Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
G9e272AEyo.exe

Overview

General Information

Sample name:G9e272AEyo.exe
renamed because original name is a hash value
Original sample name:f0f5b379dfbcd101a6abffae96082417.exe
Analysis ID:1538233
MD5:f0f5b379dfbcd101a6abffae96082417
SHA1:505849de091e311eb9ef7c413a18525b7338dc8e
SHA256:b779b04efc9be9517b8ae479e408f6054a0f7f8ef3d1af542d5c0c863566c165
Tags:64exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • G9e272AEyo.exe (PID: 6580 cmdline: "C:\Users\user\Desktop\G9e272AEyo.exe" MD5: F0F5B379DFBCD101A6ABFFAE96082417)
    • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6704 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6732 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6828 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6880 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7012 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7080 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7108 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4364 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4820 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6016 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 2180 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 928 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2736 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3732 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1368 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5432 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 908 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3584 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6988 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7128 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6636 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6752 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 6876 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7068 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7016 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2304 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3916 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2872 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1284 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 480 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4544 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6112 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5236 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 7124 cmdline: C:\Windows\system32\WerFault.exe -u -p 6580 -s 1004 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: G9e272AEyo.exeReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
Source: G9e272AEyo.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F9F3D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF6482F9F3D
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF648315AD0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF648315AD0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF64831CE40
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831EF30 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF64831EF30
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482FC1C0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF6482FC1C0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F9230 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF6482F9230
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482FC220 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6482FC220
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482FC210 CryptHashData,0_2_00007FF6482FC210
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F9300 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6482F9300
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483163F0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF6483163F0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF6482DF0E0
Source: G9e272AEyo.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF648308B00
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: G9e272AEyo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Aim\x64\Release\EpicGames.pdb source: G9e272AEyo.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F4A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6482F4A60
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: G9e272AEyo.exeString found in binary or memory: http://185.101.104.122/aimhvcibronkzops.exe
Source: G9e272AEyo.exeString found in binary or memory: http://185.101.104.122/aimhvcibronkzops.exeC:
Source: G9e272AEyo.exeString found in binary or memory: http://185.101.104.122/aimhvciforabronkz.exe
Source: G9e272AEyo.exeString found in binary or memory: http://185.101.104.122/aimhvciforabronkz.exeC:
Source: Amcache.hve.37.drString found in binary or memory: http://upx.sf.net
Source: G9e272AEyo.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: G9e272AEyo.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: G9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: G9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ace
Source: G9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ce
Source: G9e272AEyo.exe, 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: G9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/s
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF64831CE40
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E89800_2_00007FF6482E8980
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E69800_2_00007FF6482E6980
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E7CC00_2_00007FF6482E7CC0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F9F3D0_2_00007FF6482F9F3D
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482D15300_2_00007FF6482D1530
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482EF5900_2_00007FF6482EF590
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482D89900_2_00007FF6482D8990
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483049F00_2_00007FF6483049F0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF648315AD00_2_00007FF648315AD0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482CEB700_2_00007FF6482CEB70
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482CABFD0_2_00007FF6482CABFD
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F7CC00_2_00007FF6482F7CC0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482CDDE00_2_00007FF6482CDDE0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831CE400_2_00007FF64831CE40
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831EEC00_2_00007FF64831EEC0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482FA0050_2_00007FF6482FA005
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482C10000_2_00007FF6482C1000
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F9FFC0_2_00007FF6482F9FFC
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64830D2200_2_00007FF64830D220
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482CD2500_2_00007FF6482CD250
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E33300_2_00007FF6482E3330
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F53E00_2_00007FF6482F53E0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483095200_2_00007FF648309520
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483105800_2_00007FF648310580
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482C955D0_2_00007FF6482C955D
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483115B00_2_00007FF6483115B0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482FC5D00_2_00007FF6482FC5D0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E06000_2_00007FF6482E0600
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482C973B0_2_00007FF6482C973B
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E98400_2_00007FF6482E9840
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F28900_2_00007FF6482F2890
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482EA330 appears 33 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482E0240 appears 70 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482EA2A0 appears 37 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482D3030 appears 49 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482E8DB0 appears 46 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482EA410 appears 34 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482E5970 appears 378 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482E5AF0 appears 323 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF6482E8E80 appears 35 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: String function: 00007FF648320236 appears 47 times
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6580 -s 1004
Source: classification engineClassification label: mal56.winEXE@69/22@1/2
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482D1D10 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF6482D1D10
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6580
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6596:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\816a52bd-16b0-4ce8-b757-20866cdd867bJump to behavior
Source: G9e272AEyo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\G9e272AEyo.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: G9e272AEyo.exeReversingLabs: Detection: 31%
Source: G9e272AEyo.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\G9e272AEyo.exe "C:\Users\user\Desktop\G9e272AEyo.exe"
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6580 -s 1004
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: G9e272AEyo.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: G9e272AEyo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: G9e272AEyo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Aim\x64\Release\EpicGames.pdb source: G9e272AEyo.exe
Source: G9e272AEyo.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: G9e272AEyo.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: G9e272AEyo.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: G9e272AEyo.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: G9e272AEyo.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E8980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6482E8980
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeAPI coverage: 4.3 %
Source: Amcache.hve.37.drBinary or memory string: VMware
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.37.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.37.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.37.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.37.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.37.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.37.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.37.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.37.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: G9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.37.drBinary or memory string: vmci.sys
Source: Amcache.hve.37.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.37.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.37.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: VMware20,1
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.37.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.37.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.37.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.37.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.37.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.37.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64831FD4C
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483200E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6483200E8
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E8980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6482E8980
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831F9F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF64831F9F4
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64831FD4C
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831FEF4 SetUnhandledExceptionFilter,0_2_00007FF64831FEF4
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\G9e272AEyo.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64831FF64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF64831FF64
Source: Amcache.hve.37.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482F4A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6482F4A60
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6483049F0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF6483049F0
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64830B4F1 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF64830B4F1
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF6482E7630 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF6482E7630
