2fd068
                          • Instruction Fuzzy Hash: 2F02C491B08BC34AE7519E71D8647B927A6EBA579DF804032FE8CE7786DE7ED4108700
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpymemset
                          • String ID:
                          • API String ID: 1579693990-0
                          • Opcode ID: 8a0961b594d8897c1cfbaab559b24f0fd647447cd01965fe8d278f0924e5ba90
                          • Instruction ID: 556e46783a481adb9691ecd8c874d827bbec333edf519621ab7405bfb9d7bb76
                          • Opcode Fuzzy Hash: 8a0961b594d8897c1cfbaab559b24f0fd647447cd01965fe8d278f0924e5ba90
                          • Instruction Fuzzy Hash: 5B918151B0D7824AFA559F52946037A23F0AF65BC6F844036FE8DE7781EF2EE4609B40
                          APIs
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6CE51C958), ref: 00007FF6CE51CAA5
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6CE51C958), ref: 00007FF6CE51CABF
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: I32$I64$Internal error removing splay node = %d
                          • API String ID: 1114863663-13178787
                          • Opcode ID: 0bd6f3ce0eb9efa559762f6cd6d83293cff1563dfc034f1505ff0ae0cd07bc7b
                          • Instruction ID: 64df0f963ec9dbf65791cc997962f13d6ea5c2b7a76215d7a6db2f1723122b83
                          • Opcode Fuzzy Hash: 0bd6f3ce0eb9efa559762f6cd6d83293cff1563dfc034f1505ff0ae0cd07bc7b
                          • Instruction Fuzzy Hash: 80A1D232A09A8286EB25CF14E46477D7BB4FB58B49F854136EACDA3654DF3ED208C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$free
                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                          • API String ID: 573759493-910067264
                          • Opcode ID: 54b26b050531f9d3962397418c673469a9ae189796eac94304e68ba209cc031d
                          • Instruction ID: 9df51dabac61ebba9df1b489a0138a6a79efc0a4c14adc942dce88abd9172fd2
                          • Opcode Fuzzy Hash: 54b26b050531f9d3962397418c673469a9ae189796eac94304e68ba209cc031d
                          • Instruction Fuzzy Hash: FB61C162A0D6D244FB128F24952427D7BB5AB21782FC44433E6CDE3694DF3EE556C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 1169197092-2292467869
                          • Opcode ID: fbca9a31774d3948abfc8bde6385b24e9c13405d3297c77e617c12b389925420
                          • Instruction ID: 55a71af124d4422ccf935d27fde58974655b621f84a65a1767601eb677fb6f64
                          • Opcode Fuzzy Hash: fbca9a31774d3948abfc8bde6385b24e9c13405d3297c77e617c12b389925420
                          • Instruction Fuzzy Hash: D2618261E097C245FF718F11946437A67B1EF6675AF880436FACDA2691DF2EE4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$strchr
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 3404610657-2292467869
                          • Opcode ID: ed15935b41d9716d9209843b1d74f40e2e5b31e4e241751d3180b25554e6e972
                          • Instruction ID: 2500bb49e76b2c53df883ec7983394ed30148d5b874c1d71990ad3a560e54569
                          • Opcode Fuzzy Hash: ed15935b41d9716d9209843b1d74f40e2e5b31e4e241751d3180b25554e6e972
                          • Instruction Fuzzy Hash: 46617362E097C245FF718F25946437A77B1EF6675AF880436FACEA2691DF2EE4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strstr
                          • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                          • API String ID: 1392478783-2096918210
                          • Opcode ID: 844a1a8c31489c3efac71edcf4aae03b41e9cbc86e7a0cba2f1709ef24d1e145
                          • Instruction ID: 62ee932b2e7fa6789bf789e367e12c7eb5f15742e3606cf1674bb76ce69ac72d
                          • Opcode Fuzzy Hash: 844a1a8c31489c3efac71edcf4aae03b41e9cbc86e7a0cba2f1709ef24d1e145
                          • Instruction Fuzzy Hash: B5512B62A0978581EA24CF14E4642B973B0EB65375FC4023AFADC936C5DFBEE485D300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freememcpy$malloc
                          • String ID: Failed to alloc scratch buffer!
                          • API String ID: 169112436-1446904845
                          • Opcode ID: f07d16c8db75daab703eda920ca8bee5a1d60bad19846edda8dad97a1c8747b6
                          • Instruction ID: 0454087d26017ee3d4c9b8f7de6c97b99c3d1b006e63488bf26be64d393f8219
                          • Opcode Fuzzy Hash: f07d16c8db75daab703eda920ca8bee5a1d60bad19846edda8dad97a1c8747b6
                          • Instruction Fuzzy Hash: 80519C72A187C18AEB258F65E4102AAB7B0FB29786F840435EF9DA7755CF3DE164C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastfreememcpy
                          • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                          • API String ID: 1248052217-2335292235
                          • Opcode ID: b537cd0686db900729d60750a7bab37339ded9b30baf1a0b0bc80de19cd80e4e
                          • Instruction ID: 8f09ab2e169770b4c7c6ce46ef1c66685823aeab41e009a26012932d4fe37a72
                          • Opcode Fuzzy Hash: b537cd0686db900729d60750a7bab37339ded9b30baf1a0b0bc80de19cd80e4e
                          • Instruction Fuzzy Hash: D351F061B0868281FB64DF2595203B923B0BF657A6F844539FECDE72C5EFAEE4458300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                          • API String ID: 2190258309-3231818857
                          • Opcode ID: ffaf596b14581a51dbec7e1e939417e7a00235b6deeb473628b968afd7d20675
                          • Instruction ID: d4a6c75d93eb1644f9bdac0b1f6b097ae7febeb66a7f9dac81e793bf42366b1c
                          • Opcode Fuzzy Hash: ffaf596b14581a51dbec7e1e939417e7a00235b6deeb473628b968afd7d20675
                          • Instruction Fuzzy Hash: 5551A172E0C6C245EB618F25A4642B9A7B4FB65B92F940032FACDA3B54DF3ED155C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Digest$stale$true
                          • API String ID: 1294909896-2487968700
                          • Opcode ID: 9872ef22fbc7acb70b1996d9569a3875116c09c5c4c57022450102bbd1a66648
                          • Instruction ID: 9cb1870cc22f03cac75c635c4fb86f561ddbef5d235e47b7a5165657cb144c80
                          • Opcode Fuzzy Hash: 9872ef22fbc7acb70b1996d9569a3875116c09c5c4c57022450102bbd1a66648
                          • Instruction Fuzzy Hash: CD517022A0CA4681EF208F25A4603B923B0FF64B86F945132FADED76D5DF2ED565C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchrmemcpyrecvfrom
                          • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                          • API String ID: 3107918033-477593554
                          • Opcode ID: e30255a1e197dfbe4226e61a6f75f7ca35337a9a1cb9ce9eb7594185eea2c60c
                          • Instruction ID: ed738ba42d0a99d44c5e06d5f793d3f3fa8bfcbedd53293dc46b89b7d090427d
                          • Opcode Fuzzy Hash: e30255a1e197dfbe4226e61a6f75f7ca35337a9a1cb9ce9eb7594185eea2c60c
                          • Instruction Fuzzy Hash: AB51D4B2A086C285EB648F2594313F973B0EB95B46F884132EA8ED7785DE3EE445C710
                          APIs
                            • Part of subcall function 00007FF6CE4F85A0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6CE4F2B9B), ref: 00007FF6CE4F861E
                            • Part of subcall function 00007FF6CE4F85A0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6CE4F2B9B), ref: 00007FF6CE4F862C
                            • Part of subcall function 00007FF6CE4F85A0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6CE4F2B9B), ref: 00007FF6CE4F8642
                            • Part of subcall function 00007FF6CE4F5220: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F5266
                            • Part of subcall function 00007FF6CE4F7480: memcpy.VCRUNTIME140(?,?,?,00007FF6CE4F258A), ref: 00007FF6CE4F7511
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2C39
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2C78
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2CC6
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2D14
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                          • String ID: at line $, column
                          • API String ID: 2665656946-191570568
                          • Opcode ID: 1cbd65d2ad6282b726e0432499286016b7bdefc2c4b8b55621109d597560904c
                          • Instruction ID: 197f3b90ec10e60a95795ee192f42a3b06edb583cbdb77bbd6024e2955cf4b70
                          • Opcode Fuzzy Hash: 1cbd65d2ad6282b726e0432499286016b7bdefc2c4b8b55621109d597560904c
                          • Instruction Fuzzy Hash: E151A472B14A8285FB04DF64E4443AD2371EB54BA9F409235EAAD63BD9DE3CE486D304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: ee8256e6c641fc7acf54d835f91dd107ffffd04d9b8e21e3da9a6e28498182d3
                          • Instruction ID: e02a34dc1bdf56a24749f1107ed2927682f933d0f55707d58b97f49c0e19235f
                          • Opcode Fuzzy Hash: ee8256e6c641fc7acf54d835f91dd107ffffd04d9b8e21e3da9a6e28498182d3
                          • Instruction Fuzzy Hash: 9241F515D0D6A244EB728F1160343792BE0AF65796F884572EECEA73C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 1f06ac2c2db2ed292e1209add7e7fdc6f5bee92097317e6e5c9bf9d8505bdf6e
                          • Instruction ID: 4e9b3d8e391f755db31573f3d0bac4120ffe106558895fbefe23ce2f9c6f960c
                          • Opcode Fuzzy Hash: 1f06ac2c2db2ed292e1209add7e7fdc6f5bee92097317e6e5c9bf9d8505bdf6e
                          • Instruction Fuzzy Hash: DF41C116D0D6A244FB728F1160343782AE1AF66B92F884572EEDEA77C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: e5d2b920f6fad23b7d857adecd6d9ce75d44ef241f253d21975143f90b7f960b
                          • Instruction ID: e398eb6426d0fb26842169d020be21e1f517e5bb2e73d47c4cc866a815e200ba
                          • Opcode Fuzzy Hash: e5d2b920f6fad23b7d857adecd6d9ce75d44ef241f253d21975143f90b7f960b
                          • Instruction Fuzzy Hash: F841C215D0D6A245EB728F1160343782AE19F66B92F884572EEDEA73C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: f9e765357c992b02e2218c78d6b7491856dec5e75eb9dee0735e4099ee135759
                          • Instruction ID: ce33bbfd591746f3d15f4312cc1e8d7330d2019d6155a2be3f0d8aee5aa53df9
                          • Opcode Fuzzy Hash: f9e765357c992b02e2218c78d6b7491856dec5e75eb9dee0735e4099ee135759
                          • Instruction Fuzzy Hash: D141D21AD0D6A244FB728F1160343782AE19F66B92F884572EEDEA73C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: f003c0c23f757f9835ce5411ef82e8ecd9bda05e3f4b176c9f732a7e5e21500d
                          • Instruction ID: da43ffafd97f88ed6f6f191b6f04773043cfa2968fb970bcff67be2591760f03
                          • Opcode Fuzzy Hash: f003c0c23f757f9835ce5411ef82e8ecd9bda05e3f4b176c9f732a7e5e21500d
                          • Instruction Fuzzy Hash: B841D21AD0D6A244FB728F1160343782AE19F66B92F884572EEDEA73C1DE2FE454C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: d73fb743654f17fb8901fe81bc0a87751306d9d183506669951af1b5a1e1865e