Source: C:\Users\user\Desktop\G9e272AEyo.exeCode function: 0_2_00007FF64830B750 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF64830B750
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538233 Sample: G9e272AEyo.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 56 34 keyauth.win 2->34 40 Multi AV Scanner detection for submitted file 2->40 42 Machine Learning detection for sample 2->42 44 AI detected suspicious sample 2->44 8 G9e272AEyo.exe 1 2->8         started        signatures3 process4 dnsIp5 36 keyauth.win 104.26.1.5, 443, 49734 CLOUDFLARENETUS United States 8->36 38 127.0.0.1 unknown unknown 8->38 11 WerFault.exe 19 16 8->11         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 17 other processes 8->18 process6 file7 32 C:\ProgramData\Microsoft\...\Report.wer, Unicode 11->32 dropped 20 taskkill.exe 1 14->20         started        22 taskkill.exe 1 16->22         started        24 taskkill.exe 1 18->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 10 other processes 18->30 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
G9e272AEyo.exe32%ReversingLabsWin64.Trojan.Generic
G9e272AEyo.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.37.drfalse
      • URL Reputation: safe
      unknown
      http://185.101.104.122/aimhvcibronkzops.exeG9e272AEyo.exefalse
        unknown
        https://keyauth.win/api/1.1/aceG9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://185.101.104.122/aimhvciforabronkz.exeC:G9e272AEyo.exefalse
            unknown
            https://keyauth.win/api/1.2/sG9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.101.104.122/aimhvciforabronkz.exeG9e272AEyo.exefalse
                unknown
                https://curl.haxx.se/docs/http-cookies.htmlG9e272AEyo.exefalse
                • URL Reputation: safe
                unknown
                https://curl.haxx.se/docs/http-cookies.html#G9e272AEyo.exefalse
                  unknown
                  https://keyauth.win/api/1.1/ceG9e272AEyo.exe, 00000000.00000002.1822329975.00000257A73EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://keyauth.win/api/1.2/G9e272AEyo.exe, 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpfalse
                      unknown
                      http://185.101.104.122/aimhvcibronkzops.exeC:G9e272AEyo.exefalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.26.1.5
                        keyauth.winUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        127.0.0.1
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1538233
                        Start date and time:2024-10-20 21:09:05 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 16s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:42
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:G9e272AEyo.exe
                        renamed because original name is a hash value
                        Original Sample Name:f0f5b379dfbcd101a6abffae96082417.exe
                        Detection:MAL
                        Classification:mal56.winEXE@69/22@1/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 42
                        • Number of non-executed functions: 248
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 104.208.16.94
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • VT rate limit hit for: G9e272AEyo.exe
                        TimeTypeDescription
                        15:10:10API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.26.1.5Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                            4.7.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.Evo-gen.25703.16605.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.MalwareX-gen.5842.23757.exeGet hashmaliciousUnknownBrowse
                                      https://app.slidebean.com/p/mbice9jyuy/Get hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winSecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSsims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.75.40
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                        • 104.26.12.205
                                        9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 188.114.96.3
                                        WinFIG.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        SentinelOculus.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        Download.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eRFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                        • 104.26.1.5
                                        gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        ojSv9FmOwn.lnkGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        a1OueQJq4d.exeGet hashmaliciousDCRatBrowse
                                        • 104.26.1.5
                                        oIDX88LpSs.exeGet hashmaliciousXWormBrowse
                                        • 104.26.1.5
                                        hKWBNgRd7p.exeGet hashmaliciousXWormBrowse
                                        • 104.26.1.5
                                        N2ER4ZENF1.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        N2ER4ZENF1.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.Evo-gen.14681.29745.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeGet hashmaliciousDiscord RatBrowse
                                        • 104.26.1.5
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9977624473406657
                                        Encrypted:false
                                        SSDEEP:96:w5uFetdsThIx7tfaQXIDcQMc6VhcEGcw3wpm+HbHg/8BRTf3o8Fa9KUNsPQ2w1Ib:BGdD0yfsEpjfVmUzuiFyZ24lO8nxS
                                        MD5:7CCB07F3CF5B84EB34E4B300F443738E
                                        SHA1:55DCD47A56E1680E9F00010EFA157B9E32FDB43C
                                        SHA-256:DF9BF7015B57C255A4A109E74C128AFEDDD13D1F9539A7B59055066AAC53592B
                                        SHA-512:90F829F12691C8CF69C96E042F88631334412AA62585553116945EE8DE05E56927A87B0E27615E9F8270F9124F4AC6AD76C2FD6A41C523101B9AF8267B27C0C7
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.5.0.0.4.5.9.1.4.7.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.5.0.0.5.0.7.5.8.4.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.e.1.a.b.5.7.-.b.4.0.2.-.4.2.6.d.-.a.9.0.2.-.b.7.b.d.b.a.8.f.f.b.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.6.0.9.4.5.e.-.c.d.c.3.-.4.1.3.8.-.b.f.8.d.-.c.a.6.8.f.e.5.7.1.2.9.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.G.9.e.2.7.2.A.E.y.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.b.4.-.0.0.0.1.-.0.0.1.4.-.0.0.f.2.-.b.8.a.7.2.3.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.4.c.f.5.1.3.b.8.2.2.5.4.8.8.9.d.f.7.7.3.5.6.8.9.c.7.2.1.1.2.1.0.0.0.0.f.f.f.f.!.0.0.0.0.5.0.5.8.4.9.d.e.0.9.1.e.3.1.1.e.b.9.e.f.7.c.4.1.3.a.1.8.5.2.5.b.7.3.3.8.d.c.8.e.!.G.9.e.2.7.2.A.E.y.o...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.8.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:10:04 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):106100
                                        Entropy (8bit):1.6106783728828924
                                        Encrypted:false
                                        SSDEEP:384:n7NMclZ+0zZkORuKGf0f/3/sdDRtiqvO20N+zl:JF/+0VbRuKGQs5aZ0
                                        MD5:1470CFD454F4EE6917102197D2C10E11
                                        SHA1:ED3798036F91E7B21C53501AFFC40EA654F391A1
                                        SHA-256:CA8C6A53A5104956DBAAE7171F316D860780BE8F5954C4859A76B4FF4F9B9D12
                                        SHA-512:8F3653C17E898243E8266B328A31D1884F12DD468EEEFC43C85AEF7BC713DBB750AF9561A4AC9B96F210F41A42252146DA6FFC37764869D537BB1E907DC5CAE6
                                        Malicious:false
                                        Preview:MDMP..a..... ........U.g............$...............,............J..........T.......8...........T...........p'...w.......................!..............................................................................eJ......T"......Lw......................T............U.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):10132
                                        Entropy (8bit):3.7087127831487043
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJcWL6Y9txmGgmfZnEprT89b42lfgom:R6lXJFL6Y3MGgmfZn148fm
                                        MD5:710609471681C07D73979964D74B4060
                                        SHA1:D08272E9909FCB9B292DB38CCB52DECBEC4ED918
                                        SHA-256:CCA44CB62EE1C6BC3570D18ACFC5EBB0E4AAFB78947E87D9D829B7CE7A41852E
                                        SHA-512:01AF49960C147E6741E990A80FBCB492FCC1A0906A43981CC830172987B48B5E794870D0FCB359F9C705382375142BCFD0214E002851CDBAA258097DE66013D3
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.8.0.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4645
                                        Entropy (8bit):4.465403245286182
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs8Jg771I9HmzSSWpW8VYOoYm8M4J1TPSMF+yq85R0K2nCCAt4nt3d:uIjf6I7dWz7VjJmXKw3d
                                        MD5:2AE6B5AA0E17D35CE0788A1343BC1217
                                        SHA1:93EF10AA6710A9DFF6CDCDB8F4086AE153216A82
                                        SHA-256:C308B9ECCAA3C87CF1B9CAC771982488DEFA5241A7AF3D42BEE08C23C8F81B63
                                        SHA-512:63A156ED7B3CBC59BE15A51C135FAF851291DFE63892A4590C467E6FFA6DF1B78A6B8D79F45EB4543078C70AD89FA5399C02C8BFF5B8588554ACFD67F2F701EC
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552132" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.4656039153401315
                                        Encrypted:false
                                        SSDEEP:6144:dIXfpi67eLPU9skLmb0b49WSPKaJG8nAgejZMMhA2gX4WABl0uNSdwBCswSbt:OXD949WlLZMM6YFHY+t
                                        MD5:CF4FE81914BC8ABF87CABF056E8747E1
                                        SHA1:70D5E160840C6CB6E14CB9C87BF3664475F8EEB4
                                        SHA-256:39AD7F0821E133E287633C321334B01836A6A4BA17007D06F1BB03A3BD01BEF3
                                        SHA-512:F6305135935D3884CC4B61B498916D7D83250D6A2AA0C2A15C3C23D032141F7812CA71E5A02E07699538352822F4C55929244126EB2FB79856A10D86ED4C0BB5
                                        Malicious:false
                                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..s.##...............................................................................................................................................................................................................................................................................................................................................4d.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\cmd.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):44
                                        Entropy (8bit):4.003997527334849
                                        Encrypted:false
                                        SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                        MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                        SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                        SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                        SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                        Malicious:false
                                        Preview:The system cannot find the file specified...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):6.423322949566928
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:G9e272AEyo.exe
                                        File size:506'368 bytes
                                        MD5:f0f5b379dfbcd101a6abffae96082417
                                        SHA1:505849de091e311eb9ef7c413a18525b7338dc8e
                                        SHA256:b779b04efc9be9517b8ae479e408f6054a0f7f8ef3d1af542d5c0c863566c165
                                        SHA512:77a2bc28641ae88fe14ff16bccc738941a7e2f939d9df5279956d76df9f7bcef8dd5f7ce47c0102f92011dfc8153c4f55ea687bca0064df75681345a627b96dc
                                        SSDEEP:6144:Sy8K4ZP3rneV8giiDYviaN4TuNy+m4W70Lzxw2T942uHde9VWWJpQHCgTf1:SDxVtfkYvi3qNRWYLz2m+P4mzHC6f1
                                        TLSH:43B46D56A7A807E9D1A7D03CC547C603E7B6B4991310DBDB43A0CA791F63BE16E3A720
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x14005f9d8
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x67128079 [Fri Oct 18 15:36:25 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007F90C138FA68h
                                        dec eax
                                        add esp, 28h
                                        jmp 00007F90C138F357h
                                        int3
                                        int3
                                        jmp 00007F90C138FD18h
                                        int3
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov ebx, ecx
                                        xor ecx, ecx
                                        call dword ptr [0000178Bh]
                                        dec eax
                                        mov ecx, ebx
                                        call dword ptr [000016F2h]
                                        call dword ptr [00001774h]
                                        dec eax
                                        mov ecx, eax
                                        mov edx, C0000409h
                                        dec eax
                                        add esp, 20h
                                        pop ebx
                                        dec eax
                                        jmp dword ptr [00001770h]
                                        dec eax
                                        mov dword ptr [esp+08h], ecx
                                        dec eax
                                        sub esp, 38h
                                        mov ecx, 00000017h
                                        call dword ptr [00001764h]
                                        test eax, eax
                                        je 00007F90C138F4E9h
                                        mov ecx, 00000002h
                                        int 29h
                                        dec eax
                                        lea ecx, dword ptr [00018E12h]
                                        call 00007F90C138F6AEh
                                        dec eax
                                        mov eax, dword ptr [esp+38h]
                                        dec eax
                                        mov dword ptr [00018EF9h], eax
                                        dec eax
                                        lea eax, dword ptr [esp+38h]
                                        dec eax
                                        add eax, 08h
                                        dec eax
                                        mov dword ptr [00018E89h], eax
                                        dec eax
                                        mov eax, dword ptr [00018EE2h]
                                        dec eax
                                        mov dword ptr [00018D53h], eax
                                        dec eax
                                        mov eax, dword ptr [esp+40h]
                                        dec eax
                                        mov dword ptr [00018E57h], eax
                                        mov dword ptr [00018D2Dh], C0000409h
                                        mov dword ptr [00018D27h], 00000001h
                                        mov dword ptr [00000031h], 00000000h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffc00x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe800x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x5fda80x5fe00ad7af0cbccd1a4defd6ae074a195a815False0.5327243929269883data6.336128214871671IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x610000x16b920x16c001c53da1c44920008c818f71dd0927c63False0.37981842376373626data5.578623672658902IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x780000xdf80x400227ce6cadd4904b7716198186655da5cFalse0.2138671875data2.4411408781631465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x790000x3f840x400050e902fb009b515c9924ff6238b5e51dFalse0.48175048828125data5.776998787420237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x7e0000x4e40x60039326fb49822ad82593e9e49b5e608b8False0.5123697916666666data4.849267575521713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                        USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                        ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                        SHELL32.dllShellExecuteA
                                        MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                        urlmon.dllURLDownloadToFileA
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                        WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                        VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                        api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                        api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                        api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                        api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                        api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 21:10:01.332422018 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:01.332451105 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:01.332870007 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:01.343858004 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:01.343874931 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.117132902 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.117264032 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:02.121400118 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:02.121409893 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.121715069 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.125371933 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:02.167431116 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.586214066 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.586270094 CEST44349734104.26.1.5192.168.2.4
                                        Oct 20, 2024 21:10:02.586801052 CEST49734443192.168.2.4104.26.1.5
                                        Oct 20, 2024 21:10:11.703583956 CEST49734443192.168.2.4104.26.1.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 21:10:01.317313910 CEST5650953192.168.2.41.1.1.1
                                        Oct 20, 2024 21:10:01.327142954 CEST53565091.1.1.1192.168.2.4
                                        Oct 20, 2024 21:10:45.837368965 CEST5349822162.159.36.2192.168.2.4
                                        Oct 20, 2024 21:10:46.794553041 CEST53567301.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 20, 2024 21:10:01.317313910 CEST192.168.2.41.1.1.10x18eStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 20, 2024 21:10:01.327142954 CEST1.1.1.1192.168.2.40x18eNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 21:10:01.327142954 CEST1.1.1.1192.168.2.40x18eNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        Oct 20, 2024 21:10:01.327142954 CEST1.1.1.1192.168.2.40x18eNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449734104.26.1.54436580C:\Users\user\Desktop\G9e272AEyo.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-20 19:10:02 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                        Host: keyauth.win
                                        Accept: */*
                                        Content-Length: 58
                                        Content-Type: application/x-www-form-urlencoded
                                        2024-10-20 19:10:02 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 32 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                        Data Ascii: type=init&ver=8.2&name=loader principal&ownerid=9WIvTVJa9m


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Users\user\Desktop\G9e272AEyo.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\G9e272AEyo.exe"
                                        Imagebase:0x7ff6482c0000
                                        File size:506'368 bytes
                                        MD5 hash:F0F5B379DFBCD101A6ABFFAE96082417
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:4
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:6
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:8
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:10
                                        Start time:15:09:58
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:12
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff7699e0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:15:09:59
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:15:10:00
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:15:10:03
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:15:10:03
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:15:10:03
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:15:10:03
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff631850000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff776380000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7cb6d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:37
                                        Start time:15:10:04
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 6580 -s 1004
                                        Imagebase:0x7ff68cea0000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:4.3%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:22.4%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:90
                                          execution_graph 47021 7ff6482d80b5 47022 7ff6482d80c4 47021->47022 47026 7ff6482d80e3 47021->47026 47023 7ff6482d80d5 47022->47023 47082 7ff6482d84a0 47022->47082 47041 7ff6482d6d00 47023->47041 47033 7ff6482d727b 47026->47033 47086 7ff6482d5a20 15 API calls 47026->47086 47028 7ff6482d84a0 17 API calls 47028->47033 47030 7ff6482d8322 47031 7ff6482d8313 47090 7ff6482e5970 19 API calls 47031->47090 47033->47028 47033->47030 47033->47031 47037 7ff6482d731e 47033->47037 47040 7ff6482d6d00 292 API calls 47033->47040 47075 7ff6482e71f0 47033->47075 47081 7ff6482e5970 19 API calls 47033->47081 47087 7ff6482e1430 90 API calls 47033->47087 47088 7ff6482d5a20 15 API calls 47033->47088 47089 7ff6482f51e0 22 API calls 47033->47089 47037->47033 47039 7ff6482e5970 19 API calls 47037->47039 47039->47037 47040->47033 47042 7ff6482d6d3c 47041->47042 47051 7ff6482d6e12 47041->47051 47091 7ff6482daf50 47042->47091 47045 7ff6482d6d47 free free 47047 7ff6482d6d77 47045->47047 47048 7ff6482d6db5 47047->47048 47115 7ff6482f4cc0 22 API calls 47047->47115 47050 7ff6482d84a0 17 API calls 47048->47050 47053 7ff6482d6dcf 47050->47053 47116 7ff64831f580 47051->47116 47052 7ff6482d6e7c 47109 7ff6482ee520 47052->47109 47053->47051 47053->47052 47125 7ff6482eeee0 free free free free 47053->47125 47057 7ff6482d6eab 47058 7ff6482d6eb0 free 47057->47058 47058->47058 47059 7ff6482d6ece 47058->47059 47060 7ff6482d6ffb 47059->47060 47062 7ff6482d6f37 47059->47062 47142 7ff6482e1430 90 API calls 47060->47142 47126 7ff6482e8e80 47062->47126 47064 7ff6482d702d 47143 7ff6482e15b0 292 API calls 47064->47143 47065 7ff6482d6f96 47129 7ff6482de740 92 API calls 47065->47129 47068 7ff6482d6fb7 47069 7ff6482d6fe5 47068->47069 47070 7ff6482d6fbb 47068->47070 47141 7ff6482e15b0 292 API calls 47069->47141 47130 7ff6482e5af0 47070->47130 47076 7ff6482e723a 47075->47076 47078 7ff6482e725a 47076->47078 47152 7ff6482ed7b0 47076->47152 47079 7ff64831f580 8 API calls 47078->47079 47080 7ff6482e72ee 47079->47080 47080->47033 47081->47033 47083 7ff6482d84b7 47082->47083 47085 7ff6482d84f0 47082->47085 47155 7ff6482d57f0 17 API calls 47083->47155 47085->47023 47086->47033 47087->47033 47088->47033 47089->47033 47090->47030 47092 7ff6482daf65 47091->47092 47093 7ff6482daf77 47091->47093 47092->47093 47094 7ff6482daf6b 47092->47094 47095 7ff6482db114 free 47093->47095 47096 7ff6482db088 EnterCriticalSection LeaveCriticalSection 47093->47096 47144 7ff6482f8da0 WaitForSingleObjectEx CloseHandle 47094->47144 47095->47045 47098 7ff6482db0c1 CloseHandle 47096->47098 47099 7ff6482db0cb 47096->47099 47101 7ff6482db0ec 47098->47101 47102 7ff6482db0d1 47099->47102 47103 7ff6482db0d9 47099->47103 47100 7ff6482daf70 47100->47093 47106 7ff6482db101 closesocket 47101->47106 47147 7ff6482d5b00 free 47101->47147 47145 7ff6482f8da0 WaitForSingleObjectEx CloseHandle 47102->47145 47146 7ff6482db130 7 API calls 47103->47146 47106->47095 47107 7ff6482db0e2 free 47107->47101 47111 7ff6482ee541 47109->47111 47114 7ff6482ee59a 47109->47114 47110 7ff64831f580 8 API calls 47112 7ff6482d6e8b free 47110->47112 47113 7ff6482ee563 _time64 47111->47113 47111->47114 47112->47057 47112->47059 47113->47114 47114->47110 47115->47048 47117 7ff64831f589 47116->47117 47118 7ff64831fa28 IsProcessorFeaturePresent 47117->47118 47119 7ff6482d6e47 47117->47119 47120 7ff64831fa40 47118->47120 47119->47026 47148 7ff64831fc1c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47120->47148 47122 7ff64831fa53 47149 