                          • Instruction ID: e74722bda99d411f6d4c93c8d8745c5c50666a6a4f11553adfa2c9902efe52cc
                          • Opcode Fuzzy Hash: d73fb743654f17fb8901fe81bc0a87751306d9d183506669951af1b5a1e1865e
                          • Instruction Fuzzy Hash: F141B216D0D6A244FB728F1160343782AE19F66B92F884572EEDEA73C1DE2FE455D310
                          APIs
                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,?,?,?,00007FF6CE502BF3), ref: 00007FF6CE50387F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,?,?,?,00007FF6CE502BF3), ref: 00007FF6CE5038BC
                          • memcpy.VCRUNTIME140(?,?,00007FF6CE502BF3), ref: 00007FF6CE5038C6
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE5038F9
                          • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF6CE502BF3), ref: 00007FF6CE503915
                          • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF6CE502BF3), ref: 00007FF6CE503921
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF6CE502BF3), ref: 00007FF6CE50392A
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$V12@memcpy$?flush@?$basic_ostream@?put@?$basic_ostream@?widen@?$basic_ios@Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2833359088-0
                          • Opcode ID: 15f9be253039e2240bc063e1b11da71aa7b45287e2af7634d6298ad7d8be59dd
                          • Instruction ID: 68c381d10149d15d82f257e44a0ebd4701db0a77eba05fd824b828ca75f1f5c1
                          • Opcode Fuzzy Hash: 15f9be253039e2240bc063e1b11da71aa7b45287e2af7634d6298ad7d8be59dd
                          • Instruction Fuzzy Hash: 2D411222B0A78294EE10DF16A4A02AC6371AF25BD6F884634FE9E57785CF7DE0518300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 5325258f47ecb0cdc857169e9780d9b3006acdf0ad44a563aa746d9c97f95c7b
                          • Instruction ID: 9b3988eb6e81bb38ccd0a160889c3a036d973d6fa48cba6bc6c4c3e5c440b120
                          • Opcode Fuzzy Hash: 5325258f47ecb0cdc857169e9780d9b3006acdf0ad44a563aa746d9c97f95c7b
                          • Instruction Fuzzy Hash: B941B016E0D6A244EB728F1160343782AE19F66B92F884572EEDEA73C1DE2FE455C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr
                          • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                          • API String ID: 2830005266-711804848
                          • Opcode ID: 851d42c5b0538a36ac9c8d52a6757b20b88b90d20e5ed6bbe32c34a07d881715
                          • Instruction ID: 6bbb1c0d9c642fc91f6e349ced38407945307cb86216e24c0b0e52f4a1d09996
                          • Opcode Fuzzy Hash: 851d42c5b0538a36ac9c8d52a6757b20b88b90d20e5ed6bbe32c34a07d881715
                          • Instruction Fuzzy Hash: 66410321B0D78289EA54DF1AA4240B973B0AF7579AFCC5034FACE97786DF2EE5418700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                          • API String ID: 1294909896-3155708153
                          • Opcode ID: ce6692e43ce4d85e4612fff7a1fd1c9a94e34705a187f2fd19fea5fc41e17d7a
                          • Instruction ID: e1fc76e68acd4ba2872ec8aa3629ac2f2f9eba55d62e7088aa7a7989af53813f
                          • Opcode Fuzzy Hash: ce6692e43ce4d85e4612fff7a1fd1c9a94e34705a187f2fd19fea5fc41e17d7a
                          • Instruction Fuzzy Hash: 4541AFA5E0878645EE518F6194201F937B5BB6578AFC41432FE8EAB356EE3EE114C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fseek
                          • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                          • API String ID: 623662203-959247533
                          • Opcode ID: dec987291859e4624c16fd747bb98326cd414e23c76ad7932897736b281e4466
                          • Instruction ID: 3753d599cc9f33d6c77c65058041ccb8a0bc4e7f4c571616f9540e5f309f62b5
                          • Opcode Fuzzy Hash: dec987291859e4624c16fd747bb98326cd414e23c76ad7932897736b281e4466
                          • Instruction Fuzzy Hash: 6841A461B1868241E7549F69D4613B823A2EF94B89F882131EE4E9B38ADE3FD481C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: .
                          • API String ID: 1865132094-916926321
                          • Opcode ID: 5c991e7a33f54c6c18581161dd0593080ff6002acef01b1ad7369ad74ff58d0c
                          • Instruction ID: f0d03392612904270801282428211e19cf6fb364b3d9f29b893fb197a95fb40f
                          • Opcode Fuzzy Hash: 5c991e7a33f54c6c18581161dd0593080ff6002acef01b1ad7369ad74ff58d0c
                          • Instruction Fuzzy Hash: AF417D22E0DB8582F620DF11E42037D63B5EB68B92F894031EA9EA7A50DF7AE4518740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3401966785-517259162
                          • Opcode ID: 108d7e799b468a7d46d683869f1311f7a02171bc92069e3486388892e8923149
                          • Instruction ID: 0a01af8d4dec477465966ab565486f37791149b439d41cf209524ce70f643f0a
                          • Opcode Fuzzy Hash: 108d7e799b468a7d46d683869f1311f7a02171bc92069e3486388892e8923149
                          • Instruction Fuzzy Hash: 4D41C1A5E0878245FF508F6194241F823B5BF6578AF880436ED8EBB796EF3EA114C300
                          APIs
                            • Part of subcall function 00007FF6CE52F8F0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F918
                            • Part of subcall function 00007FF6CE52F8F0: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F93E
                            • Part of subcall function 00007FF6CE52F8F0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F95F
                            • Part of subcall function 00007FF6CE52F8F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F970
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE543E7F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE543EC8
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE543ED1
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$realloc$EnvironmentVariable
                          • String ID: %s%s.netrc$%s%s_netrc$HOME
                          • API String ID: 4174189579-3384076093
                          • Opcode ID: d2ce4dc3e812534eeb9e1d008ad1995355e9f1d6f68227a971d658bd671407bc
                          • Instruction ID: 67727af179a1ea19a29681808f047d300c925ecff87a4e4d4a9524f49ea828d7
                          • Opcode Fuzzy Hash: d2ce4dc3e812534eeb9e1d008ad1995355e9f1d6f68227a971d658bd671407bc
                          • Instruction Fuzzy Hash: E4319622A09B4281EA20DF16B82016663B4BF64BD6FD40432FDCDE7765DF3DE0158700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$memcpy
                          • String ID: Signature: %s$Signature
                          • API String ID: 3519880569-1663925961
                          • Opcode ID: 1b1385a64952a44483e91997569071a29c027b71a1135d49ae6c5b52ea412f47
                          • Instruction ID: 7488084e18c89bf2e4b0eece57e3540132970d8546fde113a6e8856bfe0d433a
                          • Opcode Fuzzy Hash: 1b1385a64952a44483e91997569071a29c027b71a1135d49ae6c5b52ea412f47
                          • Instruction Fuzzy Hash: 4C31D471F0978282EE51CF16A4242B963B4BFA5BD5F840132FE8DA7795EE3EE0158300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: Start Date: %s$FALSE$Start Date$TRUE
                          • API String ID: 1865132094-176635895
                          • Opcode ID: ab1f4ae8c9a38d7471090914ba8ffa7513e267a7a4cade6c341c4b21be4af453
                          • Instruction ID: 5f488d4894a04e61101c6dac215b890ec305fd61ac5f37e63e10904bc4354399
                          • Opcode Fuzzy Hash: ab1f4ae8c9a38d7471090914ba8ffa7513e267a7a4cade6c341c4b21be4af453
                          • Instruction Fuzzy Hash: F621B3A6A0C7C255EB618F11A4642B93375FB55786FC40432EA8EA7756DF2EE055C300
                          APIs
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE519025
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE519051
                          • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE519059
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE51907B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6CE51636C), ref: 00007FF6CE519092
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_errnostrerrorstrtoul
                          • String ID: Invalid zoneid: %s; %s
                          • API String ID: 439826447-2159854051
                          • Opcode ID: f4ca43e43df7e3bbc22dee19bae3a3e7dabca7d7908a20f9c0ba3a808230b1dc
                          • Instruction ID: 12cb4a97381aa05bc3e55c4a0d5473e13f1706e3102b9036d912fbc6c7b9e1d7
                          • Opcode Fuzzy Hash: f4ca43e43df7e3bbc22dee19bae3a3e7dabca7d7908a20f9c0ba3a808230b1dc
                          • Instruction Fuzzy Hash: 011190B2E1968282EB10DF61E4601B83370EFE5B46F941035EA8DD37A4DE2FE844C700
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F34
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F4A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F5E
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F72
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F86
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518F9A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518FAE
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE518FC2
                            • Part of subcall function 00007FF6CE541EC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE518FDB,?,?,00000000,00007FF6CE514A23,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE541ED5
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 9490af20bca0821dc354af4aae99f169b7203ef8c711842bd6770f711ea81fc3
                          • Instruction ID: 973378ac2bbfde52e265499176a1db0047044035538939c118a1915e2c427d0d
                          • Opcode Fuzzy Hash: 9490af20bca0821dc354af4aae99f169b7203ef8c711842bd6770f711ea81fc3
                          • Instruction Fuzzy Hash: 1F11A436918E80C1DB10DF61F9A51E823B8FBD9B9AB581031EE9B8E754DF3580658220
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A11
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A21
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A2F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A3D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A4B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A59
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A67
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE516206), ref: 00007FF6CE512A75
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 2c59c0258da59ea11c7abbe764ae23b3f6b2cd009dab738447c14b14124d9ae8
                          • Instruction ID: 5d560cfd08ac8a9f211557ef1b88689c9c4c3ccad18852b182724852973f3209
                          • Opcode Fuzzy Hash: 2c59c0258da59ea11c7abbe764ae23b3f6b2cd009dab738447c14b14124d9ae8
                          • Instruction Fuzzy Hash: 6C01B376918B01C2DB10DF61F5A523C33B8FB98F9A7502525DE9E92718CF3AC4A5C260