7ff64831f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47122->47149 47125->47052 47150 7ff6482e9840 13 API calls 47126->47150 47128 7ff6482e8eb3 47128->47065 47129->47068 47131 7ff6482d6fd6 47130->47131 47132 7ff6482e5af9 47130->47132 47140 7ff6482e15b0 292 API calls 47131->47140 47138 7ff6482e5bc9 47132->47138 47151 7ff6482e8f80 13 API calls 47132->47151 47133 7ff64831f580 8 API calls 47133->47131 47135 7ff6482e5bb1 47137 7ff6482e5bfe fwrite fwrite 47135->47137 47135->47138 47136 7ff6482e5b4c 47136->47135 47139 7ff6482e8e80 13 API calls 47136->47139 47137->47138 47138->47133 47139->47135 47142->47064 47144->47100 47145->47103 47146->47107 47147->47106 47148->47122 47150->47128 47151->47136 47153 7ff6482ed7c2 QueryPerformanceCounter 47152->47153 47154 7ff6482ed7fd GetTickCount 47152->47154 47153->47078 47154->47078 47155->47085 47156 7ff6482f1490 47159 7ff6482dfb70 47156->47159 47158 7ff6482f14a7 47160 7ff6482dfb97 47159->47160 47162 7ff6482dfb9e 47159->47162 47285 7ff6482e0550 memset 47160->47285 47163 7ff6482dfbcd 47162->47163 47165 7ff6482dfc07 47162->47165 47166 7ff6482dfbc4 47162->47166 47173 7ff6482f9a80 47163->47173 47191 7ff6482f9430 strchr 47163->47191 47267 7ff6482f8df0 47163->47267 47165->47158 47289 7ff6482e5970 19 API calls 47166->47289 47167 7ff6482dfc17 47167->47165 47168 7ff6482dfbf2 47168->47165 47286 7ff6482f5090 47168->47286 47174 7ff6482f9ad4 47173->47174 47190 7ff6482f9ac9 47173->47190 47175 7ff6482e71f0 10 API calls 47174->47175 47186 7ff6482f9afb 47174->47186 47179 7ff6482f9ae7 47175->47179 47176 7ff6482f9bf2 47176->47190 47437 7ff6482fb1e0 69 API calls 47176->47437 47177 7ff6482e71f0 10 API calls 47177->47186 47180 7ff6482f9bdc 47179->47180 47290 7ff6482f9c70 47179->47290 47436 7ff6482e5970 19 API calls 47180->47436 47183 7ff6482f9bd5 47183->47190 47186->47176 47186->47177 47186->47180 47187 7ff6482f9bbd WSAGetLastError 47186->47187 47189 7ff6482f9bac 47186->47189 47186->47190 47345 7ff6482f5fe0 47186->47345 47369 7ff6482faa50 47186->47369 47435 7ff6482e5970 19 API calls 47187->47435 47189->47180 47189->47190 47190->47168 47192 7ff6482f9470 47191->47192 47193 7ff6482f94ca strncpy 47192->47193 47194 7ff6482f9479 strncpy 47192->47194 47198 7ff6482f94c5 47192->47198 47195 7ff6482f94da strcmp 47193->47195 47199 7ff6482f94c3 47194->47199 47200 7ff6482f9a6c 47194->47200 47197 7ff6482f94fd strcmp 47195->47197 47249 7ff6482f94f3 47195->47249 47202 7ff6482f951b strcmp 47197->47202 47197->47249 47198->47193 47199->47195 47512 7ff64831fafc 47200->47512 47204 7ff6482f9539 strcmp 47202->47204 47202->47249 47207 7ff6482f9551 strcmp 47204->47207 47204->47249 47205 7ff64831f580 8 API calls 47206 7ff6482f9a5c 47205->47206 47206->47168 47208 7ff6482f9569 strcmp 47207->47208 47207->47249 47210 7ff6482f9587 strcmp 47208->47210 47208->47249 47215 7ff6482f95a5 strcmp 47210->47215 47210->47249 47218 7ff6482f95c3 strcmp 47215->47218 47215->47249 47219 7ff6482f95e1 strcmp 47218->47219 47218->47249 47222 7ff6482f95ff strcmp 47219->47222 47219->47249 47225 7ff6482f961d strcmp 47222->47225 47222->47249 47228 7ff6482f963b strcmp 47225->47228 47225->47249 47230 7ff6482f9659 strcmp 47228->47230 47228->47249 47233 7ff6482f9677 strcmp 47230->47233 47230->47249 47234 7ff6482f9695 strcmp 47233->47234 47233->47249 47235 7ff6482f96b3 strcmp 47234->47235 47234->47249 47236 7ff6482f96d1 strcmp 47235->47236 47235->47249 47237 7ff6482f96ef strcmp 47236->47237 47236->47249 47238 7ff6482f970d strcmp 47237->47238 47237->47249 47239 7ff6482f972b strcmp 47238->47239 47238->47249 47240 7ff6482f9749 strcmp 47239->47240 47239->47249 47241 7ff6482f9767 strcmp 47240->47241 47240->47249 47242 7ff6482f9785 strcmp 47241->47242 47241->47249 47243 7ff6482f97a3 strcmp 47242->47243 47242->47249 47244 7ff6482f97c1 strcmp 47243->47244 47243->47249 47245 7ff6482f97df strcmp 47244->47245 47244->47249 47246 7ff6482f97fd strcmp 47245->47246 47245->47249 47247 7ff6482f981b strcmp 47246->47247 47246->47249 47248 7ff6482f9839 strcmp 47247->47248 47247->47249 47248->47249 47250 7ff6482f9857 strcmp 47248->47250 47249->47205 47250->47249 47251 7ff6482f9875 strcmp 47250->47251 47251->47249 47252 7ff6482f9893 strcmp 47251->47252 47252->47249 47253 7ff6482f98b1 strcmp 47252->47253 47253->47249 47254 7ff6482f98cf strcmp 47253->47254 47254->47249 47255 7ff6482f98ed strcmp 47254->47255 47255->47249 47256 7ff6482f990b strcmp 47255->47256 47256->47249 47257 7ff6482f9929 strcmp 47256->47257 47257->47249 47258 7ff6482f9947 strcmp 47257->47258 47258->47249 47259 7ff6482f9965 strcmp 47258->47259 47259->47249 47260 7ff6482f9983 strcmp 47259->47260 47260->47249 47261 7ff6482f99a1 strcmp 47260->47261 47261->47249 47262 7ff6482f99bf strcmp 47261->47262 47262->47249 47263 7ff6482f99da strcmp 47262->47263 47263->47249 47264 7ff6482f99f5 strcmp 47263->47264 47264->47249 47265 7ff6482f9a10 strcmp 47264->47265 47265->47249 47266 7ff6482f9a2b strcmp 47265->47266 47266->47249 47268 7ff6482f9a80 47267->47268 47269 7ff6482e71f0 10 API calls 47268->47269 47272 7ff6482f9ac9 47268->47272 47281 7ff6482f9afb 47268->47281 47273 7ff6482f9ae7 47269->47273 47270 7ff6482f9bf2 47270->47272 47530 7ff6482fb1e0 69 API calls 47270->47530 47271 7ff6482e71f0 10 API calls 47271->47281 47272->47168 47275 7ff6482f9bdc 47273->47275 47277 7ff6482f9c70 74 API calls 47273->47277 47529 7ff6482e5970 19 API calls 47275->47529 47277->47281 47278 7ff6482f9bd5 47278->47272 47279 7ff6482f5fe0 19 API calls 47279->47281 47280 7ff6482faa50 305 API calls 47280->47281 47281->47270 47281->47271 47281->47272 47281->47275 47281->47279 47281->47280 47282 7ff6482f9bbd WSAGetLastError 47281->47282 47284 7ff6482f9bac 47281->47284 47528 7ff6482e5970 19 API calls 47282->47528 47284->47272 47284->47275 47285->47162 47287 7ff6482ed7b0 2 API calls 47286->47287 47288 7ff6482f50aa 47287->47288 47288->47165 47289->47167 47291 7ff6482f9ce2 47290->47291 47438 7ff6482e8800 47291->47438 47294 7ff6482f9d31 47296 7ff6482f9d3a GetModuleHandleA GetProcAddress 47294->47296 47299 7ff6482f9d78 47294->47299 47295 7ff6482e5af0 15 API calls 47295->47294 47297 7ff6482f9d5c 47296->47297 47296->47299 47298 7ff6482e8800 14 API calls 47297->47298 47300 7ff6482f9d70 47298->47300 47301 7ff6482e8800 14 API calls 47299->47301 47305 7ff6482f9dd5 47299->47305 47300->47299 47302 7ff6482f9dd1 47301->47302 47303 7ff6482f9de2 47302->47303 47302->47305 47463 7ff6482e5970 19 API calls 47303->47463 47306 7ff6482fa707 47305->47306 47311 7ff6482f9e98 47305->47311 47446 7ff6482f7900 47306->47446 47308 7ff6482fa856 47310 7ff64831f580 8 API calls 47308->47310 47309 7ff6482fa71c 47312 7ff6482fa72f 47309->47312 47316 7ff6482f7900 13 API calls 47309->47316 47313 7ff6482faa0c 47310->47313 47464 7ff6482e5970 19 API calls 47311->47464 47314 7ff6482e5af0 15 API calls 47312->47314 47317 7ff6482fa742 47312->47317 47313->47186 47314->47317 47316->47312 47320 7ff6482e5af0 15 API calls 47317->47320 47322 7ff6482fa78b 47317->47322 47319 7ff6482f9df1 47319->47308 47320->47322 47321 7ff6482fa7ed calloc 47323 7ff6482fa860 47321->47323 47324 7ff6482fa847 47321->47324 47322->47321 47323->47308 47326 7ff6482fa96c 47323->47326 47327 7ff6482fa8c9 free 47323->47327 47465 7ff6482e5970 19 API calls 47324->47465 47460 7ff6482e6230 47326->47460 47328 7ff6482fa8fa 47327->47328 47329 7ff6482fa946 47327->47329 47331 7ff6482fa902 47328->47331 47332 7ff6482fa920 47328->47332 47470 7ff6482d1d10 22 API calls 47329->47470 47466 7ff6482d1d10 22 API calls 47331->47466 47468 7ff6482d1d10 22 API calls 47332->47468 47335 7ff6482fa950 47471 7ff6482e5970 19 API calls 47335->47471 47339 7ff6482fa909 47467 7ff6482e5970 19 API calls 47339->47467 47340 7ff6482fa92a 47469 7ff6482e5970 19 API calls 47340->47469 47342 7ff6482fa9e9 47472 7ff6482e5970 19 API calls 47342->47472 47346 7ff6482f6027 47345->47346 47350 7ff6482f605b 47345->47350 47347 7ff6482f6031 47346->47347 47346->47350 47348 7ff6482f604b Sleep 47347->47348 47349 7ff6482f6038 WSASetLastError 47347->47349 47357 7ff6482f6054 47347->47357 47348->47357 47349->47357 47352 7ff6482f61a5 47350->47352 47354 7ff6482f61d3 select 47350->47354 47351 7ff64831f580 8 API calls 47356 7ff6482f630e 47351->47356 47355 7ff6482f61aa 47352->47355 47358 7ff6482f61b3 WSASetLastError 47352->47358 47359 7ff6482f61c6 Sleep 47352->47359 47354->47355 47355->47357 47360 7ff6482f6272 __WSAFDIsSet __WSAFDIsSet 47355->47360 47361 7ff6482f629c 47355->47361 47356->47186 47357->47351 47358->47355 47359->47355 47360->47361 47362 7ff6482f62a4 __WSAFDIsSet 47361->47362 47363 7ff6482f62cb 47361->47363 47364 7ff6482f62ba __WSAFDIsSet 47362->47364 47365 7ff6482f62b7 47362->47365 47363->47357 47366 7ff6482f62d3 __WSAFDIsSet 47363->47366 47364->47363 47365->47364 47367 7ff6482f62e9 __WSAFDIsSet 47366->47367 47368 7ff6482f62e6 47366->47368 47367->47357 47368->47367 47371 7ff6482faac0 47369->47371 47370 7ff6482fb1bf 47371->47370 47372 7ff6482fab62 47371->47372 47373 7ff6482fab22 malloc 47371->47373 47374 7ff6482fabb3 47372->47374 47375 7ff6482fab68 malloc 47372->47375 47373->47370 47373->47372 47376 7ff6482fac20 47374->47376 47377 7ff6482fabc6 realloc 47374->47377 47375->47370 47375->47374 47381 7ff6482fac65 47376->47381 47494 7ff6482e5cf0 recv 47376->47494 47377->47376 47378 7ff6482fabe2 47377->47378 47497 7ff6482e5970 19 API calls 47378->47497 47382 7ff6482facaa malloc 47381->47382 47389 7ff6482fabf1 47381->47389 47413 7ff6482faeba 47381->47413 47382->47370 47383 7ff6482fad47 memcpy 47382->47383 47384 7ff6482fad67 free 47383->47384 47383->47389 47384->47389 47390 7ff6482fadd9 47384->47390 47385 7ff64831f580 8 API calls 47387 7ff6482fac0d 47385->47387 47387->47186 47389->47385 47391 7ff6482fb14c 47390->47391 47394 7ff6482faefd 47390->47394 47406 7ff6482fadf8 47390->47406 47391->47389 47392 7ff6482fb15a 47391->47392 47510 7ff6482d1d10 22 API calls 47392->47510 47396 7ff6482faf44 47394->47396 47397 7ff6482faf06 47394->47397 47395 7ff6482fb16f 47511 7ff6482e5970 19 API calls 47395->47511 47501 7ff6482d1d10 22 API calls 47396->47501 47397->47392 47399 7ff6482faf13 47397->47399 47499 7ff6482d1d10 22 API calls 47399->47499 47401 7ff6482e6230 48 API calls 47401->47406 47402 7ff6482faed5 47402->47389 47404 7ff6482fae64 47412 7ff6482fae90 memcpy 47404->47412 47414 7ff6482faf98 47404->47414 47405 7ff6482faf5b 47502 7ff6482e5970 19 API calls 47405->47502 47406->47401 47406->47404 47409 7ff6482faf72 47406->47409 47407 7ff6482faf28 47500 7ff6482e5970 19 API calls 47407->47500 47503 7ff6482e5970 19 API calls 47409->47503 47412->47413 47412->47414 47498 7ff6482e5970 19 API calls 47413->47498 47414->47389 47415 7ff6482fb120 47414->47415 47418 7ff6482fb0f3 47414->47418 47419 7ff6482fb049 47414->47419 47415->47389 47416 7ff6482fb13b 47415->47416 47509 7ff648315ad0 91 API calls 47416->47509 47507 7ff6482d1d10 22 API calls 47418->47507 47421 7ff6482fb0bb 47419->47421 47425 7ff6482fb057 memset 47419->47425 47423 7ff6482fb0d0 47421->47423 47424 7ff6482fb0ca CertFreeCertificateContext 47421->47424 47422 7ff6482fb107 47508 7ff6482e5970 19 API calls 47422->47508 47423->47415 47427 7ff6482fb0d4 47423->47427 47424->47423 47428 7ff6482fb07c 47425->47428 47506 7ff6482e5970 19 API calls 47427->47506 47428->47421 47431 7ff6482fb08c 47428->47431 47434 7ff6482fb0a6 47428->47434 47429 7ff6482fb119 47429->47421 47431->47434 47504 7ff6482df0e0 306 API calls 47431->47504 47434->47421 47505 7ff6482e5970 19 API calls 47434->47505 47435->47183 47436->47183 47437->47190 47439 7ff6482e882d 47438->47439 47440 7ff6482e88df VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47439->47440 47441 7ff6482e8845 47439->47441 47442 7ff6482e8934 VerifyVersionInfoA 47440->47442 47443 7ff6482e8922 VerSetConditionMask 47440->47443 47444 7ff64831f580 8 API calls 47441->47444 47442->47441 47443->47442 47445 7ff6482e896b 47444->47445 47445->47294 47445->47295 47447 7ff6482f790c 47446->47447 47453 7ff6482f7936 47446->47453 47448 7ff6482f7911 _errno 47447->47448 47457 7ff6482f7927 47447->47457 47448->47309 47449 7ff6482f79f7 47449->47309 47450 7ff6482f7990 strchr 47450->47453 47451 7ff6482f7aa0 strchr 47452 7ff6482f7ac0 strchr 47451->47452 47451->47457 47452->47457 47453->47449 47453->47450 47454 7ff64831f580 8 API calls 47455 7ff6482f7c06 47454->47455 47455->47309 47456 7ff6482f7bb5 47459 7ff6482f7b4d 47456->47459 47473 7ff6482f7950 strchr 47456->47473 47457->47451 47457->47456 47457->47459 47459->47454 47474 7ff6482e5ed0 47460->47474 47463->47319 47464->47319 47465->47308 47466->47339 47467->47319 47468->47340 47469->47319 47470->47335 47471->47319 47472->47308 47473->47459 47475 7ff6482e5f3f 47474->47475 47476 7ff6482e5fd7 send 47474->47476 47475->47476 47481 7ff6482f5fe0 19 API calls 47475->47481 47477 7ff6482e5ff5 WSAGetLastError 47476->47477 47478 7ff6482e6004 47476->47478 47477->47478 47479 7ff6482e6010 47477->47479 47482 7ff64831f580 8 API calls 47478->47482 47492 7ff6482d2500 27 API calls 47479->47492 47484 7ff6482e5f73 47481->47484 47485 7ff6482e6057 47482->47485 47483 7ff6482e6022 47493 7ff6482e5970 19 API calls 47483->47493 47484->47476 47488 7ff6482e5f7c 47484->47488 47485->47308 47485->47342 47487 7ff6482e6034 47487->47478 47489 7ff6482e5f84 malloc 47488->47489 47490 7ff6482e5fb0 recv 47488->47490 47489->47490 47491 7ff6482e5fcd 47489->47491 47490->47476 47490->47491 47491->47476 47492->47483 47493->47487 47495 7ff6482e5d32 47494->47495 47496 7ff6482e5d0b WSAGetLastError 47494->47496 47495->47381 47496->47381 47497->47389 47498->47402 47499->47407 47500->47402 47501->47405 47502->47402 47503->47402 47504->47434 47505->47421 47506->47402 47507->47422 47508->47429 47509->47402 47510->47395 47511->47402 47518 7ff64831fb10 IsProcessorFeaturePresent 47512->47518 47519 7ff64831fb27 47518->47519 47524 7ff64831fbac RtlCaptureContext RtlLookupFunctionEntry 47519->47524 47525 7ff64831fbdc RtlVirtualUnwind 47524->47525 47526 7ff64831fb3b 47524->47526 47525->47526 47527 7ff64831f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47526->47527 47528->47278 47529->47278 47530->47272 47531 7ff6483020b0 47532 7ff648302140 47531->47532 47533 7ff6483020d9 47531->47533 47606 7ff6482eb6d0 47532->47606 47535 7ff648302100 47533->47535 47536 7ff6483020ea 47533->47536 47566 7ff6482e6980 47535->47566 47604 7ff6482eb5d0 456 API calls 47536->47604 47539 7ff6483020f5 47541 7ff64830214d 47546 7ff6483021b1 47541->47546 47552 7ff64830222a 47541->47552 47626 7ff64831aa80 35 API calls 47541->47626 47542 7ff648302111 47542->47552 47605 7ff648302d30 65 API calls 47542->47605 47544 7ff6483021e2 47547 7ff64830223e 47544->47547 47548 7ff6483021ee 47544->47548 47545 7ff6483022de 47634 7ff6482ec9a0 17 API calls 47545->47634 47546->47544 47546->47545 47546->47552 47561 7ff648302247 47547->47561 47630 7ff64831cb10 _errno strtoll _errno 47547->47630 47627 7ff648302a40 322 API calls 47548->47627 47553 7ff648302135 47555 7ff6483021f8 47555->47552 47628 7ff648302590 26 API calls 47555->47628 47557 7ff64830229e 47557->47552 47633 7ff64831aa80 35 API calls 47557->47633 47560 7ff648302213 47560->47552 47629 7ff648302980 32 API calls 47560->47629 47561->47557 47632 7ff648302dd0 72 API calls 47561->47632 47562 7ff648302263 47562->47557 47562->47561 47563 7ff648302289 47562->47563 47631 7ff648302dd0 72 API calls 47563->47631 47567 7ff6482e69d8 47566->47567 47577 7ff6482e69cf 47566->47577 47568 7ff6482ed7b0 2 API calls 47567->47568 47571 7ff6482e69f2 47568->47571 47569 7ff64831f580 8 API calls 47570 7ff6482e6f05 47569->47570 47570->47532 47570->47542 47572 7ff6482e6a82 47571->47572 47573 7ff6482e6a69 47571->47573 47575 7ff6482e6a8c 47572->47575 47602 7ff6482e6ab9 47572->47602 47656 7ff6482e5970 19 API calls 47573->47656 47576 7ff6482e7b50 662 API calls 47575->47576 47578 7ff6482e6a9a 47576->47578 47577->47569 47578->47577 47581 7ff6482e7c60 51 API calls 47578->47581 47579 7ff6482f5fe0 19 API calls 47579->47602 47580 7ff6482e6d95 47580->47577 47658 7ff6482e8280 667 API calls 47580->47658 47581->47577 47582 7ff6482e6d04 SleepEx getsockopt 47584 7ff6482e6d4c WSAGetLastError 47582->47584 47582->47602 47584->47602 47585 7ff6482e6ca6 SleepEx getsockopt 47586 7ff6482e6cee WSAGetLastError 47585->47586 47585->47602 47586->47602 47587 7ff6482e6dc7 47667 7ff6482d2500 27 API calls 47587->47667 47588 7ff6482e6dd3 47591 7ff6482e6e2b 47588->47591 47659 7ff6482e65d0 47588->47659 47589 7ff6482e6bb7 WSASetLastError 47589->47602 47590 7ff6482e6dae 47590->47577 47590->47587 47635 7ff6482e7b50 47591->47635 47595 7ff6482e5af0 15 API calls 47595->47602 47596 7ff6482e6ea7 47668 7ff6482e5970 19 API calls 47596->47668 47597 7ff6482e6e49 47597->47577 47648 7ff6482e7c60 47597->47648 47600 7ff6482e6a78 47600->47577 47602->47579 47602->47580 47602->47582 47602->47585 47602->47588 47602->47589 47602->47595 47603 7ff6482e8280 667 API calls 47602->47603 47657 7ff6482d2500 27 API calls 47602->47657 47603->47602 47604->47539 47605->47553 47607 7ff6482eb704 47606->47607 47608 7ff6482eb71f 47606->47608 47607->47608 47610 7ff6482dfb70 306 API calls 47607->47610 47609 7ff6482eb761 memset 47608->47609 47624 7ff6482eb725 47608->47624 47613 7ff6482eb793 47609->47613 47610->47608 47611 7ff64831f580 8 API calls 47612 7ff6482eb8c5 47611->47612 47612->47541 47614 7ff6482eb7ee calloc 47613->47614 47615 7ff6482eb866 47613->47615 47616 7ff6482eb81c 47614->47616 47617 7ff6482eb806 47614->47617 47715 7ff6482eaa80 455 API calls 47615->47715 47619 7ff6482e5af0 15 API calls 47616->47619 47617->47624 47621 7ff6482eb82b 47619->47621 47620 7ff6482eb876 47622 7ff6482e5af0 15 API calls 47620->47622 47623 7ff6482eb891 47620->47623 47621->47615 47622->47623 47623->47624 47625 7ff6482eb89b free 47623->47625 47624->47611 47625->47624 47626->47546 47627->47555 47628->47560 47629->47552 47630->47562 47631->47557 47632->47557 47633->47552 47634->47552 47636 7ff6482e7c55 47635->47636 47640 7ff6482e7b67 47635->47640 47636->47597 47637 7ff6482e7c37 47671 7ff6482f6440 634 API calls 47637->47671 47639 7ff6482e7c0a 47670 7ff6482f6a90 661 API calls 47639->47670 47640->47637 47640->47639 47643 7ff6482e7bec 47640->47643 47642 7ff6482e7c50 47642->47597 47643->47639 47645 7ff6482e7bf1 47643->47645 47644 7ff6482e7c32 47644->47597 47669 7ff6482e5970 19 API calls 47645->47669 47647 7ff6482e7c00 47647->47597 47649 7ff6482e7c80 47648->47649 47650 7ff6482e7c8d 47648->47650 47651 7ff6482f5090 2 API calls 47649->47651 47672 7ff6482e7300 47650->47672 47651->47650 47655 7ff6482e7ca5 47655->47577 47656->47600 47657->47602 47658->47590 47660 7ff6482e6610 closesocket 47659->47660 47663 7ff6482e65e5 47659->47663 47660->47591 47662 7ff6482e6626 47714 7ff6482d5b00 free 47662->47714 47663->47662 47664 7ff6482e6601 47663->47664 47713 7ff6482d5b00 free 47664->47713 47666 7ff6482e662e 47666->47591 47667->47596 47668->47600 47669->47647 47670->47644 47671->47642 47673 7ff6482e7533 47672->47673 47674 7ff6482e7337 47672->47674 47676 7ff64831f580 8 API calls 47673->47676 47674->47673 47675 7ff6482e7351 getpeername 47674->47675 47678 7ff6482e73ad getsockname 47675->47678 47679 7ff6482e7376 WSAGetLastError 47675->47679 47677 7ff6482e761a 47676->47677 47702 7ff6482e20a0 15 API calls 47677->47702 47681 7ff6482e7400 WSAGetLastError 47678->47681 47682 7ff6482e7437 47678->47682 47703 7ff6482d2500 27 API calls 47679->47703 47705 7ff6482d2500 27 API calls 47681->47705 47707 7ff6482e6530 19 API calls 47682->47707 47683 7ff6482e7393 47704 7ff6482e5970 19 API calls 47683->47704 47687 7ff6482e741d 47706 7ff6482e5970 19 API calls 47687->47706 47688 7ff6482e7459 47689 7ff6482e749d 47688->47689 47690 7ff6482e745d _errno _errno 47688->47690 47710 7ff6482e6530 19 API calls 47689->47710 47708 7ff6482d2500 27 API calls 47690->47708 47691 7ff6482e73a8 47691->47673 47695 7ff6482e7483 47709 7ff6482e5970 19 API calls 47695->47709 47696 7ff6482e74ef 47696->47673 47698 7ff6482e74f3 _errno _errno 47696->47698 47711 7ff6482d2500 27 API calls 47698->47711 47700 7ff6482e7519 47712 7ff6482e5970 19 API calls 47700->47712 47702->47655 47703->47683 47704->47691 47705->47687 47706->47691 47707->47688 47708->47695 47709->47691 47710->47696 47711->47700 47712->47691 47713->47660 47714->47666 47715->47620 47716 7ff6482d7570 47717 7ff6482d7581 47716->47717 47744 7ff6482ee420 47717->47744 47719 7ff6482d75b5 47720 7ff6482d75e7 47719->47720 47721 7ff6482e5af0 15 API calls 47719->47721 47772 7ff6482eee70 314 API calls 47720->47772 47723 7ff6482d75e1 47721->47723 47723->47720 47725 7ff6482d75f7 47723->47725 47724 7ff6482d75f4 47724->47725 47748 7ff6482d8520 47725->47748 47732 7ff6482d8322 47733 7ff6482d8313 47776 7ff6482e5970 19 API calls 47733->47776 47735 7ff6482d84a0 17 API calls 47736 7ff6482d727b 47735->47736 47736->47732 47736->47733 47736->47735 47739 7ff6482e71f0 10 API calls 47736->47739 47741 7ff6482d731e 47736->47741 47743 7ff6482d6d00 292 API calls 47736->47743 47770 7ff6482e5970 19 API calls 47736->47770 47773 7ff6482e1430 90 API calls 47736->47773 47774 7ff6482d5a20 15 API calls 47736->47774 47775 7ff6482f51e0 22 API calls 47736->47775 47739->47736 47740 7ff6482e5970 19 API calls 47740->47741 47741->47736 47741->47740 47743->47736 47745 7ff6482ee44a 47744->47745 47777 7ff6482eef50 47745->47777 47747 7ff6482ee469 47747->47719 47749 7ff6482d8586 47748->47749 47752 7ff6482d86ce calloc 47749->47752 47759 7ff6482d86e8 47749->47759 47760 7ff6482d87fa 47749->47760 47750 7ff6482d8908 memcpy memcpy 47754 7ff6482d87f0 47750->47754 47751 7ff64831f580 8 API calls 47753 7ff6482d7602 47751->47753 47752->47754 47752->47759 47753->47736 47764 7ff6482eeb40 47753->47764 47754->47751 47755 7ff6482d8904 47755->47750 47757 7ff6482edb00 malloc memcpy 47757->47759 47758 7ff6482d87e7 free 47758->47754 47759->47749 47759->47754 47759->47757 47759->47758 47761 7ff6482d87df 47759->47761 47792 7ff6482ede40 47759->47792 47760->47750 47760->47755 47798 7ff6482eddd0 free 47760->47798 47797 7ff6482eddd0 free 47761->47797 47765 7ff6482eeb59 47764->47765 47799 7ff6482e1e90 47765->47799 47767 7ff6482eeb70 47768 7ff6482d750c 47767->47768 47823 7ff6482e1430 90 API calls 47767->47823 47768->47736 47771 7ff6482eb580 free 47768->47771 47770->47736 47771->47736 47772->47724 47773->47736 47774->47736 47775->47736 47776->47732 47778 7ff6482eef90 47777->47778 47779 7ff6482eefcb 47778->47779 47780 7ff6482eefb6 tolower 47778->47780 47781 7ff6482e8e80 13 API calls 47779->47781 47780->47779 47780->47780 47782 7ff6482eefe2 47781->47782 47783 7ff6482ef04c 47782->47783 47784 7ff6482ef028 tolower 47782->47784 47791 7ff6482ef0c1 47782->47791 47785 7ff6482ef086 _time64 47783->47785 47783->47791 47787 7ff6482e8e80 13 API calls 47784->47787 47788 7ff6482ef0a5 47785->47788 47785->47791 47786 7ff64831f580 8 API calls 47789 7ff6482ef0ec 47786->47789 47787->47783 47790 7ff6482e5af0 15 API calls 47788->47790 47788->47791 47789->47747 47790->47791 47791->47786 47793 7ff6482edef6 47792->47793 47794 7ff6482ede57 47792->47794 47793->47759 47794->47793 47795 7ff6482ede77 malloc 47794->47795 47796 7ff6482edea6 47795->47796 47796->47759 47797->47758 47798->47760 47800 7ff6482f5090 2 API calls 47799->47800 47802 7ff6482e1eb5 47800->47802 47801 7ff6482e1ec5 47801->47767 47802->47801 47803 7ff6482e1eee free 47802->47803 47804 7ff6482e1f19 47802->47804 47835 7ff6482e8db0 15 API calls 47803->47835 47806 7ff6482ed7b0 2 API calls 47804->47806 47808 7ff6482e1f25 47804->47808 47807 7ff6482e1f4f 47806->47807 47809 7ff6482e1f63 47807->47809 47810 7ff6482e1f91 47807->47810 47808->47767 47824 7ff6482e6780 47809->47824 47812 7ff6482f5090 2 API calls 47810->47812 47813 7ff6482e1f9e 47812->47813 47817 7ff6482e1fc1 47813->47817 47818 7ff6482f5090 2 API calls 47813->47818 47814 7ff6482e1f79 47815 7ff6482e1f81 47814->47815 47816 7ff6482ed7b0 2 API calls 47814->47816 47815->47767 47819 7ff6482e2054 47816->47819 47820 7ff6482e7300 47 API calls 47817->47820 47818->47817 47819->47767 47821 7ff6482e1fda 47820->47821 47821->47814 47822 7ff6482e5af0 15 API calls 47821->47822 47822->47814 47823->47768 47825 7ff6482ed7b0 2 API calls 47824->47825 47826 7ff6482e67a3 47825->47826 47827 7ff6482e681b 47826->47827 47834 7ff6482e6834 47826->47834 47901 7ff6482e5970 19 API calls 47827->47901 47829 7ff6482e682a 47830 7ff6482e6941 47829->47830 47830->47814 47831 7ff6482e693d 47831->47830 47902 7ff6482d57f0 17 API calls 47831->47902 47834->47831 47836 7ff6482e7cc0 47834->47836 47835->47804 47837 7ff6482e7d2f memcpy 47836->47837 47839 7ff6482e7d98 socket 47837->47839 47841 7ff6482e7d6b 47837->47841 47839->47841 47840 7ff64831f580 8 API calls 47843 7ff6482e826b 47840->47843 47844 7ff6482e7dd7 47841->47844 47894 7ff6482e80f4 47841->47894 47923 7ff6482f4c90 ioctlsocket 47841->47923 47843->47834 47845 7ff6482e81fa _errno _errno _errno 47844->47845 47903 7ff6483111c0 47844->47903 47928 7ff6482d2500 27 API calls 47845->47928 47848 7ff6482e7e24 47848->47845 47850 7ff6482e7e2d htons 47848->47850 47849 7ff6482e822b 47929 7ff6482e5970 19 API calls 47849->47929 47852 7ff6482e5af0 15 API calls 47850->47852 47854 7ff6482e7e4e 47852->47854 47853 7ff6482e8240 47855 7ff6482e65d0 2 API calls 47853->47855 47856 7ff6482e7ec9 47854->47856 47857 7ff6482e7e6f setsockopt 47854->47857 47889 7ff6482e80d5 47855->47889 47859 7ff6482e8800 14 API calls 47856->47859 47863 7ff6482e7f01 47856->47863 47857->47856 47858 7ff6482e7e9d WSAGetLastError 47857->47858 47924 7ff6482d2500 27 API calls 47858->47924 47859->47863 47860 7ff6482e7f22 getsockopt 47864 7ff6482e7f53 setsockopt 47860->47864 47865 7ff6482e7f49 47860->47865 47861 7ff6482e7f05 47867 7ff6482e7f8a setsockopt 47861->47867 47874 7ff6482e7fc9 47861->47874 47863->47860 47863->47861 47864->47861 47865->47861 47865->47864 47866 7ff6482e7eb7 47868 7ff6482e5af0 15 API calls 47866->47868 47870 7ff6482e7fce 47867->47870 47871 7ff6482e7fb7 47867->47871 47868->47856 47869 7ff6482e80a8 47925 7ff6482e7630 647 API calls 47869->47925 47879 7ff6482e7ffc WSAIoctl 47870->47879 47873 7ff6482e5af0 15 API calls 47871->47873 47872 7ff6482e80fe 47922 7ff6482f4c90 ioctlsocket 47872->47922 47873->47874 47887 7ff6482e8097 47874->47887 47890 7ff6482e80e9 