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: Start Date: %s$Start Date
                          • API String ID: 3401966785-2389359183
                          • Opcode ID: 9bbd67aaccf9cadf82fb6497df90d81440caf609fd73dc8c32faf7883cc7d217
                          • Instruction ID: 34c70c36abb72ca95cd090c88c81e61e144a711f09bb1bc6d4d3829b3f9be292
                          • Opcode Fuzzy Hash: 9bbd67aaccf9cadf82fb6497df90d81440caf609fd73dc8c32faf7883cc7d217
                          • Instruction Fuzzy Hash: 5D415B55A082C206FF598F1180342B92771EB257A2F844637F6AFB77D6EE2EA0758300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: ec9b73d24a0c34c8da037ef226d6443237174b11aece3f5d776ff66a1c9efe33
                          • Instruction ID: 62d3128a8d70b654031d5e86e2357296deeccf1ac879e8a292224ebc8effe938
                          • Opcode Fuzzy Hash: ec9b73d24a0c34c8da037ef226d6443237174b11aece3f5d776ff66a1c9efe33
                          • Instruction Fuzzy Hash: 2631B162719A8695EE149F16A5142A86371AF64FE1F844B31FEAD577D9CE3CE0418300
                          APIs
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6CE4F5295,?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F6653
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6CE4F5295,?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F6661
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF6CE4F5295,?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F669A
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6CE4F5295,?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F66A4
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6CE4F5295,?,?,?,?,?,00007FF6CE4F255B), ref: 00007FF6CE4F66B2
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4F66E1
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 3750e6bf37c024cd3fff6ea3c2c1d9ca45758413d4f3398dfde53edf71277f15
                          • Instruction ID: 2c70af75de5226fe1a286e80c42e5c2acc1b25c20b5324c1849aa88c788d7a59
                          • Opcode Fuzzy Hash: 3750e6bf37c024cd3fff6ea3c2c1d9ca45758413d4f3398dfde53edf71277f15
                          • Instruction Fuzzy Hash: F941E4A170968685EE249F16A5042AD63B1EB55FE1F848630EFEDA77C9CE3CE0418344
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 058efdf56ccbf18665278e5e554732f5308646915042b8d141bbe00cd9663574
                          • Instruction ID: 4ca9a0072286f2fcb9555076b48454c3e7c9c1032d26694c5198c4bea8088f9f
                          • Opcode Fuzzy Hash: 058efdf56ccbf18665278e5e554732f5308646915042b8d141bbe00cd9663574
                          • Instruction Fuzzy Hash: EE41E262B09A8681EE219F12A4642AA63B1BB15BD5FD40631FFDD9B785DF3DE1418300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupstrchr$mallocstrncpy
                          • String ID:
                          • API String ID: 2121287944-0
                          • Opcode ID: 5676368ad15ab2044f9e3e0bbe9584b9475c3e99f4f592c46ad953cfdca637da
                          • Instruction ID: 99b8d5d0d8ca710506dbaec06b2708141300b75c94c5857dd109806da7c8c896
                          • Opcode Fuzzy Hash: 5676368ad15ab2044f9e3e0bbe9584b9475c3e99f4f592c46ad953cfdca637da
                          • Instruction Fuzzy Hash: F831C821A09B8686EA64EF21A46037576B0FF69BD1F844635EECE937D5DF3DE0508340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-517259162
                          • Opcode ID: a8cf219ff02d1c673cbbf0f42a3d7358e55c00e3b89862292003d1a924f2c463
                          • Instruction ID: 74d37351cb68d1a14f3178061e97713ca398f16be1b8641ba694993718999987
                          • Opcode Fuzzy Hash: a8cf219ff02d1c673cbbf0f42a3d7358e55c00e3b89862292003d1a924f2c463
                          • Instruction Fuzzy Hash: BA41C4A5B087C245EF508F6194241F93775BB6578AF880436EE8EA778AEF3EE114C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                          • API String ID: 1294909896-2901970132
                          • Opcode ID: 814d87ee8f1a2e64b5af76deddb3e54e775e410a3373916e88a6bec358235fc1
                          • Instruction ID: ee9a066f91f61788dffcb68959bb93987558d4b0c7b46b95cca41b1897c309ff
                          • Opcode Fuzzy Hash: 814d87ee8f1a2e64b5af76deddb3e54e775e410a3373916e88a6bec358235fc1
                          • Instruction Fuzzy Hash: DD31A2A1E0878645EB509F6194201F93775BF6578AF841432FE8EAB356EF3EE124C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                          • API String ID: 3061335427-2901970132
                          • Opcode ID: cdd494d5907edce78a1b3ad990dd3e5ea0588444b06d4b76ad48cd4fa67fcc66
                          • Instruction ID: bfe7b66975e2dcaef1c901a3e1e54d762985db1fc36ba103152807473c8c278f
                          • Opcode Fuzzy Hash: cdd494d5907edce78a1b3ad990dd3e5ea0588444b06d4b76ad48cd4fa67fcc66
                          • Instruction Fuzzy Hash: C631AFA1E0878245EB508F6194201F937B5BF6578AF841436FE8EAB35AEF3EE114C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                          • API String ID: 3061335427-2901970132
                          • Opcode ID: 7991363a0313ed0dabebba338b8bb3fae589b424e5f1d5319233e0193346de05
                          • Instruction ID: d43f413837f5d26c4207f861b94a744cebe2fba11283e3ddacd96b39c92ef78f
                          • Opcode Fuzzy Hash: 7991363a0313ed0dabebba338b8bb3fae589b424e5f1d5319233e0193346de05
                          • Instruction Fuzzy Hash: FF3190A1E0878245EB509F6194211F937B5BF6578AF841436FE8EAB35AEF3EE114C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$%s%lx$Signature
                          • API String ID: 2190258309-1406629954
                          • Opcode ID: 7c2445a437aa6e9c6eedac30248aab740272c2697002318a9ca2fa1cb01766ad
                          • Instruction ID: a0e51bd654a0e7b23449aedf3de1613b0481d8c87f02773b5a6e6e5d7e0f2232
                          • Opcode Fuzzy Hash: 7c2445a437aa6e9c6eedac30248aab740272c2697002318a9ca2fa1cb01766ad
                          • Instruction Fuzzy Hash: 6431C762F0868246EE508F25E4642B963B4FB95B85F840432FECDA7755DE2FD011C700
                          APIs
                          • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE50396D
                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE503987
                          • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE5039B9
                          • ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE5039E3
                          • std::_Facet_Register.LIBCPMT ref: 00007FF6CE5039FC
                          • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6CE502AEC), ref: 00007FF6CE503A1B
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@D@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                          • String ID:
                          • API String ID: 295490909-0
                          • Opcode ID: f6e581ddbb454a6584e87d1f25c38fc3f92ab443521ca881e5d300a07bf7bc99
                          • Instruction ID: d1b97df8c1bf45c23c4fddb4f79e2ce87f96846a345aaff055c9ad80ec140a59
                          • Opcode Fuzzy Hash: f6e581ddbb454a6584e87d1f25c38fc3f92ab443521ca881e5d300a07bf7bc99
                          • Instruction Fuzzy Hash: 73317226A0DB8585EA149F11E4A01697370FBA8B99F880631FBDD977A9DF3DE440C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                          • String ID:
                          • API String ID: 469868127-0
                          • Opcode ID: 602731b9b1b1dca77b9102e7dae472892587333dbf5f7b03975aa90894b5eb42
                          • Instruction ID: 976cf4ac7431c06985658025a70771e900e48cb5faa4fba0d1779f99a3bf1410
                          • Opcode Fuzzy Hash: 602731b9b1b1dca77b9102e7dae472892587333dbf5f7b03975aa90894b5eb42
                          • Instruction Fuzzy Hash: A5213E76708A8186EA20DF52E5642297370FBA8B92F544035EFCE93B55DF7EE461C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno_strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 2151398962-2292467869
                          • Opcode ID: b72f509f3f245e5f82a3544111d7e60eb25a11963bfd4d9dec3e021f281af0ad
                          • Instruction ID: 0fd45ff991e954b4f05c79002ba6ca03ab6030a0f0e6fba869396a19b5f3e24e
                          • Opcode Fuzzy Hash: b72f509f3f245e5f82a3544111d7e60eb25a11963bfd4d9dec3e021f281af0ad
                          • Instruction Fuzzy Hash: 31617461E097C645FF718F2594643BA67B1EF6674AF880436FACDA2691DF2EE844C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupstrchr
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 3727083984-2292467869
                          • Opcode ID: aebe370b010a1a5f820bbae96d615cec1952ca862e468dcc82989100e0e24757
                          • Instruction ID: ef7d197a66682bded1e9ec6203b26b74db18255790f4d4c87570edf6934a4e69
                          • Opcode Fuzzy Hash: aebe370b010a1a5f820bbae96d615cec1952ca862e468dcc82989100e0e24757
                          • Instruction Fuzzy Hash: F6618262E097C245FF718F21946437A67B1EF6674AF880436FACDA2691DF2EE844C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                          • API String ID: 1865132094-1204028548
                          • Opcode ID: bcbbadb753b415eb2ceb686b909547f30a32b45e311577f7ff9c4637e5aeabd1
                          • Instruction ID: f66bee17b4ad102bd92be7fc01c412220fc0ea5c784da201d21cd0eb7dcc2250
                          • Opcode Fuzzy Hash: bcbbadb753b415eb2ceb686b909547f30a32b45e311577f7ff9c4637e5aeabd1
                          • Instruction Fuzzy Hash: 7551AB31A0C68245FB658F2490683B927B1EB7574AF980035EBCDE66C9DF2FE450C722
                          APIs
                            • Part of subcall function 00007FF6CE4F5980: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                            • Part of subcall function 00007FF6CE4F52A0: memcpy.VCRUNTIME140 ref: 00007FF6CE4F52F3
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2EB2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2F00
                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF6CE4F2F50
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE4F2F9D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                          • String ID: out_of_range
                          • API String ID: 2484256320-3053435996
                          • Opcode ID: a34bb542486326b7f0eb5bbab939db0ef8fe0dc2fe9a393e5024e9f116bb4741
                          • Instruction ID: dcc137df5ecd1d8565836efac796fb9a4045a2514c414878e0907190fa9fad99
                          • Opcode Fuzzy Hash: a34bb542486326b7f0eb5bbab939db0ef8fe0dc2fe9a393e5024e9f116bb4741
                          • Instruction Fuzzy Hash: 0F51B132A19B4299FB00CF64D4503AC3375EB64B99F808231EA9D93AD9DF3DE195C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno_strdupstrcspnstrncmpstrspn
                          • String ID: 0123456789abcdefABCDEF:.
                          • API String ID: 2191890455-446397347
                          • Opcode ID: 0fe5a7b3f98b8b7ba8c4c99c01e3b2948844d30d354f25457daeafb4e39fb8cd
                          • Instruction ID: 70f61c1a97dc451a05d1b5d119e93c8ad7a037b2ae8631c35f8143fa500d68b6
                          • Opcode Fuzzy Hash: 0fe5a7b3f98b8b7ba8c4c99c01e3b2948844d30d354f25457daeafb4e39fb8cd
                          • Instruction Fuzzy Hash: 9141E412A0CAC945EF228F24A42037977B4EB26B52FC40636EACD977D5DF2EE465C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$free
                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                          • API String ID: 573759493-632690687
                          • Opcode ID: 578a54f3296da458d1d6ad0bdfdd8588f109dd191744e26feaecc399d90e1ac9
                          • Instruction ID: 4116213513cb7def443dc805490d06ed5f8ef405a746ba8d3d20b26bad38ec1e
                          • Opcode Fuzzy Hash: 578a54f3296da458d1d6ad0bdfdd8588f109dd191744e26feaecc399d90e1ac9
                          • Instruction Fuzzy Hash: C641D522A0DAC695F711CF25916037CBBB1AB65B82FC84132E6CDA2685CF3ED565C700
                          APIs
                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F59B1
                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F5A76
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE4F5ACA
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4F5AD1
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID: black
                          • API String ID: 1155477157-2307242536
                          • Opcode ID: d7a50970d6f6d37e7726b73f9fdb74122679e35b1a9e6901d7e39946806c6e7b
                          • Instruction ID: 99829b35b8cf18e1645e4679052b891bb66c0baf091c44466c76ffa5505f434e
                          • Opcode Fuzzy Hash: d7a50970d6f6d37e7726b73f9fdb74122679e35b1a9e6901d7e39946806c6e7b
                          • Instruction Fuzzy Hash: E6312532F0668748EE19DF15A55427822709F10FF6F484630EEADA7BD5DE7CE8928304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: tolower$_time64
                          • String ID: :%u$Hostname in DNS cache was stale, zapped
                          • API String ID: 4068448496-2924501231
                          • Opcode ID: c35070c0db4078c23490f5c1a96604c7c221ae84f691727a7c67632279e9d20e
                          • Instruction ID: eeb20c2c941a45a9e823f89e1b6d92ef5321678fc9f56e896362b89051502bd6
                          • Opcode Fuzzy Hash: c35070c0db4078c23490f5c1a96604c7c221ae84f691727a7c67632279e9d20e
                          • Instruction Fuzzy Hash: 4D41D426A1968291EA20CF11E4647B97770FB64B95F844231FE8DA7B95DF3EE005C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                          • API String ID: 3985033223-1703240927
                          • Opcode ID: c932179416f22d1a9e7d57fd4589fd249bf1c03caa6153466f077bf1a759ea68
                          • Instruction ID: b15986630126174e56b2da3145d0a249f1fda1e02e443efc444e08a8ab2b9c47
                          • Opcode Fuzzy Hash: c932179416f22d1a9e7d57fd4589fd249bf1c03caa6153466f077bf1a759ea68
                          • Instruction Fuzzy Hash: 3641B425E09A9281EF118F55D46037867B0EF64BEAF844131EEADA77C5DF2EE502C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$_strdupfree
                          • String ID: FALSE
                          • API String ID: 3359907120-3701058176
                          • Opcode ID: 33c320c159b2dd0019efddd7297e992a1e4b8238c05c7671edbfa74a6984c7ba
                          • Instruction ID: 4b32ebb2652046d3bdd7ffa10bec3cc8cc1493d1b4315132b33a18f3e6660390
                          • Opcode Fuzzy Hash: 33c320c159b2dd0019efddd7297e992a1e4b8238c05c7671edbfa74a6984c7ba
                          • Instruction Fuzzy Hash: 28310622E0D69644FB12CF28942433C6BB05B25B66FC40633EADEA56C1CE3ED495C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreestrpbrk
                          • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                          • API String ID: 1812939018-579818044
                          • Opcode ID: fd002c5fda19e28f6138e281b37765518e42b7f311f6b13a94937346a2177fdf
                          • Instruction ID: 771dd891ef8d2714a530294de414750152c74b27a4d3817a4143392a4dc819a1
                          • Opcode Fuzzy Hash: fd002c5fda19e28f6138e281b37765518e42b7f311f6b13a94937346a2177fdf
                          • Instruction Fuzzy Hash: 7431A262A18BC181EB01CF25E4602B9A7B0FBA5B95F889231FADE53795DF7DD541C300
                          APIs
                            • Part of subcall function 00007FF6CE4F53E0: memcpy.VCRUNTIME140(?,?,038E38E38E38E38E,00007FF6CE4F1849), ref: 00007FF6CE4F5492
                            • Part of subcall function 00007FF6CE4F53E0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4F54B7
                            • Part of subcall function 00007FF6CE4F53E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,038E38E38E38E38E,00007FF6CE4F1849), ref: 00007FF6CE4F5474
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,00000000,00000000,?,00000000,00007FF6CE4F18BD), ref: 00007FF6CE503DD9
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,00000000,00000000,?,00000000,00007FF6CE4F18BD), ref: 00007FF6CE503DE0
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,00000000,00000000,?,00000000,00007FF6CE4F18BD), ref: 00007FF6CE503DE7
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,?,00000000,00000000,?,00000000,00007FF6CE4F18BD), ref: 00007FF6CE503DEE
                          • __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,?,00000000,00007FF6CE4F18BD), ref: 00007FF6CE503E24
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task__std_exception_copymemcpy
                          • String ID:
                          • API String ID: 1942857678-0
                          • Opcode ID: 2ab750b89eafc8c325caa7b3c2e2d632db3c7bd570751d0e81a418894a5c78a6
                          • Instruction ID: 11580ae47c60216c447851efd36d5f0d6fcea61cc4a62a6f0b7ad53818153032
                          • Opcode Fuzzy Hash: 2ab750b89eafc8c325caa7b3c2e2d632db3c7bd570751d0e81a418894a5c78a6
                          • Instruction Fuzzy Hash: A071AC73A04BC586EB20DF24E8943ED37B1E725B89F808135EA8D5AA5ADF79D5D4C300
                          APIs
                            • Part of subcall function 00007FF6CE547C40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547C66
                            • Part of subcall function 00007FF6CE547C40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547C87
                            • Part of subcall function 00007FF6CE547C40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CA2
                            • Part of subcall function 00007FF6CE547C40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CB0
                            • Part of subcall function 00007FF6CE547C40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CC2
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE547D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: HTTP$NTLM
                          • API String ID: 2190258309-4188377180
                          • Opcode ID: 21a5017a56f3473826fe67d1390752946f547c3f1a1b08df1558efcb37d8a741
                          • Instruction ID: 246879e1b9260f477721a03bdc75489a24ed354b1d713399309c1bf468d61e48
                          • Opcode Fuzzy Hash: 21a5017a56f3473826fe67d1390752946f547c3f1a1b08df1558efcb37d8a741
                          • Instruction Fuzzy Hash: DE616D32608B8286EB608F25E45066E73B4FB98B85F944136EECD93B58DF3ED454CB40
                          APIs
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6CE550F50), ref: 00007FF6CE550FFF
                            • Part of subcall function 00007FF6CE52B2B0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6CE50E2DA,?,?,?,?,?,?,?,00007FF6CE50E0A7), ref: 00007FF6CE52B2C1
                            • Part of subcall function 00007FF6CE52B2B0: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6CE52B463
                            • Part of subcall function 00007FF6CE52B2B0: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6CE52B480
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6CE550F50), ref: 00007FF6CE55106E
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6CE550F50), ref: 00007FF6CE551088
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6CE550F50), ref: 00007FF6CE5510BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_errno
                          • String ID: xn--
                          • API String ID: 2644425738-2826155999
                          • Opcode ID: 839c8b92e3b9afacb66d4b51936a73871cdfbc3f19561b6dfda382d68fbcc2d3
                          • Instruction ID: 7de5d4e3460640d3fb6132394129fb578c72cc33797d4d32771c73add0641fbc
                          • Opcode Fuzzy Hash: 839c8b92e3b9afacb66d4b51936a73871cdfbc3f19561b6dfda382d68fbcc2d3
                          • Instruction Fuzzy Hash: DD41F851B1E68245FF549E219A243B969B15F65BC2FC48130FE8EE77C5EE6EE4018300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: callocfreememset
                          • String ID: CONNECT phase completed!$allocate connect buffer!