47874->47890 47876 7ff6482e810b 47878 7ff6482ed7b0 2 API calls 47876->47878 47881 7ff6482e8115 47878->47881 47879->47874 47882 7ff6482e8044 WSAGetLastError 47879->47882 47880 7ff6482e80c4 47880->47872 47883 7ff6482e80ca 47880->47883 47884 7ff6482e813f 47881->47884 47926 7ff6482d57f0 17 API calls 47881->47926 47885 7ff6482e5af0 15 API calls 47882->47885 47886 7ff6482e65d0 2 API calls 47883->47886 47892 7ff6482e815f connect 47884->47892 47893 7ff6482e8188 WSAGetLastError 47884->47893 47884->47894 47885->47874 47886->47889 47887->47869 47887->47872 47889->47894 47891 7ff6482e65d0 2 API calls 47890->47891 47891->47894 47892->47893 47892->47894 47893->47894 47895 7ff6482e8195 47893->47895 47894->47840 47895->47894 47927 7ff6482d2500 27 API calls 47895->47927 47897 7ff6482e81b1 47898 7ff6482e5af0 15 API calls 47897->47898 47899 7ff6482e81c7 47898->47899 47900 7ff6482e65d0 2 API calls 47899->47900 47900->47894 47901->47829 47902->47830 47904 7ff6483111cf 47903->47904 47906 7ff6483111f9 47903->47906 47905 7ff6483111d4 _errno 47904->47905 47914 7ff6483111e7 47904->47914 47905->47848 47907 7ff6482e8e80 13 API calls 47906->47907 47908 7ff648311268 47907->47908 47909 7ff6483112b4 _errno 47908->47909 47910 7ff648311287 47908->47910 47909->47910 47911 7ff64831f580 8 API calls 47910->47911 47912 7ff6483112cf 47911->47912 47912->47848 47913 7ff6482e8e80 13 API calls 47913->47914 47914->47913 47915 7ff64831155a 47914->47915 47919 7ff6483114e0 47914->47919 47930 7ff648311210 14 API calls 47915->47930 47917 7ff648311509 47920 7ff64831f580 8 API calls 47917->47920 47918 7ff648311573 _errno 47918->47917 47919->47917 47919->47918 47921 7ff648311547 47920->47921 47921->47848 47922->47876 47923->47844 47924->47866 47925->47880 47926->47884 47927->47897 47928->47849 47929->47853 47930->47919 47931 7ff64831f85c 47932 7ff64831f875 47931->47932 47933 7ff64831f87d 47932->47933 47934 7ff64831f9b3 47932->47934 47936 7ff64831f9bd 47933->47936 47939 7ff64831f89b __scrt_release_startup_lock 47933->47939 48017 7ff64831fd4c 9 API calls 47934->48017 48018 7ff64831fd4c 9 API calls 47936->48018 47938 7ff64831f9c8 47941 7ff64831f9d0 _exit 47938->47941 47940 7ff64831f8c0 47939->47940 47942 7ff64831f946 _get_initial_narrow_environment __p___argv __p___argc 47939->47942 47945 7ff64831f93e _register_thread_local_exe_atexit_callback 47939->47945 47951 7ff6482d1530 rand 47942->47951 47945->47942 47952 7ff6482d1583 47951->47952 47952->47952 48019 7ff6482d0580 47952->48019 47954 7ff6482d1595 rand 47955 7ff6482d1633 SetConsoleTitleA 47954->47955 47956 7ff6482d15c0 47954->47956 47958 7ff6482d1685 8 API calls 47955->47958 47959 7ff6482d1651 47955->47959 47957 7ff6482d15c2 rand 47956->47957 47965 7ff6482d162f 47956->47965 48123 7ff6482d0680 7 API calls Concurrency::cancel_current_task 47956->48123 47957->47956 48038 7ff6482c2aa0 47958->48038 47962 7ff6482d1679 _invalid_parameter_noinfo_noreturn 47959->47962 47963 7ff6482d1680 47959->47963 47962->47963 47963->47958 47965->47955 48017->47936 48018->47938 48020 7ff6482d0671 48019->48020 48021 7ff6482d05a6 48019->48021 48146 7ff6482c1a90 ?_Xlength_error@std@@YAXPEBD 48020->48146 48022 7ff6482d05b4 memcpy 48021->48022 48023 7ff6482d05cc 48021->48023 48022->47954 48025 7ff6482d0676 48023->48025 48026 7ff6482d0634 48023->48026 48031 7ff6482d05dd 48023->48031 48147 7ff6482c19f0 __std_exception_copy Concurrency::cancel_current_task 48025->48147 48027 7ff6482d0643 48026->48027 48028 7ff6482d0639 48026->48028 48033 7ff6482d0645 memcpy 48027->48033 48145 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48028->48145 48144 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48031->48144 48033->47954 48034 7ff6482d05f3 48036 7ff6482d05f8 48034->48036 48037 7ff6482d062d _invalid_parameter_noinfo_noreturn 48034->48037 48035 7ff6482d067c 48036->48033 48037->48026 48148 7ff6482c2840 48038->48148 48040 7ff6482c2aea 48041 7ff6482c30a8 48040->48041 48161 7ff6482c3160 48040->48161 48223 7ff6482c3120 7 API calls 48041->48223 48043 7ff6482c3104 Sleep exit 48045 7ff6482c3118 48043->48045 48224 7ff6482c19f0 __std_exception_copy Concurrency::cancel_current_task 48045->48224 48046 7ff6482c2b6f 48173 7ff6482c3c30 48046->48173 48049 7ff6482c311d 48050 7ff6482c2b7c 48180 7ff6482c32d0 48050->48180 48052 7ff6482c2bac 48053 7ff6482c3c30 10 API calls 48052->48053 48054 7ff6482c2bb8 48053->48054 48188 7ff6482c33d0 48054->48188 48056 7ff6482c2beb 48057 7ff6482c3c30 10 API calls 48056->48057 48058 7ff6482c2bf8 48057->48058 48059 7ff6482c2c4f 48058->48059 48062 7ff6482c2c48 _invalid_parameter_noinfo_noreturn 48058->48062 48060 7ff6482c2c9f 48059->48060 48064 7ff6482c2c98 _invalid_parameter_noinfo_noreturn 48059->48064 48061 7ff6482c2cde 48060->48061 48065 7ff6482c2cd7 _invalid_parameter_noinfo_noreturn 48060->48065 48063 7ff6482c2d2c 48061->48063 48068 7ff6482c2d25 _invalid_parameter_noinfo_noreturn 48061->48068 48062->48059 48066 7ff6482c2d6b 48063->48066 48070 7ff6482c2d64 _invalid_parameter_noinfo_noreturn 48063->48070 48064->48060 48065->48061 48066->48045 48067 7ff6482c2db9 48066->48067 48069 7ff6482c2e1f 48066->48069 48072 7ff6482c2dfa 48066->48072 48196 7ff6482c3550 48067->48196 48068->48063 48073 7ff6482c2e24 48069->48073 48074 7ff6482c2e2b 48069->48074 48070->48066 48212 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48072->48212 48213 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48073->48213 48075 7ff6482c2e2e memcpy 48074->48075 48075->48067 48080 7ff6482c2e02 48082 7ff6482c2e18 _invalid_parameter_noinfo_noreturn 48080->48082 48083 7ff6482c2e0a 48080->48083 48082->48069 48083->48075 48123->47956 48144->48034 48145->48036 48147->48035 48149 7ff6482c2890 48148->48149 48149->48149 48150 7ff6482c28a0 system 48149->48150 48151 7ff6482c2900 48150->48151 48151->48151 48152 7ff6482c2910 system 48151->48152 48153 7ff6482c2960 48152->48153 48153->48153 48154 7ff6482c2970 system 48153->48154 48155 7ff6482c29b0 48154->48155 48155->48155 48156 7ff6482c29c0 system 48155->48156 48157 7ff6482c2a00 48156->48157 48157->48157 48158 7ff6482c2a10 system 48157->48158 48159 7ff6482c2a70 48158->48159 48159->48159 48160 7ff6482c2a80 system 48159->48160 48160->48040 48162 7ff6482c317e 48161->48162 48163 7ff6482c31c8 48162->48163 48252 7ff6482c4310 7 API calls Concurrency::cancel_current_task 48162->48252 48165 7ff6482c3227 48163->48165 48253 7ff6482c4310 7 API calls Concurrency::cancel_current_task 48163->48253 48225 7ff6482c5dd0 48165->48225 48169 7ff6482c3276 48170 7ff6482c32b7 48169->48170 48172 7ff6482c32b0 _invalid_parameter_noinfo_noreturn 48169->48172 48170->48046 48171 7ff6482c326f _invalid_parameter_noinfo_noreturn 48171->48169 48172->48170 48174 7ff6482c3c4d 48173->48174 48175 7ff6482c3c63 memcpy 48174->48175 48176 7ff6482c3ca8 48174->48176 48175->48050 48258 7ff6482c4eb0 9 API calls Concurrency::cancel_current_task 48176->48258 48179 7ff6482c3cbb 48179->48050 48181 7ff6482c32ee 48180->48181 48182 7ff6482c3338 48181->48182 48265 7ff6482c4310 7 API calls Concurrency::cancel_current_task 48181->48265 48259 7ff6482c6dd0 48182->48259 48185 7ff6482c3354 48186 7ff6482c33b7 48185->48186 48187 7ff6482c33b0 _invalid_parameter_noinfo_noreturn 48185->48187 48186->48052 48187->48186 48189 7ff6482c33ee 48188->48189 48190 7ff6482c3438 48189->48190 48267 7ff6482c4310 7 API calls Concurrency::cancel_current_task 48189->48267 48192 7ff6482c6dd0 12 API calls 48190->48192 48193 7ff6482c3454 48192->48193 48194 7ff6482c34b7 48193->48194 48195 7ff6482c34b0 _invalid_parameter_noinfo_noreturn 48193->48195 48194->48056 48195->48194 48197 7ff6482c2840 6 API calls 48196->48197 48198 7ff6482c358c 48197->48198 48268 7ff6482d1ad0 48198->48268 48200 7ff6482c3591 48201 7ff6482c359d 48200->48201 48206 7ff6482c3632 48200->48206 48297 7ff6482c4310 7 API calls Concurrency::cancel_current_task 48201->48297 48205 7ff6482c378a _invalid_parameter_noinfo_noreturn 48276 7ff6482d1b90 48206->48276 48208 7ff6482c370e 48209 7ff6482c35c1 48208->48209 48209->48205 48211 7ff6482c35f4 48209->48211 48212->48080 48213->48083 48223->48043 48224->48049 48226 7ff6482c5e6f 48225->48226 48227 7ff6482c5e1a 48225->48227 48228 7ff6482c5e77 memcpy 48226->48228 48237 7ff6482c5ecb 48226->48237 48227->48226 48235 7ff6482c5e1f memcpy 48227->48235 48230 7ff6482c5eb1 48228->48230 48231 7ff6482c5eb4 memcpy 48228->48231 48229 7ff6482c5fb1 48257 7ff6482c1a90 ?_Xlength_error@std@@YAXPEBD 48229->48257 48230->48231 48232 7ff6482c323a 48231->48232 48232->48169 48232->48171 48235->48232 48236 7ff6482c5f49 48241 7ff6482c5f4e 48236->48241 48242 7ff6482c5f56 memcpy 48236->48242 48237->48229 48237->48236 48239 7ff6482c5f27 48237->48239 48240 7ff6482c5fac 48237->48240 48254 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48239->48254 48256 7ff6482c19f0 __std_exception_copy Concurrency::cancel_current_task 48240->48256 48255 7ff64831f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48241->48255 48247 7ff6482c5f80 48242->48247 48248 7ff6482c5f83 memcpy 48242->48248 48247->48248 48248->48232 48249 7ff6482c5f2f 48250 7ff6482c5f34 48249->48250 48251 7ff6482c5f42 _invalid_parameter_noinfo_noreturn 48249->48251 48250->48242 48251->48236 48252->48163 48253->48165 48254->48249 48255->48250 48256->48229 48258->48179 48260 7ff6482c6e95 48259->48260 48263 7ff6482c6e00 memcpy memcpy memcpy 48259->48263 48266 7ff6482cc600 9 API calls Concurrency::cancel_current_task 48260->48266 48262 7ff6482c6eaa 48262->48185 48263->48185 48265->48182 48266->48262 48267->48190 48269 7ff6482d1add calloc 48268->48269 48275 7ff6482d1b40 48268->48275 48273 7ff6482d1b32 48269->48273 48271 7ff6482d1b61 48271->48200 48272 7ff6482d1b6c 48272->48200 48273->48272 48298 7ff6482e8980 48273->48298 48275->48272 48329 7ff6482e18b0 calloc 48275->48329 48277 7ff6482d1b9f 48276->48277 48278 7ff6482d1ba9 48276->48278 48277->48208 48279 7ff6482d1bc2 48278->48279 48297->48209 48299 7ff6482e899e WSAStartup 48298->48299 48300 7ff6482e89e6 48298->48300 48302 7ff6482e89b2 48299->48302 48303 7ff6482e89c9 48299->48303 48348 7ff648312480 48300->48348 48302->48300 48305 7ff6482e89c3 WSACleanup 48302->48305 48306 7ff64831f580 8 API calls 48303->48306 48305->48303 48309 7ff6482e89de 48306->48309 48309->48275 48330 7ff6482e18e5 48329->48330 48331 7ff6482e18d6 48329->48331 48374 7ff6482dadd0 calloc 48330->48374 48331->48271 48333 7ff6482e1908 48334 7ff6482e190e free 48333->48334 48335 7ff6482e191c malloc 48333->48335 48349 7ff64831248e 48348->48349 48350 7ff6482e89eb 48348->48350 48374->48333 48584 7ff6482dac10 48585 7ff6482dac64 48584->48585 48586 7ff6482dac54 48584->48586 48588 7ff6482ed7b0 2 API calls 48585->48588 48587 7ff6482ee0f0 3 API calls 48586->48587 48587->48585 48589 7ff6482daca6 48588->48589 48595 7ff6482db2b0 calloc 48589->48595 48592 7ff6482dacc5 48593 7ff6482dacce 48629 7ff6482e5970 19 API calls 48593->48629 48596 7ff6482db43e _errno 48595->48596 48597 7ff6482db301 malloc 48595->48597 48598 7ff6482dacc1 48596->48598 48599 7ff6482db38c InitializeCriticalSectionEx 48597->48599 48600 7ff6482db3b7 48597->48600 48598->48592 48598->48593 48601 7ff6482f4a60 29 API calls 48599->48601 48602 7ff6482db3e0 free 48600->48602 48603 7ff6482db3d0 DeleteCriticalSection free 48600->48603 48604 7ff6482db3af 48601->48604 48605 7ff6482db3f3 48602->48605 48606 7ff6482db3f8 48602->48606 48603->48602 48604->48600 48607 7ff6482db466 _strdup 48604->48607 48631 7ff6482f8680 free free free 48605->48631 48609 7ff6482db402 closesocket 48606->48609 48610 7ff6482db408 free 48606->48610 48607->48600 48611 7ff6482db480 free _strdup 48607->48611 48609->48610 48610->48596 48612 7ff6482db4a2 48611->48612 48613 7ff6482db4ce 48611->48613 48630 7ff6482f8d50 _beginthreadex 48612->48630 48615 7ff6482db551 free 48613->48615 48616 7ff6482db4da EnterCriticalSection LeaveCriticalSection 48613->48616 48615->48596 48618 7ff6482db515 48616->48618 48619 7ff6482db504 CloseHandle 48616->48619 48617 7ff6482db4b6 48617->48598 48620 7ff6482db4be _errno 48617->48620 48621 7ff6482db522 48618->48621 48622 7ff6482db51a 48618->48622 48624 7ff6482db538 48619->48624 48620->48613 48633 7ff6482db130 7 API calls 48621->48633 48632 7ff6482f8da0 WaitForSingleObjectEx CloseHandle 48622->48632 48625 7ff6482db548 closesocket 48624->48625 48634 7ff6482d5b00 free 48624->48634 48625->48615 48627 7ff6482db52b free 48627->48624 48629->48592 48630->48617 48631->48606 48632->48621 48633->48627 48634->48625 48635 7ff6482d792b 48636 7ff6482d7972 48635->48636 48637 7ff6482d7941 48635->48637 48638 7ff6482d7a1a 48636->48638 48639 7ff6482d7970 48636->48639 48672 7ff6482ef590 48637->48672 48641 7ff6482d7a34 48638->48641 48644 7ff6482d7ad4 48638->48644 48646 7ff6482d6d00 292 API calls 48639->48646 48670 7ff6482d727b 48639->48670 48919 7ff6482ec810 24 API calls 48641->48919 48642 7ff6482d795a 48645 7ff6482f5090 2 API calls 48642->48645 48647 7ff6482d6d00 292 API calls 48644->48647 48644->48670 48645->48639 48646->48670 48647->48670 48648 7ff6482d7a41 48649 7ff6482d6d00 292 API calls 