                          • API String ID: 3505321882-591125384
                          • Opcode ID: d9185432e4f8109c9eb5e8da7bfb322b6a696c3593a9c1bf62ff5a5b3cd25373
                          • Instruction ID: 9de23244e2defa7264109894511ba32e2e49762b985ee82b11e5006a020adc2d
                          • Opcode Fuzzy Hash: d9185432e4f8109c9eb5e8da7bfb322b6a696c3593a9c1bf62ff5a5b3cd25373
                          • Instruction Fuzzy Hash: 8051C532B0868282E7158F61D9653B933B0FF54B89F844035EBAD97291DF7BE565C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                          • API String ID: 1294909896-619256714
                          • Opcode ID: 3f860ba45f9f8bdb9570643578fc2f6e0b1b8f6c69e6285e99155f7ed90d60f2
                          • Instruction ID: 469f86d5c0c24823b795a7304e51f2dc1b240cf39801ad80140a7159fc4609de
                          • Opcode Fuzzy Hash: 3f860ba45f9f8bdb9570643578fc2f6e0b1b8f6c69e6285e99155f7ed90d60f2
                          • Instruction Fuzzy Hash: FF51E165A0C6D246EBA08F1095245B877B9FB21782FC44032FACDB6796EF3EE565C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: %s: %s
                          • API String ID: 3401966785-1451338302
                          • Opcode ID: 16ad3a361ab2fa0823f2abc1b06d59ff9ca4407b19865cf765ec968bd9bfee83
                          • Instruction ID: 734b08724a3b01b2fec9b9633c964a03b897b31c58ffe880427a3a0d291a0a58
                          • Opcode Fuzzy Hash: 16ad3a361ab2fa0823f2abc1b06d59ff9ca4407b19865cf765ec968bd9bfee83
                          • Instruction Fuzzy Hash: 24418B12B0D2D146FA288E1690353B967A1EBA5BE1F84423BEEEF977C5DD2ED0558300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errnofreememcpy
                          • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                          • API String ID: 738009125-4268564757
                          • Opcode ID: c8dd9929abec7564cfc5343009131fcf02fe15ac9e744444b394123a8106f478
                          • Instruction ID: e5d611b627da3e418b5d4a40fd6a94c7b70c86f0a8ab48b493f6ab29a3463b43
                          • Opcode Fuzzy Hash: c8dd9929abec7564cfc5343009131fcf02fe15ac9e744444b394123a8106f478
                          • Instruction Fuzzy Hash: 3351CFA2A0C7C282EB148F75D1202B9B770FB65B95F844032EADDA3A95DF7EE0159301
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                          • API String ID: 1294909896-2752585153
                          • Opcode ID: 852b57d354f196916215357cb39c7ca5b312e80e98ffe554f2fcfc727ca474eb
                          • Instruction ID: 2a26d7bdba216d62e62c60164f6038e61561c8595e26305ccc26d362098debb8
                          • Opcode Fuzzy Hash: 852b57d354f196916215357cb39c7ca5b312e80e98ffe554f2fcfc727ca474eb
                          • Instruction Fuzzy Hash: 6C31A465A0D78295EB508F2094201B97776FB61B86FC84032F6CDB729AEF3EE555C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$Signature
                          • API String ID: 2190258309-1663925961
                          • Opcode ID: faee1b79d6e3ca57526c2964aab68c2ad45f1906e0f92ce6fbdfd11d9252326f
                          • Instruction ID: 338176673f06af9381c8511a21c7c6e17dc36cd677e14a08013b92b175fcf656
                          • Opcode Fuzzy Hash: faee1b79d6e3ca57526c2964aab68c2ad45f1906e0f92ce6fbdfd11d9252326f
                          • Instruction Fuzzy Hash: 7021A276B08AC286EA508F66A4542E973B4FB59BE5F880132EE9D93799DF3DD101C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Failure sending QUIT command: %s$QUIT
                          • API String ID: 1294909896-1162443993
                          • Opcode ID: af9c865519c706b1315f169865b9437b682a8768c619aeab1090bd7f57be2620
                          • Instruction ID: c6c3e722dc03e2523eaf07f0b8e428db3e264fbd768695bbba06ce6c59757093
                          • Opcode Fuzzy Hash: af9c865519c706b1315f169865b9437b682a8768c619aeab1090bd7f57be2620
                          • Instruction Fuzzy Hash: 89318D32B0C78281EB50CF2594612B933B1FB55B85F885036EACDA7799CF2ED051C310
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc$memcpy
                          • String ID:
                          • API String ID: 3478730034-0
                          • Opcode ID: c07fd4491912f1698f5e793d067f9ae57d05e03d60bd6e7bef04766d32f6f9cc
                          • Instruction ID: b1ac86b0e33976c322f01d465fbf4d2fab32e2a8c74282307b8c1b1bf9824f01
                          • Opcode Fuzzy Hash: c07fd4491912f1698f5e793d067f9ae57d05e03d60bd6e7bef04766d32f6f9cc
                          • Instruction Fuzzy Hash: C621E771E0878186EB20CF25982422976B4FB69BE1F845135EADEE7785DF3EE0508700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpy
                          • String ID: Start Date: %s$Start Date
                          • API String ID: 3056473165-2389359183
                          • Opcode ID: 1d0d3f75b15472ae08d81cdac9c55d6f53ac22eecaa99c6c728bfa1e1c9dd27f
                          • Instruction ID: e0ec91b4e0baaec79713290ea06da6ef6e7a7d3170d8b62f85104c90d80eabb8
                          • Opcode Fuzzy Hash: 1d0d3f75b15472ae08d81cdac9c55d6f53ac22eecaa99c6c728bfa1e1c9dd27f
                          • Instruction Fuzzy Hash: 92210665A083C201EE558F1185202B42376AF65BE6FC84532F99EB77D6EF3EA064C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupmalloc
                          • String ID:
                          • API String ID: 4236146995-0
                          • Opcode ID: 2590a711bc944bfc2dd0934ddfdb5976fa8bad20689cb497d6851a7f161e1f41
                          • Instruction ID: 74647dd74543f5bffc8fcb35c0b70472ff3a397e42ebea6a352ad1d4b0bdafe9
                          • Opcode Fuzzy Hash: 2590a711bc944bfc2dd0934ddfdb5976fa8bad20689cb497d6851a7f161e1f41
                          • Instruction Fuzzy Hash: A8215162B15B8581EB85CF21946036863E1EB99B55F481134EE8D9B748EF2AD490C720
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                          • String ID:
                          • API String ID: 469868127-0
                          • Opcode ID: c8a3fdc87ca7b702a94c4ef1d8f77eda044698d4a09b94f79638f0649c793e3d
                          • Instruction ID: 1ee24069c827bdc674ac4d923a8779e3f0f9891a5678b78242c8ad63955200c1
                          • Opcode Fuzzy Hash: c8a3fdc87ca7b702a94c4ef1d8f77eda044698d4a09b94f79638f0649c793e3d
                          • Instruction Fuzzy Hash: 99116076708B8186EA10DF12E5642297370FB98B91F544035EFCE93B44CF3EE4608700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncpy
                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                          • API String ID: 3301158039-3625861382
                          • Opcode ID: 8540f1e6c2d8a3e43d3dc8f9ea4c236c2c3fd651578fb46491692c97b48acb01
                          • Instruction ID: 387ddfff4d73efd061bde8e88aa4b2d7df21ff9f31aaa1e15712483cf083fe4b
                          • Opcode Fuzzy Hash: 8540f1e6c2d8a3e43d3dc8f9ea4c236c2c3fd651578fb46491692c97b48acb01
                          • Instruction Fuzzy Hash: 67117B61E0D58285FA5CCF15E97417826F0DF25786FC85131F58D66ED5DDBEE5808200
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$free
                          • String ID: %s%lx
                          • API String ID: 573759493-530121141
                          • Opcode ID: c456549fc9a9f1cca1fd9815eb7ac769fd56de37756c8d40557723f8e93c7337
                          • Instruction ID: efc36d0beacf5214619db1f00abe46a13eff9e8a48b56f438ab8f2c72ea11dd1
                          • Opcode Fuzzy Hash: c456549fc9a9f1cca1fd9815eb7ac769fd56de37756c8d40557723f8e93c7337
                          • Instruction Fuzzy Hash: 9C31F112E0E5D649FB128F24902433C2FB19B75B86FC44573E6CAE6681CE2FE421C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$free
                          • String ID: TRUE
                          • API String ID: 573759493-3412697401
                          • Opcode ID: e03a8531f0eebcabd4f090b1063a18774fc994da83e7471a6afe75b58af0ada3
                          • Instruction ID: b94147469aa2a84cefbd6be151a280b20caa55d245417f16b3454084ee19716d
                          • Opcode Fuzzy Hash: e03a8531f0eebcabd4f090b1063a18774fc994da83e7471a6afe75b58af0ada3
                          • Instruction Fuzzy Hash: 65310722E0D69245FB11CF25952437C7FB1AB25B96F884232EAD9E36C5CE3ED141C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: acceptgetsocknameioctlsocket
                          • String ID: Connection accepted from server$Error accept()ing server connect
                          • API String ID: 36920154-2331703088
                          • Opcode ID: 91ff10935a309e61a2b265033101f797bcf3467bd80cc9426fbbb275bd97ac8b
                          • Instruction ID: e751f14220a9db4976e18c9867aa9a2a67eceb2a630dcb4b4bc5b9e33e65544e
                          • Opcode Fuzzy Hash: 91ff10935a309e61a2b265033101f797bcf3467bd80cc9426fbbb275bd97ac8b
                          • Instruction Fuzzy Hash: 1C31A261A0D68182EB54DF21A4653AA73B0FB58BA5F840235EFED977C9CF7EE0058700
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE527519), ref: 00007FF6CE527B6D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: realloc
                          • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                          • API String ID: 471065373-1365219457
                          • Opcode ID: 2db9be89a545f89ee1c2905f2a2b40a643e136ebd8c9e5b01aeb6361d34a0176
                          • Instruction ID: b188675d626d8c58fef66e25bc31276cfbc7b90c03617059b6c91f5c7ff85b71
                          • Opcode Fuzzy Hash: 2db9be89a545f89ee1c2905f2a2b40a643e136ebd8c9e5b01aeb6361d34a0176
                          • Instruction Fuzzy Hash: 38214B32B08A8486DB04DF29E4902AD77B1FB59BC4F984036EB8D53B59DF39D4A2C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: :
                          • API String ID: 2653869212-336475711
                          • Opcode ID: 4f6e2ecb12e9d558fc2d2c7ef4666f3ac030c096481866a8b57b6e31448d3835
                          • Instruction ID: 9f87c837a765e40a3d697469968700a87f4eb1913c062536725ae49f6b00b05c
                          • Opcode Fuzzy Hash: 4f6e2ecb12e9d558fc2d2c7ef4666f3ac030c096481866a8b57b6e31448d3835