48648->48649 48651 7ff6482d7a61 48649->48651 48652 7ff6482d7a6a 48651->48652 48653 7ff6482d7ac6 free 48651->48653 48658 7ff6482d7a81 48652->48658 48659 7ff6482d7a73 free 48652->48659 48653->48670 48654 7ff6482d8313 48924 7ff6482e5970 19 API calls 48654->48924 48655 7ff6482d8322 48657 7ff6482d84a0 17 API calls 48657->48670 48920 7ff6482ebdd0 28 API calls 48658->48920 48659->48670 48663 7ff6482e71f0 10 API calls 48663->48670 48664 7ff6482d7ab7 free 48664->48670 48665 7ff6482d7a92 48665->48664 48666 7ff6482e5970 19 API calls 48667 7ff6482d731e 48666->48667 48667->48666 48667->48670 48669 7ff6482d6d00 292 API calls 48669->48670 48670->48654 48670->48655 48670->48657 48670->48663 48670->48667 48670->48669 48918 7ff6482e5970 19 API calls 48670->48918 48921 7ff6482e1430 90 API calls 48670->48921 48922 7ff6482d5a20 15 API calls 48670->48922 48923 7ff6482f51e0 22 API calls 48670->48923 48673 7ff6482ef628 48672->48673 48674 7ff6482ef661 free _strdup 48673->48674 48677 7ff6482ef68b 48673->48677 48905 7ff6482ef63e 48673->48905 48674->48677 48674->48905 48675 7ff64831f580 8 API calls 48676 7ff6482d794b 48675->48676 48676->48636 48676->48642 48678 7ff6482ef755 48677->48678 48679 7ff6482ef741 free 48677->48679 48680 7ff6482ef774 48678->48680 48965 7ff6482e8db0 15 API calls 48678->48965 48679->48678 48682 7ff6482ef7bf free 48680->48682 48683 7ff6482ef81d 48680->48683 48680->48905 48685 7ff6482ef7d2 free 48682->48685 48692 7ff6482ef881 48683->48692 48966 7ff6482f4480 388 API calls 48683->48966 48693 7ff6482ef923 48685->48693 48694 7ff6482ef94a 48685->48694 48686 7ff6482ef869 48689 7ff6482ef870 free 48686->48689 48686->48692 48689->48905 48690 7ff6482ef8be free 48690->48685 48690->48905 48692->48690 48967 7ff6482f4480 388 API calls 48692->48967 48693->48694 48968 7ff6482e8db0 15 API calls 48693->48968 48696 7ff6482efa06 free 48694->48696 48697 7ff6482ef9ce free 48694->48697 48694->48905 48698 7ff6482ef9f5 48696->48698 48969 7ff6482e8db0 15 API calls 48697->48969 48700 7ff6482efa3d 48698->48700 48706 7ff6482efa26 48698->48706 48698->48905 48970 7ff6482dbc00 6 API calls 48700->48970 48702 7ff6482efa49 48971 7ff648313f20 59 API calls 48702->48971 48704 7ff6482efa62 48704->48706 48704->48905 48705 7ff6482efcac free 48719 7ff6482efccf 48705->48719 48706->48706 48736 7ff6482efa2b 48706->48736 48972 7ff6482dcb70 free free 48706->48972 48708 7ff6482efb38 48710 7ff6482efb7f strchr 48708->48710 48729 7ff6482efb51 48708->48729 48709 7ff6482efad0 48973 7ff6482dbe00 26 API calls 48709->48973 48712 7ff6482efb94 strchr 48710->48712 48710->48729 48717 7ff6482efba7 strchr 48712->48717 48712->48729 48713 7ff6482efdd7 48722 7ff6482efe00 48713->48722 48724 7ff6482efe3b 48713->48724 48714 7ff6482efc8c 48975 7ff6482e5970 19 API calls 48714->48975 48715 7ff6482efae5 48974 7ff6482dcb70 free free 48715->48974 48717->48729 48718 7ff6482efd05 48976 7ff6482f2090 strchr strchr strchr malloc memcpy 48718->48976 48719->48713 48719->48718 48720 7ff6482efc05 48720->48714 48720->48729 48978 7ff6482e8db0 15 API calls 48722->48978 48723 7ff6482efc9b 48723->48905 48979 7ff6482e8db0 15 API calls 48724->48979 48726 7ff6482efd0d 48730 7ff6482efd20 free 48726->48730 48731 7ff6482efd2b 48726->48731 48726->48905 48729->48705 48732 7ff6482efd7f 48730->48732 48733 7ff6482efd56 48731->48733 48738 7ff6482efd40 memcpy 48731->48738 48737 7ff6482efda3 48732->48737 48977 7ff6482e8db0 15 API calls 48732->48977 48735 7ff6482efd5b strchr 48733->48735 48734 7ff6482efe39 48734->48737 48763 7ff6482f005f 48734->48763 48734->48905 48739 7ff6482efd6b free 48735->48739 48740 7ff6482efd68 48735->48740 48736->48708 48736->48720 48736->48905 48737->48723 48737->48734 48980 7ff64830e540 23 API calls 48737->48980 48738->48735 48739->48732 48740->48739 48743 7ff6482f02f0 calloc 48746 7ff6482f031f 48743->48746 48743->48905 48744 7ff6482f0052 48748 7ff64830e510 13 API calls 48744->48748 48745 7ff6482f009e 48752 7ff6482f00da free 48745->48752 48753 7ff6482f022e 48745->48753 48754 7ff6482f00fa 48745->48754 48925 7ff6482f1960 48746->48925 48747 7ff6482f0158 48988 7ff6482e5970 19 API calls 48747->48988 48748->48723 48751 7ff6482efeb7 48751->48744 48751->48905 48981 7ff64830e680 8 API calls 48751->48981 48987 7ff6482e8db0 15 API calls 48752->48987 48753->48754 48759 7ff6482f0252 free 48753->48759 48754->48743 48754->48905 48755 7ff6482f0333 48764 7ff6482f03a0 48755->48764 48770 7ff6482f0367 48755->48770 48755->48905 48757 7ff6482f0171 48767 7ff6482f0212 48757->48767 48774 7ff6482f01cf 48757->48774 48761 7ff6482f0270 48759->48761 48762 7ff6482f027d 48759->48762 48760 7ff6482eff62 48760->48744 48768 7ff6482eff6a 48760->48768 48992 7ff6482e8db0 15 API calls 48761->48992 48762->48761 48769 7ff6482f0290 48762->48769 48763->48745 48763->48747 48763->48757 48763->48774 48765 7ff6482f03a5 48764->48765 48766 7ff6482f03ce 48764->48766 48771 7ff6482f1960 25 API calls 48765->48771 48994 7ff6482f15a0 7 API calls 48766->48994 48990 7ff6482e5970 19 API calls 48767->48990 48982 7ff64830e510 48768->48982 48991 7ff6482e8db0 15 API calls 48769->48991 48993 7ff6482f15a0 7 API calls 48770->48993 48791 7ff6482f03cc 48771->48791 48774->48745 48780 7ff6482f01f9 48774->48780 48989 7ff6482e5970 19 API calls 48780->48989 48782 7ff6482f0388 free 48782->48791 48783 7ff6482f03eb 48788 7ff6482f1960 25 API calls 48783->48788 48783->48791 48783->48905 48785 7ff6482eff72 48785->48763 48786 7ff6482f002f 48785->48786 48787 7ff6482eff9a strstr 48785->48787 48786->48763 48789 7ff6482effb2 48787->48789 48788->48791 48789->48786 48790 7ff6482e8e80 13 API calls 48789->48790 48790->48786 48792 7ff6482f1960 25 API calls 48791->48792 48791->48905 48793 7ff6482f05e0 free free free 48792->48793 48795 7ff6482f061e 48793->48795 48793->48905 48794 7ff6482f07db 48796 7ff6482f0921 48794->48796 48794->48905 48998 7ff6482f7c70 _gmtime64 48794->48998 48795->48794 48798 7ff6482f0681 48795->48798 48802 7ff6482f0765 48795->48802 48795->48905 48935 7ff6482f1a00 48796->48935 48797 7ff6482f07b0 48797->48794 48804 7ff6482f07c4 48797->48804 48797->48905 48995 7ff6482d9a20 62 API calls 48798->48995 48801 7ff6482f080d 48805 7ff6482f0813 48801->48805 48823 7ff6482f0829 48801->48823 48802->48797 48803 7ff6482f0784 48802->48803 48806 7ff6482f1960 25 API calls 48802->48806 48807 7ff6482f1960 25 API calls 48803->48807 48803->48905 48997 7ff6482f15a0 7 API calls 48804->48997 48999 7ff6482e5970 19 API calls 48805->48999 48806->48803 48807->48797 48811 7ff6482f07d8 48811->48794 48812 7ff6482f092f 48813 7ff6482f0960 48812->48813 48820 7ff6482f0d4c 48812->48820 48812->48905 48815 7ff6482f0cf3 48813->48815 48817 7ff6482f0970 48813->48817 48818 7ff6482f0a57 48813->48818 48814 7ff6482f0756 48814->48802 49009 7ff6482f15a0 7 API calls 48815->49009 48817->48815 48839 7ff6482f097a 48817->48839 48821 7ff6482f0a60 48818->48821 48840 7ff6482f0ad1 48818->48840 48819 7ff6482f0d09 48832 7ff6482f1710 62 API calls 48819->48832 48819->48905 48826 7ff6482f1960 25 API calls 48820->48826 48829 7ff6482f0da5 48820->48829 48822 7ff6482f1960 25 API calls 48821->48822 48831 7ff6482f0a70 48822->48831 48823->48796 48827 7ff6482e8e80 13 API calls 48823->48827 48823->48905 48824 7ff6482f06c8 48824->48814 48825 7ff6482f074e 48824->48825 48834 7ff6482f1960 25 API calls 48824->48834 48996 7ff6482d9990 9 API calls 48825->48996 48826->48829 48836 7ff6482f08f5 48827->48836 48828 7ff6482f0b64 48852 7ff6482f0c41 48828->48852 48868 7ff6482f0b7f 48828->48868 48830 7ff6482f0dd1 48829->48830 48837 7ff6482f1960 25 API calls 48829->48837 48829->48905 48853 7ff6482f0ec1 48830->48853 48881 7ff6482f0df4 48830->48881 48830->48905 48846 7ff6482f1710 62 API calls 48831->48846 48831->48905 48838 7ff6482f0d2c 48832->48838 48833 7ff6482f09cb 48841 7ff6482f09ef 48833->48841 48833->48905 49001 7ff6482f3f90 28 API calls 48833->49001 48834->48824 49000 7ff6482f15a0 7 API calls 48836->49000 48837->48830 48847 7ff6482f0aaf 48838->48847 48848 7ff6482f0d36 48838->48848 48839->48833 48857 7ff6482f1960 25 API calls 48839->48857 48843 7ff6482f1960 25 API calls 48840->48843 48851 7ff6482f0b20 48840->48851 49002 7ff6482f15a0 7 API calls 48841->49002 48843->48851 48845 7ff6482f1960 25 API calls 48845->48851 48854 7ff6482f0a93 48846->48854 49005 7ff6482ec9a0 17 API calls 48847->49005 49010 7ff6482e5970 19 API calls 48848->49010 48849 7ff6482f09e7 48849->48841 48849->48905 48851->48828 48851->48845 48851->48905 48883 7ff6482f0c25 48852->48883 49006 7ff6482f3f90 28 API calls 48852->49006 48896 7ff6482f0e6c 48853->48896 49011 7ff6482f3f90 28 API calls 48853->49011 48854->48847 48859 7ff6482f0a99 48854->48859 48857->48833 49004 7ff6482e5970 19 API calls 48859->49004 48862 7ff6482f0917 48862->48796 48862->48905 48865 7ff6482f0a05 48870 7ff6482f1710 62 API calls 48865->48870 48865->48905 48866 7ff6482f1081 49019 7ff6482f15a0 7 API calls 48866->49019 48867 7ff6482f0ef7 48875 7ff6482f0f11 48867->48875 48886 7ff6482f0fe8 48867->48886 48871 7ff6482f0bbf strchr 48868->48871 48868->48883 48869 7ff6482f0ac8 48869->48905 49021 7ff6482f51e0 22 API calls 48869->49021 48874 7ff6482f0a33 48870->48874 48876 7ff6482f0bd4 strchr 48871->48876 48895 7ff6482f0bf4 48871->48895 48872 7ff6482f0e37 strchr 48877 7ff6482f0e4c strchr 48872->48877 48872->48896 48878 7ff6482f0a4f 48874->48878 48879 7ff6482f0a39 48874->48879 48880 7ff6482f0f1e 48875->48880 48875->48886 48882 7ff6482f0be7 strchr 48876->48882 48876->48895 48884 7ff6482f0e5f strchr 48877->48884 48877->48896 49020 7ff6482ec9a0 17 API calls 48878->49020 49003 7ff6482e5970 19 API calls 48879->49003 49012 7ff6482f15a0 7 API calls 48880->49012 48881->48872 48881->48896 48882->48895 49007 7ff6482f15a0 7 API calls 48883->49007 48884->48896 48904 7ff6482f0f58 48886->48904 48886->48905 49017 7ff6482f15a0 7 API calls 48886->49017 48887 7ff6482f0c80 48892 7ff6482f1710 62 API calls 48887->48892 48887->48905 48890 7ff6482f1155 48899 7ff6482e5af0 15 API calls 48890->48899 48890->48905 48898 7ff6482f0cd3 48892->48898 48893 7ff6482f0f34 48902 7ff6482f0f45 48893->48902 48903 7ff6482f0f5d 48893->48903 48893->48905 48894 7ff6482f1043 48945 7ff6482f1710 48894->48945 48895->48883 48895->48905 48896->48866 48896->48867 48896->48905 48898->48878 48901 7ff6482f0cdd 48898->48901 48899->48905 49008 7ff6482e5970 19 API calls 48901->49008 49013 7ff6482f15a0 7 API calls 48902->49013 48909 7ff6482f0fa4 48903->48909 48911 7ff6482f1960 25 API calls 48903->48911 48904->48894 48904->48905 48905->48675 48909->48904 49016 7ff6482f15a0 7 API calls 48909->49016 48910 7ff6482f106b 49018 7ff6482e5970 19 API calls 48910->49018 48914 7ff6482f0f75 48911->48914 48914->48904 49014 7ff6482f15a0 7 API calls 48914->49014 48916 7ff6482f0f8c 48916->48909 49015 7ff6482f15a0 7 API calls 48916->49015 48918->48670 48919->48648 48920->48665 48921->48670 48922->48670 48923->48670 48924->48655 49022 7ff6482e8ef0 15 API calls 48925->49022 48927 7ff6482f1989 48928 7ff6482f1991 48927->48928 48929 7ff6482f19ca 48927->48929 49023 7ff6482f15a0 7 API calls 48928->49023 48930 7ff6482f19e9 48929->48930 48932 7ff6482f19d7 free free 48929->48932 48930->48755 48932->48930 48934 7ff6482f19b5 free 48934->48755 48936 7ff6482f1a2b 48935->48936 48937 7ff6482f1ab0 strchr 48936->48937 48939 7ff6482f1b18 _strdup 48936->48939 48941 7ff6482f1d0a 48936->48941 48943 7ff6482f1ce4 free 48936->48943 48944 7ff6482f1960 25 API calls 48936->48944 48937->48936 48938 7ff6482f1ac9 strchr 48937->48938 48938->48936 48939->48936 48940 7ff6482f1d29 48939->48940 48940->48941 48942 7ff6482f1d33 free free 48940->48942 48941->48812 48942->48941 48943->48936 48944->48936 48946 7ff6482f1772 48945->48946 48947 7ff6482f17da 48946->48947 48948 7ff6482f1784 48946->48948 49024 7ff6482e61c0 48947->49024 49027 7ff6482ec080 malloc 48948->49027 48951 7ff6482f1799 48953 7ff6482f17a0 48951->48953 48954 7ff6482f17bf memcpy 48951->48954 48955 7ff6482f17a5 free free 48953->48955 48956 7ff6482f17b7 48953->48956 48954->48947 48955->48956 48961 7ff6482f1061 48956->48961 48957 7ff6482f1929 free free 48957->48961 48958 7ff6482f183c 49028 7ff6482e58b0 fwrite fwrite 48958->49028 48960 7ff6482f184d 48963 7ff6482f1866 48960->48963 49029 7ff6482e58b0 fwrite fwrite 48960->49029 48961->48878 48961->48910 48962 7ff6482f186e 48962->48957 48962->48961 48963->48962 48965->48680 48966->48686 48967->48690 48968->48694 48969->48698 48970->48702 48971->48704 48972->48709 48973->48715 48974->48736 48975->48723 48976->48726 48977->48737 48978->48734 48979->48734 48980->48751 48981->48760 48983 7ff64830e530 48982->48983 48984 7ff64830e515 48982->48984 48983->48785 49052 7ff64830f4f0 12 API calls 48984->49052 48987->48754 48988->48723 48989->48723 48990->48723 48991->48754 48992->48754 48993->48782 48994->48783 48995->48824 48996->48814 48997->48811 48998->48801 48999->48723 49000->48862 49001->48849 49002->48865 49003->48905 49004->48723 49005->48869 49006->48895 49007->48887 49008->48723 49009->48819 49010->48723 49011->48896 49012->48893 49013->48904 49014->48916 49015->48909 49016->48904 49017->48904 