                          • Instruction Fuzzy Hash: 0921AC22A08B8289EF659F04A5503B977B0FB54BA5F884531EBDCD3384EF3EE4108710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: :
                          • API String ID: 2653869212-336475711
                          • Opcode ID: 151baf0ff303c6cb7b0971c13338ab6f1debb972bd9090e7dc2929162079fe60
                          • Instruction ID: 50184bfcb281779d49e509343fca1172d9aeb70574b1b1b9f6ff1efad0104fbc
                          • Opcode Fuzzy Hash: 151baf0ff303c6cb7b0971c13338ab6f1debb972bd9090e7dc2929162079fe60
                          • Instruction Fuzzy Hash: A8119A32A09BC189EF619F04A5103B977B0AB64BA5F984132EBDC93394EF3EE4108710
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s%s$LIST "%s" *
                          • API String ID: 0-1744359683
                          • Opcode ID: 558dbf9052364e554f08f6932d4ceb71aef4511f66943321a45585c9e54afdb3
                          • Instruction ID: 1a239c6e73ec28d3319044f50f923cccc98c6a1595a9833905c4eb2d6e72b14c
                          • Opcode Fuzzy Hash: 558dbf9052364e554f08f6932d4ceb71aef4511f66943321a45585c9e54afdb3
                          • Instruction Fuzzy Hash: 91119D62F0D68281EA14CF66E5601B86370FB68BC5F841431FE8DA7711DF2EE5418340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastsend
                          • String ID: SENT$Sending data failed (%d)
                          • API String ID: 1802528911-3459338696
                          • Opcode ID: 8adbcbfae2e6e738960fed94a1e2467c945c95f03590d609fa70bb77f2276d34
                          • Instruction ID: 5eababb2f8e3cf7d290a45cbf20e7beba48ea7921e601a74dc9e755bcf8f8d83
                          • Opcode Fuzzy Hash: 8adbcbfae2e6e738960fed94a1e2467c945c95f03590d609fa70bb77f2276d34
                          • Instruction Fuzzy Hash: 1901B172709A9281EB108F2AE85045D7B30FBA4FC4F895132EB9D93751DF7AE505C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: Start Date: %s$Start Date
                          • API String ID: 3985033223-2389359183
                          • Opcode ID: 7d631355a8de000f4a4a44a516cbb3cbbfe75d1b6faa668608f3d6971fc78ce4
                          • Instruction ID: f67a2298630e27509ea2ea215d523d9dd54744e107f6e56351b844e69466fc68
                          • Opcode Fuzzy Hash: 7d631355a8de000f4a4a44a516cbb3cbbfe75d1b6faa668608f3d6971fc78ce4
                          • Instruction Fuzzy Hash: CE01B5A5E0C28255EE508F1054301B53776AF65787FC81432F98AF6256EF2FA154C311
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __current_exception__current_exception_contextterminate
                          • String ID: csm
                          • API String ID: 2542180945-1018135373
                          • Opcode ID: b3e3c4fef44ee460f99591e46fdde72e012a966e5fafd429e245b8e10932cae7
                          • Instruction ID: e8ca5d76485097dcbb96df89c864985253a108f09c179075323c37aa36d17e13
                          • Opcode Fuzzy Hash: b3e3c4fef44ee460f99591e46fdde72e012a966e5fafd429e245b8e10932cae7
                          • Instruction Fuzzy Hash: 3AF0E237606A84CAC7159F25EC901AC3774FB99B8AB895120FA8D97759CF39D8909300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$mallocmemcpy
                          • String ID:
                          • API String ID: 320687583-0
                          • Opcode ID: b9e640fe0b783790492eba35bc4a1a08a5dd4f809ab9890f0efffccfe0a37522
                          • Instruction ID: fda4fa6f260eaf3bb9802f94aea5bfb41de5674f7dc6639f5b6c89991e2f2bb8
                          • Opcode Fuzzy Hash: b9e640fe0b783790492eba35bc4a1a08a5dd4f809ab9890f0efffccfe0a37522
                          • Instruction Fuzzy Hash: AB21E211A0D69201EE558F1561A12B9A6E19F75BC6F8C4031FECDAB78AEF1EE4068211
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE525365), ref: 00007FF6CE524F88
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE525365), ref: 00007FF6CE524F91
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE525365), ref: 00007FF6CE52500A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE525365), ref: 00007FF6CE52501B
                          • memcpy.VCRUNTIME140(?,?,00000000,00007FF6CE525365), ref: 00007FF6CE525044
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID:
                          • API String ID: 3401966785-0
                          • Opcode ID: 3d643f7d79438e15a4e092c8fd1b8aa47cacbd5a7c2056c6ba5b58b76ebd2040
                          • Instruction ID: 6012200748ac43884e3249e89432d1cea6d51afbe683d3d04b3bb2d347dbbd74
                          • Opcode Fuzzy Hash: 3d643f7d79438e15a4e092c8fd1b8aa47cacbd5a7c2056c6ba5b58b76ebd2040
                          • Instruction Fuzzy Hash: 69319262A08B8581EB10CF11E46436963B4FB64BE6F845631FEAEA77C9DF3ED4408300
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547C66
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547C87
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CA2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CB0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5446D5), ref: 00007FF6CE547CC2
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: fab48c6ee78ae813bb08c2fcd08ab2c58dd65b3348b0b2be73b43a7dff085a05
                          • Instruction ID: 0310242d10d2f3a2bfa032108f6e29288dd64426e0024d3e3172e829d5dd59cd
                          • Opcode Fuzzy Hash: fab48c6ee78ae813bb08c2fcd08ab2c58dd65b3348b0b2be73b43a7dff085a05
                          • Instruction Fuzzy Hash: 12110636A18B4182DB14DF65E8A113C73B8FF94F897400422DE9E87728CF3AC861C350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                          • API String ID: 1294909896-910067264
                          • Opcode ID: 6c03359ff7c482aaf561cea08a4c6d5eca18cb8ab8d562cd1ac589cbbc4e79e1
                          • Instruction ID: fc129e85017b2bc30ba8a68e92920d697c4bb228dc075ec97b4f9f00cb9b13b1
                          • Opcode Fuzzy Hash: 6c03359ff7c482aaf561cea08a4c6d5eca18cb8ab8d562cd1ac589cbbc4e79e1
                          • Instruction Fuzzy Hash: 8751F162E0D69644EB158F25A5242B96BB9EB61786FC44033EACDE3794CF3EE461C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                          • API String ID: 1294909896-2632828617
                          • Opcode ID: c09ced58e012e3153cf9a83734317ed98a5bcae78de91fc8851e3d726c7046cd
                          • Instruction ID: 219d18a947b7978ba1ab94be020659e487896038bcc36e37cf4c803a08491c5b
                          • Opcode Fuzzy Hash: c09ced58e012e3153cf9a83734317ed98a5bcae78de91fc8851e3d726c7046cd
                          • Instruction Fuzzy Hash: 8B41D462A0C69195FB208F11A4242B9A7B4FBA5B92FC44032EACDE3754CF3EE056C704
                          APIs
                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6CE4FE968), ref: 00007FF6CE4FED7E
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6CE4FE968), ref: 00007FF6CE4FEDAC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6CE4FE968), ref: 00007FF6CE4FEE15
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE4FEE22
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                          • String ID:
                          • API String ID: 2942768764-0
                          • Opcode ID: 838c4c2ec42f133e2bb95afb0797bb95adbb917204e895c0b0f8881c1c4df6bb
                          • Instruction ID: f0c9977937e36911b312d268bab22c443622eb56c81ac17c961ec2ed45370e6d
                          • Opcode Fuzzy Hash: 838c4c2ec42f133e2bb95afb0797bb95adbb917204e895c0b0f8881c1c4df6bb
                          • Instruction Fuzzy Hash: 0141AD62B05A8785EA14CF25E4142BD6371FB54FA2F548631EBADA3BD9DF2DE0918300
                          APIs
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE5006FF
                            • Part of subcall function 00007FF6CE552CC8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6CE4F5A5E,7FFFFFFFFFFFFFFF,black,-3333333333333333,00007FF6CE4F2319), ref: 00007FF6CE552CE2
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE5006EC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CE50076D
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CE50077A
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: 01397470fab2f5b5c1620c07fbcdcd52e900671c3b036614bd55800486229bae
                          • Instruction ID: 23ce1c6d54b0a360258d05405c005d56afc4e5d860684eb06d8ab81444f21d88
                          • Opcode Fuzzy Hash: 01397470fab2f5b5c1620c07fbcdcd52e900671c3b036614bd55800486229bae
                          • Instruction Fuzzy Hash: 8A41FF62B15B8681EA14CF26D5242BC6371AB54BE5F848A31FBADA37D4CF3DE091C300
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF6CE531BD0,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF6CE54E673
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE54E6FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s
                          • API String ID: 1294909896-3043279178
                          • Opcode ID: f65f70b5a708ea2614c8ad4bd169177c2fa0b1ebbdf00ecd579a5d03a48dd2c3
                          • Instruction ID: 74e1d53c4d49d57e02584d64df3848de50c21a80d44bd4b19c0a701c54e415ad
                          • Opcode Fuzzy Hash: f65f70b5a708ea2614c8ad4bd169177c2fa0b1ebbdf00ecd579a5d03a48dd2c3
                          • Instruction Fuzzy Hash: F0418436A18B8582EA51CF26F5501AAB3B4FB54BA0F444135EFCE97BA1DF3DE5918300
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE539BB4
                            • Part of subcall function 00007FF6CE5194A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6CE5195C5
                            • Part of subcall function 00007FF6CE5194A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6CE5195E0
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fwrite$free
                          • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                          • API String ID: 3468156532-1133524294
                          • Opcode ID: a99002aadaf1bed436114ad876307ae12d5d69b86db3fb1ee0dfd25425540cd0
                          • Instruction ID: 75fccc38c12c499b8fdd0a911928f4306fe22023cea12bf68b3cbbce43a2b77a
                          • Opcode Fuzzy Hash: a99002aadaf1bed436114ad876307ae12d5d69b86db3fb1ee0dfd25425540cd0
                          • Instruction Fuzzy Hash: 0C4161B6A08A86C1E710DF15D4641AD33B4FBA4B86F855032EF8EAB399DF3AD441C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 326894585-0
                          • Opcode ID: 0095a3458d38002ce56d5708b486baacbc93d7d29360f347db19f7d0a4495090
                          • Instruction ID: 9b729e10a926867bffb3a47421b56d3b383cdea6dd099636a64937b671b113a2
                          • Opcode Fuzzy Hash: 0095a3458d38002ce56d5708b486baacbc93d7d29360f347db19f7d0a4495090
                          • Instruction Fuzzy Hash: 2821F966B0A79645EA159F11A51037823749F15BE6FD40730FEED67BC3DE3DA4928300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                          • API String ID: 1294909896-1153420294
                          • Opcode ID: 4d1103fa62e6c2507ab0981a3cbfe9fc3372bb78163b423d7f281af3811cf701
                          • Instruction ID: 27ce78ea6cc365aafccd82a60016fc77badf6519950eb58409bee945ae5b69c1
                          • Opcode Fuzzy Hash: 4d1103fa62e6c2507ab0981a3cbfe9fc3372bb78163b423d7f281af3811cf701
                          • Instruction Fuzzy Hash: 4231D262A0CB8285FB608F51E4606A973B0FB95B82FD50036EACDA3345CF7ED655C700
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE513C42
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE513C7D
                            • Part of subcall function 00007FF6CE508FD0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE508FE5
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE513CB2
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509107
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509113
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memcpy
                          • String ID: %s:
                          • API String ID: 901724546-64597662
                          • Opcode ID: ca1c70b4015a75c0b4e7884eab1b54ec5112fcac75a59ffa4d7c5d7682220fe3
                          • Instruction ID: 0445121823c81bf52e57d5cb9b67b283d6128dad0c48403b06fe4675e9a4317d
                          • Opcode Fuzzy Hash: ca1c70b4015a75c0b4e7884eab1b54ec5112fcac75a59ffa4d7c5d7682220fe3
                          • Instruction Fuzzy Hash: 4021F332A08A8591DB00CF12E8605AA73B4FBA4BE8F890132FE9D97395DF3DD041C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: isupper$_strdupfree
                          • String ID:
                          • API String ID: 3359907120-0
                          • Opcode ID: 5f781520354aeffd126b610b3688fe8a2ae4306f663f6150b12bcc7ab7587f48
                          • Instruction ID: 44c5d841b8bc09040a554ea00c0c000f6f102220a4dc1cb29b66b1e505e7b9c2
                          • Opcode Fuzzy Hash: 5f781520354aeffd126b610b3688fe8a2ae4306f663f6150b12bcc7ab7587f48
                          • Instruction Fuzzy Hash: 5A21ED22E0E6D245FB12CF25913433C2FB59B35B82FC84572E6CAE6A85CE3EA555C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpy
                          • String ID: %s: %s
                          • API String ID: 3056473165-1451338302
                          • Opcode ID: 5282486b33acaf5a5de9a9b1fe1c669959b6da56d055b9849cb2ad875a21e0de
                          • Instruction ID: e609caddc9cafafe4320fb7887344a375f2e8b766809fd6cf328d7b97c1099d7
                          • Opcode Fuzzy Hash: 5282486b33acaf5a5de9a9b1fe1c669959b6da56d055b9849cb2ad875a21e0de
                          • Instruction Fuzzy Hash: EA21CF52A0D78181FA658F02A5203B563A1BFE5FE1F844132EE9DA3795DE3EE0458300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$%s%lx$Start Date
                          • API String ID: 1294909896-3519493645
                          • Opcode ID: d638a4dd88b22513da0ef6d04f7a930c9b3dfc3b806c07ea69d016164678dc59
                          • Instruction ID: cc67e1c98667e0b979d3c7ee2f75691e30a745b3a33f2f740abc59e7c119b64a
                          • Opcode Fuzzy Hash: d638a4dd88b22513da0ef6d04f7a930c9b3dfc3b806c07ea69d016164678dc59
                          • Instruction Fuzzy Hash: 8B21FB55B0C28255EE608F2194202B93772AF65786FC44432FA8EF7786EF2FE154C300
                          APIs
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6CE51C958), ref: 00007FF6CE51CAA5
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6CE51C958), ref: 00007FF6CE51CABF
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: I32$I64
                          • API String ID: 1114863663-3980630743
                          • Opcode ID: e9367e4a8b2aad143c4ff54a677c4be23e1815099f00ec1c911c65e6b2dfae5e
                          • Instruction ID: 538670d462d080644905e71324f9c4fac8579373b1f7f09524eb35b5474afee9
                          • Opcode Fuzzy Hash: e9367e4a8b2aad143c4ff54a677c4be23e1815099f00ec1c911c65e6b2dfae5e
                          • Instruction Fuzzy Hash: 4721072290D5A245E7258F20D46027C7BB0AB26B8AF894131EFD9F2291DE2FE900C740
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE547849,00000000,?,?,00007FF6CE546E06), ref: 00007FF6CE546B09
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE547849,00000000,?,?,00007FF6CE546E06), ref: 00007FF6CE546B40
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE547849,00000000,?,?,00007FF6CE546E06), ref: 00007FF6CE546B52
                          • memcpy.VCRUNTIME140(?,?,?,00007FF6CE547849,00000000,?,?,00007FF6CE546E06), ref: 00007FF6CE546B7A
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpyrealloc
                          • String ID:
                          • API String ID: 3881842442-0
                          • Opcode ID: ed6c144b413d3c6f4c0763378b468c8b8c31378ad837f061f963e906113e2265
                          • Instruction ID: 6d09cbfea5efac709c37e449ef6d303d1eeff41a168acc6d87359f8da0053339
                          • Opcode Fuzzy Hash: ed6c144b413d3c6f4c0763378b468c8b8c31378ad837f061f963e906113e2265
                          • Instruction Fuzzy Hash: 3C218136A09B8182DB44CF15E46122973B0FB58FD5B488032EE9E97758DF3DC4A1C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strstr$calloc
                          • String ID: ;type=
                          • API String ID: 3224321581-3507045495
                          • Opcode ID: b18aa4fea0ffc3179bf2359159edbd89a47492eff8ce2a191aa9623d5d0a70ad
                          • Instruction ID: 071c6bb37e48429ac1f98ea80c9a921b52f397da44af24eec12b83661d10465c
                          • Opcode Fuzzy Hash: b18aa4fea0ffc3179bf2359159edbd89a47492eff8ce2a191aa9623d5d0a70ad
                          • Instruction Fuzzy Hash: 2B21C172A0868282EB158F25E4503B837B0FB54794F885131EBDD977CADF7EE5918700
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F918
                          • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F93E
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F95F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CE513E69,?,?,?,?,00007FF6CE51320B), ref: 00007FF6CE52F970
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: realloc$EnvironmentVariablefree
                          • String ID:
                          • API String ID: 2828309815-0
                          • Opcode ID: bb998d4ee8d8beaa37946d6ae0f8058e106fc9dab76d3547b6b7095a6caecdc5
                          • Instruction ID: 6796d107d264d3470afe0c7f2feb6004589b54f5f30595d57ed591e728697f43
                          • Opcode Fuzzy Hash: bb998d4ee8d8beaa37946d6ae0f8058e106fc9dab76d3547b6b7095a6caecdc5
                          • Instruction Fuzzy Hash: 0A11A721B0D74242EA608F12759523DA1A6BB68FC1F941035EDCEA3B54DE3FD4408750
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: 3ad4f33c8953e40300b547fcedd5c211c4b728828823019494c3ceedb6fc93da
                          • Instruction ID: f979221fde00a110664f9fe4d965d174c186e9b2885eddbbd1221f23efc4ab1f
                          • Opcode Fuzzy Hash: 3ad4f33c8953e40300b547fcedd5c211c4b728828823019494c3ceedb6fc93da
                          • Instruction Fuzzy Hash: 74116D31B0AB4186E7208F62B864129B7B4FB98F81B884039EF8E93B54DF7DE5158740
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree$strchr
                          • String ID:
                          • API String ID: 1739957132-0
                          • Opcode ID: c068768543c458f8091fffccb7625242576b2679e4b52a59b4085f63186abab1
                          • Instruction ID: 300ab987897cb3634f16bb7afbe02a1cc8e1dd9afcc6e006585c92e04e57be16
                          • Opcode Fuzzy Hash: c068768543c458f8091fffccb7625242576b2679e4b52a59b4085f63186abab1
                          • Instruction Fuzzy Hash: 14019E61F1E78142EF698F5661B013962A0AF58FC1F881435FE8FD3B48DE2EE8818211
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalDeleteSectionclosesocket
                          • String ID:
                          • API String ID: 3086658127-0
                          • Opcode ID: 858ab1373b792e2845a933a24cdfc5cf25622238e82b98124378384e350de81d
                          • Instruction ID: dedfb3d8d843a3b3ce171191f843c72da8bc76903a61d046800fa23d8efdbc3f
                          • Opcode Fuzzy Hash: 858ab1373b792e2845a933a24cdfc5cf25622238e82b98124378384e350de81d
                          • Instruction Fuzzy Hash: 08012D12E29A8182EB14CF71C8302782330FBF9B2DB556326FDAE911A5DF69A5D08200
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: I32$I64
                          • API String ID: 1114863663-3980630743
                          • Opcode ID: ad58df444f32354ceeeeaa037dadf27863a4da7689c97725897f6f1c5821c839
                          • Instruction ID: be8aaff892afd40777c8b08b2de0a1d38fc7c610990707f8037b1698af968a24
                          • Opcode Fuzzy Hash: ad58df444f32354ceeeeaa037dadf27863a4da7689c97725897f6f1c5821c839
                          • Instruction Fuzzy Hash: ECF0E221B1E58340EA158F2598B07393674AF29B86FC84036ED9EE22D1DE2FE2008311
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: I32$I64
                          • API String ID: 1114863663-3980630743
                          • Opcode ID: 2e94dd6edd3b13bddb1533ac41e18fb51fa0427d82f68d9783b6f1870346e836
                          • Instruction ID: 3c17d6725b59e7613179af86c5afb4bcf92dd7eb8f21cc0696ba08bff0cf5fd7
                          • Opcode Fuzzy Hash: 2e94dd6edd3b13bddb1533ac41e18fb51fa0427d82f68d9783b6f1870346e836
                          • Instruction Fuzzy Hash: 83F0E211B1A58380EA158F2598B07393674AF29B86FC84036ED9EE22D1DE2EE200C311
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6CE519F26), ref: 00007FF6CE544B84
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: %lx
                          • API String ID: 2918714741-1448181948
                          • Opcode ID: 3e1a03b3b34d7b5974f3a57e0b401176620edb60ba092262caea1c8e1528da42
                          • Instruction ID: 8db9f5897fdd810fe5395d4cb16aa2856a6fc74bcb4a0251716116715f5da934
                          • Opcode Fuzzy Hash: 3e1a03b3b34d7b5974f3a57e0b401176620edb60ba092262caea1c8e1528da42
                          • Instruction Fuzzy Hash: B9815822A1C1D145EB688E25A46023D7BF0FBA5752F94423BFADAE23C4DE3DD861C701
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6CE530273), ref: 00007FF6CE530962
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6CE530273), ref: 00007FF6CE5309B3
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupmalloc
                          • String ID: (){ %*]
                          • API String ID: 3515966317-731572209
                          • Opcode ID: 5b75cad57522702296643e1deeafcc848028ed951f14d07a45b51d39aa2190da
                          • Instruction ID: 0a973fd8ef456588d68143c820f70906b39ed750ae11fea14165c3dab9910fb0
                          • Opcode Fuzzy Hash: 5b75cad57522702296643e1deeafcc848028ed951f14d07a45b51d39aa2190da
                          • Instruction Fuzzy Hash: FB31181390DB8944FE614E1550703792BE29F76BA6FD84171FACE933C2CE2FA805C250
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: %ld
                          • API String ID: 1865132094-1112595699
                          • Opcode ID: 169c30279ba04736c4a6d2b2628939a9c40d880209fb22954fa79eb0c58b9e8d
                          • Instruction ID: 4baff93df7065262d6a00bfc6b1d33aa7aaac1290c8e6f27289cbfd1eccd59b0
                          • Opcode Fuzzy Hash: 169c30279ba04736c4a6d2b2628939a9c40d880209fb22954fa79eb0c58b9e8d
                          • Instruction Fuzzy Hash: B831B226A0DB9241FA65CF60A07537A22B0AF64746F851032EECEA3685EF3EE451C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupmalloc
                          • String ID: identity
                          • API String ID: 3515966317-1788209604
                          • Opcode ID: a976cd69ae314889b4e1ade3d16d4037d9f26e8745e8dddc183975ec2199c634
                          • Instruction ID: e7568544efbbaf33a7c213a847c812cfcd3b4752acfac308037d670f09d93a3b
                          • Opcode Fuzzy Hash: a976cd69ae314889b4e1ade3d16d4037d9f26e8745e8dddc183975ec2199c634
                          • Instruction Fuzzy Hash: 5931A525F09A4681EF118F55D56037567B0EF64BE5F884631EEAD937C5EF2EE4428300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: getsockoptsetsockopt
                          • String ID: @
                          • API String ID: 194641219-2726393805
                          • Opcode ID: 0490720c5d60d7d5d69c3fce779b4dce03c322a35e3d52f9ff449d60e597bd45
                          • Instruction ID: 7d7ad6ae5da378bd98afc1d68943a925e13f8045c5925655894337f641b74690
                          • Opcode Fuzzy Hash: 0490720c5d60d7d5d69c3fce779b4dce03c322a35e3d52f9ff449d60e597bd45
                          • Instruction Fuzzy Hash: 77118F76A1828287E721CF50E451266B7B0EB94346F940035EA8997BA5DFBFE589CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: %I64d-
                          • API String ID: 1865132094-19666937
                          • Opcode ID: c4aefdc20ad5891078045dde08d4f6db41c50a31de546ca05e411f720a530e08
                          • Instruction ID: cf5a334aae60b7cbc5eaaa834b48e3b69ff297aad85f132c793a0a51bea04531
                          • Opcode Fuzzy Hash: c4aefdc20ad5891078045dde08d4f6db41c50a31de546ca05e411f720a530e08
                          • Instruction Fuzzy Hash: 3D11C672A0A682C0FF258FA494153F413B1EB64B46F584035E98C8E251DF2E94968320
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50C19A
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE50C2CC
                          • memcpy.VCRUNTIME140 ref: 00007FF6CE50C2E8
                            • Part of subcall function 00007FF6CE521780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE50A0A3,?,?,00000000,00007FF6CE514972,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE5217BC
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freememcpy
                          • String ID:
                          • API String ID: 3223336191-0
                          • Opcode ID: e926ef9e2a2cb08b65a6ac8835a4e956b17052ef3d2f2e48d9672f51b120bea6
                          • Instruction ID: 49b34f8a2721718025316b9bc87384bd54e355f2d79b7b137f94aa06d93c9934
                          • Opcode Fuzzy Hash: e926ef9e2a2cb08b65a6ac8835a4e956b17052ef3d2f2e48d9672f51b120bea6
                          • Instruction Fuzzy Hash: F2C16E32B04B4286EB148F65D4203AD33B1BB55BADF844235EEADA77D8DE3AD446C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: %s: %s
                          • API String ID: 3985033223-1451338302
                          • Opcode ID: 8c74de58afd796775dd428b84ef2d128d12317424573d3852d9c3ba770e141a0
                          • Instruction ID: 7a2d00f5a94c4f3f5dc7748d766eb3a496870880e8448413f9b89c269c2c8f9d
                          • Opcode Fuzzy Hash: 8c74de58afd796775dd428b84ef2d128d12317424573d3852d9c3ba770e141a0
                          • Instruction Fuzzy Hash: A3F0A451E0C78142FA619F52A8207A553707FA5B91FC81432EECEA3351DF3ED1558314
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CE543D58), ref: 00007FF6CE550C51
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6CE543D58), ref: 00007FF6CE550C64
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CE543D58), ref: 00007FF6CE550C8B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6CE543D58), ref: 00007FF6CE550C98
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: e421f637e0d4eeda450dfe8c16121f34d38647587d55194bbc6bfe2c7a670518
                          • Instruction ID: 5627cfd3e64df0ca1c6ece1e1a62fa41b686b7c0e9ff7b06c6b75eeb455b651d
                          • Opcode Fuzzy Hash: e421f637e0d4eeda450dfe8c16121f34d38647587d55194bbc6bfe2c7a670518
                          • Instruction Fuzzy Hash: 7A115131B0974282EB209F6AF41002AB6B0BF99B95B984535EB9D97B58DE3DD5408B40
                          APIs
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509107
                            • Part of subcall function 00007FF6CE5090E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE5136E0,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6CE505511), ref: 00007FF6CE509113
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50F5E6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50F5F6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6CE50F604
                          • memset.VCRUNTIME140 ref: 00007FF6CE50F63F
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memset
                          • String ID:
                          • API String ID: 2717317152-0
                          • Opcode ID: 6ee92241d928c6289353ba6ce05267bf135b4791ba7f700aaadd859f4dccfe85
                          • Instruction ID: 8297f2d537658d00d1f2a31d6001f35a3f887f2314394f022e48cd0617adb839
                          • Opcode Fuzzy Hash: 6ee92241d928c6289353ba6ce05267bf135b4791ba7f700aaadd859f4dccfe85
                          • Instruction Fuzzy Hash: 0621E932E18B91A3E614CF22E6A03A86374F7A9744F51A225EB9D93A51DF75F1F1C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 092e5d567ebd9fef8945121da4f1ea54bc14929b8c9566ac7e48ade6aa5f6580
                          • Instruction ID: a44f8104a4cf8c7f5b0a152dcb082a5be1ea5db9516c7efe72cc9b4e78a7904f
                          • Opcode Fuzzy Hash: 092e5d567ebd9fef8945121da4f1ea54bc14929b8c9566ac7e48ade6aa5f6580
                          • Instruction Fuzzy Hash: 2F115B36A19A4181EB14CF29E5A023C33B4FFA4F85F905032EA8E96764CE3ED8608350
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 5c5e4b6a6e7c506d49b5deac227a76042c120f8c326041f8769d9db9dc51a305
                          • Instruction ID: 01b555ef73c8c36f376f16036b57e4c06f69da4408b0a084687399d718265854
                          • Opcode Fuzzy Hash: 5c5e4b6a6e7c506d49b5deac227a76042c120f8c326041f8769d9db9dc51a305
                          • Instruction Fuzzy Hash: 6F111636A18A4086DB50CF65E59036873B4F794F95F585039EE8EA7328CF39E8A5C360
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE51BDB5,?,?,00000000,00007FF6CE514A71,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE545BA0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE51BDB5,?,?,00000000,00007FF6CE514A71,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE545BC6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE51BDB5,?,?,00000000,00007FF6CE514A71,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE545BD4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6CE51BDB5,?,?,00000000,00007FF6CE514A71,?,?,00000000,00007FF6CE514FA5), ref: 00007FF6CE545BE2
                          Memory Dump Source
                          • Source File: 00000004.00000002.2530075810.00007FF6CE4F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF6CE4F0000, based on PE: true
                          • Associated: 00000004.00000002.2529991174.00007FF6CE4F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530318590.00007FF6CE556000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530439137.00007FF6CE56F000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000004.00000002.2530506284.00007FF6CE570000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_7ff6ce4f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: d53b3aa07b0b662c989be39df313d4e48b7b724d0373c5710314684894adf95b
                          • Instruction ID: b3f9e8027afe41f0a76dbdceab2db4d6fb52052956627bdd02537dd16c7d35c5
                          • Opcode Fuzzy Hash: d53b3aa07b0b662c989be39df313d4e48b7b724d0373c5710314684894adf95b
                          • Instruction Fuzzy Hash: 67F03C72A18B0082DB14CF61F8A112873B8FFA8F897505432DE9E83728CF3AC464C350