49018->48723 49019->48886 49020->48869 49021->48890 49022->48927 49023->48934 49030 7ff6482fbc90 49024->49030 49027->48951 49028->48960 49029->48963 49031 7ff6482fbce2 49030->49031 49032 7ff6482fbd09 malloc 49030->49032 49031->49032 49034 7ff6482fbcfc 49031->49034 49033 7ff6482fbd49 49032->49033 49032->49034 49035 7ff6482fbd69 memcpy 49033->49035 49036 7ff64831f580 8 API calls 49034->49036 49045 7ff6482fbdec 49035->49045 49037 7ff6482e61f0 49036->49037 49037->48958 49037->48962 49038 7ff6482fbef9 free 49038->49034 49039 7ff6482e71f0 10 API calls 49039->49045 49040 7ff6482fbec1 49051 7ff6482e5970 19 API calls 49040->49051 49042 7ff6482f5fe0 19 API calls 49042->49045 49043 7ff6482fbed3 49043->49038 49044 7ff6482fbe9b WSAGetLastError 49050 7ff6482e5970 19 API calls 49044->49050 49045->49038 49045->49039 49045->49040 49045->49042 49045->49044 49047 7ff6482e6230 48 API calls 49045->49047 49049 7ff6482fbe8d 49045->49049 49047->49045 49048 7ff6482fbeb3 49048->49049 49049->49038 49050->49048 49051->49043 49053 7ff6482fa005 49091 7ff6482fa009 49053->49091 49054 7ff6482fa0d7 49055 7ff6482fa595 calloc 49054->49055 49056 7ff6482fa0f6 strchr 49054->49056 49057 7ff6482fa5bc 49055->49057 49058 7ff6482fa638 49055->49058 49059 7ff6482fa10f strncmp 49056->49059 49060 7ff6482fa25b 49056->49060 49165 7ff6482e5970 19 API calls 49057->49165 49072 7ff6482fa694 CertFreeCertificateContext 49058->49072 49073 7ff6482fa69a 49058->49073 49062 7ff6482fa150 strncmp 49059->49062 49092 7ff6482fa12c 49059->49092 49064 7ff6482fa36e fopen 49060->49064 49065 7ff6482fa61b 49060->49065 49063 7ff6482fa172 strncmp 49062->49063 49062->49092 49070 7ff6482fa194 strncmp 49063->49070 49063->49092 49064->49065 49074 7ff6482fa387 fseek 49064->49074 49167 7ff6482e5970 19 API calls 49065->49167 49066 7ff6482fa5cb 49068 7ff6482fa5d9 CertFreeCertificateContext 49066->49068 49118 7ff6482fa856 49066->49118 49067 7ff6482fa229 strchr 49067->49060 49069 7ff6482fa243 _strdup 49067->49069 49068->49118 49069->49060 49083 7ff6482fa263 49069->49083 49078 7ff6482fa1b3 strncmp 49070->49078 49070->49092 49072->49073 49079 7ff6482fa703 49073->49079 49080 7ff6482fa69e 49073->49080 49075 7ff6482fa3b1 ftell 49074->49075 49076 7ff6482fa3bd 49074->49076 49075->49076 49081 7ff6482fa3ce fseek 49076->49081 49082 7ff6482fa5e9 fclose 49076->49082 49077 7ff6482fa090 strtol 49084 7ff6482fa0b2 strchr 49077->49084 49077->49091 49078->49067 49085 7ff6482fa1ca strncmp 49078->49085 49094 7ff6482f7900 13 API calls 49079->49094 49168 7ff6482d1d10 22 API calls 49080->49168 49081->49082 49089 7ff6482fa3eb malloc 49081->49089 49166 7ff6482e5970 19 API calls 49082->49166 49083->49060 49083->49083 49099 7ff6482fa284 CertOpenStore 49083->49099 49084->49054 49084->49091 49085->49092 49093 7ff6482fa1e9 strncmp 49085->49093 49087 7ff64831f580 8 API calls 49096 7ff6482faa0c 49087->49096 49089->49082 49098 7ff6482fa404 fread 49089->49098 49090 7ff6482f9430 306 API calls 49090->49091 49091->49054 49091->49077 49091->49084 49091->49090 49107 7ff6482fa137 49091->49107 49092->49067 49093->49092 49100 7ff6482fa208 strncmp 49093->49100 49101 7ff6482fa71c 49094->49101 49095 7ff6482fa6b2 49169 7ff6482e5970 19 API calls 49095->49169 49097 7ff6482fa608 free 49097->49118 49098->49082 49104 7ff6482fa422 fclose 49098->49104 49105 7ff6482fa2d7 free CryptStringToBinaryA 49099->49105 49106 7ff6482fa2a7 GetLastError 49099->49106 49100->49060 49100->49092 49108 7ff6482fa72f 49101->49108 49117 7ff6482f7900 13 API calls 49101->49117 49103 7ff6482fa6c4 free 49110 7ff6482fa146 49103->49110 49103->49118 49112 7ff6482fa44f malloc 49104->49112 49113 7ff6482fa43f 49104->49113 49115 7ff6482fa322 CertFindCertificateInStore 49105->49115 49116 7ff6482fa561 CertCloseStore 49105->49116 49161 7ff6482e5970 19 API calls 49106->49161 49160 7ff6482e5970 19 API calls 49107->49160 49111 7ff6482e5af0 15 API calls 49108->49111 49119 7ff6482fa742 49108->49119 49110->49118 49111->49119 49121 7ff6482fa493 PFXImportCertStore free free 49112->49121 49122 7ff6482fa469 MultiByteToWideChar 49112->49122 49113->49112 49123 7ff6482fa354 49115->49123 49124 7ff6482fa57a CertCloseStore 49115->49124 49116->49118 49117->49108 49118->49087 49125 7ff6482e5af0 15 API calls 49119->49125 49128 7ff6482fa78b 49119->49128 49120 7ff6482fa2c6 free 49120->49118 49131 7ff6482fa4c4 GetLastError 49121->49131 49132 7ff6482fa51a CertFindCertificateInStore 49121->49132 49122->49121 49123->49116 49124->49055 49125->49128 49126 7ff6482fa7ed calloc 49129 7ff6482fa860 49126->49129 49130 7ff6482fa847 49126->49130 49128->49126 49129->49118 49141 7ff6482fa96c 49129->49141 49142 7ff6482fa8c9 free 49129->49142 49170 7ff6482e5970 19 API calls 49130->49170 49136 7ff6482fa501 49131->49136 49137 7ff6482fa4d9 49131->49137 49133 7ff6482fa542 GetLastError 49132->49133 49134 7ff6482fa576 49132->49134 49164 7ff6482e5970 19 API calls 49133->49164 49134->49124 49163 7ff6482e5970 19 API calls 49136->49163 49162 7ff6482e5970 19 API calls 49137->49162 49145 7ff6482e6230 48 API calls 49141->49145 49143 7ff6482fa8fa 49142->49143 49144 7ff6482fa946 49142->49144 49146 7ff6482fa902 49143->49146 49147 7ff6482fa920 49143->49147 49175 7ff6482d1d10 22 API calls 49144->49175 49148 7ff6482fa98d 49145->49148 49171 7ff6482d1d10 22 API calls 49146->49171 49173 7ff6482d1d10 22 API calls 49147->49173 49148->49118 49157 7ff6482fa9e9 49148->49157 49150 7ff6482fa950 49176 7ff6482e5970 19 API calls 49150->49176 49154 7ff6482fa909 49172 7ff6482e5970 19 API calls 49154->49172 49155 7ff6482fa92a 49174 7ff6482e5970 19 API calls 49155->49174 49177 7ff6482e5970 19 API calls 49157->49177 49160->49110 49161->49120 49162->49110 49163->49110 49164->49116 49165->49066 49166->49097 49167->49110 49168->49095 49169->49103 49170->49118 49171->49154 49172->49110 49173->49155 49174->49110 49175->49150 49176->49110 49177->49118 49178 7ff6482eebe0 49179 7ff6482eec2e 49178->49179 49180 7ff6482eef50 18 API calls 49179->49180 49181 7ff6482eec4b 49180->49181 49182 7ff6482e5af0 15 API calls 49181->49182 49188 7ff6482eec67 49181->49188 49182->49188 49183 7ff6482eedb5 49185 7ff64831f580 8 API calls 49183->49185 49184 7ff6482f7900 13 API calls 49186 7ff6482eece6 49184->49186 49187 7ff6482eede2 49185->49187 49189 7ff6482eecea 49186->49189 49190 7ff6482eed0b 49186->49190 49188->49183 49188->49184 49212 7ff6482f88b0 15 API calls 49189->49212 49192 7ff6482f7900 13 API calls 49190->49192 49194 7ff6482eed1d 49192->49194 49193 7ff6482eecff 49193->49190 49195 7ff6482eedfa 49193->49195 49196 7ff6482eed21 49194->49196 49201 7ff6482eed42 49194->49201 49197 7ff6482eee04 49195->49197 49213 7ff6482f88b0 15 API calls 49196->49213 49217 7ff6482ee160 27 API calls 49197->49217 49200 7ff6482eed36 49200->49195 49200->49201 49201->49183 49206 7ff6482eed73 49201->49206 49214 7ff6483129b0 585 API calls 49201->49214 49202 7ff6482eee26 49203 7ff6482eedae 49202->49203 49218 7ff6482f8680 free free free 49202->49218 49203->49183 49206->49195 49207 7ff6482eed90 49206->49207 49207->49183 49208 7ff6482eedb0 49207->49208 49209 7ff6482eeda9 49207->49209 49216 7ff6482dae00 51 API calls 49208->49216 49215 7ff648312bb0 314 API calls 49209->49215 49212->49193 49213->49200 49214->49206 49215->49203 49216->49183 49217->49202 49218->49203 49219 7ff6482f91e0 49220 7ff648312480 26 API calls 49219->49220 49221 7ff6482f91e9 49220->49221 49222 7ff6482db1a0 49223 7ff6482e8e80 13 API calls 49222->49223 49224 7ff6482db1df 49223->49224 49241 7ff6482f86d0 getaddrinfo 49224->49241 49227 7ff6482db1fb WSAGetLastError 49229 7ff6482db205 WSAGetLastError 49227->49229 49230 7ff6482db21a 49227->49230 49228 7ff6482db21d EnterCriticalSection 49231 7ff6482db22c LeaveCriticalSection 49228->49231 49232 7ff6482db248 49228->49232 49229->49228 49230->49228 49259 7ff6482db130 7 API calls 49231->49259 49234 7ff6482db252 send 49232->49234 49235 7ff6482db276 LeaveCriticalSection 49232->49235 49234->49235 49238 7ff6482db26d WSAGetLastError 49234->49238 49236 7ff6482db286 49235->49236 49239 7ff64831f580 8 API calls 49236->49239 49237 7ff6482db23d free 49237->49236 49238->49235 49240 7ff6482db295 49239->49240 49243 7ff6482db1f5 49241->49243 49244 7ff6482f8703 49241->49244 49242 7ff6482f8874 WSASetLastError 49242->49243 49243->49227 49243->49228 49244->49242 49245 7ff6482f87ee 49244->49245 49246 7ff6482f8759 malloc 49244->49246 49247 7ff6482f8831 freeaddrinfo 49245->49247 49248 7ff6482f8837 49245->49248 49251 7ff6482f8770 malloc 49246->49251 49252 7ff6482f881c 49246->49252 49247->49248 49249 7ff6482f886f 49248->49249 49250 7ff6482f883c 49248->49250 49249->49242 49249->49243 49250->49243 49253 7ff6482f8841 free free free 49250->49253 49254 7ff6482f880b free 49251->49254 49255 7ff6482f87a7 memcpy 49251->49255 49252->49245 49253->49243 49253->49253 49254->49245 49256 7ff6482f87bf _strdup 49255->49256 49257 7ff6482f87ce 49255->49257 49256->49257 49258 7ff6482f87f0 free free 49256->49258 49257->49244 49258->49245 49259->49237 49260 7ff6482d777b 49261 7ff6482d778e 49260->49261 49262 7ff6482d7847 49261->49262 49264 7ff6482eb6d0 458 API calls 49261->49264 49265 7ff6482d7796 49261->49265 49263 7ff6482d77d3 49262->49263 49262->49265 49266 7ff6482d6d00 292 API calls 49263->49266 49268 7ff6482d77cd 49264->49268 49281 7ff6482d727b 49265->49281 49302 7ff6482eb580 free 49265->49302 49266->49281 49268->49262 49268->49263 49268->49265 49283 7ff6482f12d0 49268->49283 49270 7ff6482d8322 49271 7ff6482d8313 49306 7ff6482e5970 19 API calls 49271->49306 49273 7ff6482d84a0 17 API calls 49273->49281 49276 7ff6482e71f0 10 API calls 49276->49281 49277 7ff6482d731e 49279 7ff6482e5970 19 API calls 49277->49279 49277->49281 49279->49277 49280 7ff6482d6d00 292 API calls 49280->49281 49281->49270 49281->49271 49281->49273 49281->49276 49281->49277 49281->49280 49301 7ff6482e5970 19 API calls 49281->49301 49303 7ff6482e1430 90 API calls 49281->49303 49304 7ff6482d5a20 15 API calls 49281->49304 49305 7ff6482f51e0 22 API calls 49281->49305 49284 7ff6482f12fc 49283->49284 49285 7ff6482eb6d0 458 API calls 49284->49285 49289 7ff6482f1306 49285->49289 49286 7ff6482f1436 49287 7ff64831f580 8 API calls 49286->49287 49288 7ff6482f1462 49287->49288 49288->49262 49289->49286 49290 7ff6482f141c 49289->49290 49291 7ff6482f1357 49289->49291 49290->49286 49292 7ff6482dfb70 306 API calls 49290->49292 49293 7ff6482e8e80 13 API calls 49291->49293 49292->49286 49294 7ff6482f13c8 calloc 49293->49294 49295 7ff6482f13e0 49294->49295 49296 7ff6482f13e7 49294->49296 49295->49286 49297 7ff6482f1960 25 API calls 49296->49297 49298 7ff6482f13f6 49297->49298 49298->49286 49299 7ff6482f1710 62 API calls 49298->49299 49300 7ff6482f1418 49299->49300 49300->49286 49300->49290 49301->49281 49302->49281 49303->49281 49304->49281 49305->49281 49306->49270 49307 7ff6482d743c 49308 7ff6482f5090 2 API calls 49307->49308 49309 7ff6482d7449 49308->49309 49310 7ff6482d7465 49309->49310 49365 7ff6482d57f0 17 API calls 49309->49365 49312 7ff6482d7481 49310->49312 49366 7ff6482d57f0 17 API calls 49310->49366 49334 7ff6482e1190 free free 49312->49334 49315 7ff6482d7491 49316 7ff6482e5af0 15 API calls 49315->49316 49319 7ff6482d74e7 49315->49319 49331 7ff6482d727b 49315->49331 49317 7ff6482d74db 49316->49317 49318 7ff6482d84a0 17 API calls 49317->49318 49318->49319 49319->49331 49367 7ff6482eb580 free 49319->49367 49322 7ff6482d8322 49323 7ff6482d8313 49371 7ff6482e5970 19 API calls 49323->49371 49325 7ff6482d84a0 17 API calls 49325->49331 49328 7ff6482e71f0 10 API calls 49328->49331 49329 7ff6482e5970 19 API calls 49330 7ff6482d731e 49329->49330 49330->49329 49330->49331 49331->49322 49331->49323 49331->49325 49331->49328 49331->49330 49333 7ff6482d6d00 292 API calls 49331->49333 49364 7ff6482e5970 19 API calls 49331->49364 49368 7ff6482e1430 90 API calls 49331->49368 49369 7ff6482d5a20 15 API calls 49331->49369 49370 7ff6482f51e0 22 API calls 49331->49370 49333->49331 49335 7ff6482e0f70 292 API calls 49334->49335 49336 7ff6482e11ea 49335->49336 49337 7ff6482e0f70 292 API calls 49336->49337 49338 7ff6482e11f6 memset 49337->49338 49372 7ff6482e2920 49338->49372 49341 7ff6482f5090 2 API calls 49344 7ff6482e125f 49341->49344 49343 7ff6482e123d 49343->49315 49344->49343 49345 7ff6482e128b free 49344->49345 49349 7ff6482e12b2 49344->49349 49462 7ff6482e8db0 15 API calls 49345->49462 49346 7ff6482ed7b0 2 API calls 49348 7ff6482e1300 49346->49348 49350 7ff6482e1314 49348->49350 49351 7ff6482e133d 49348->49351 49349->49346 49352 7ff6482e12be 49349->49352 49353 7ff6482e6780 667 API calls 49350->49353 49354 7ff6482f5090 2 API calls 49351->49354 49352->49343 49463 7ff6482e1430 90 API calls 49352->49463 49355 7ff6482e132a 49353->49355 49356 7ff6482e134a 49354->49356 49355->49352 49357 7ff6482e13f7 49355->49357 49359 7ff6482e136d 49356->49359 49360 7ff6482f5090 2 API calls 49356->49360 49358 7ff6482ed7b0 2 API calls 49357->49358 49358->49343 49361 7ff6482e7300 47 API calls 49359->49361 49360->49359 49362 7ff6482e1387 49361->49362 49362->49357 49363 7ff6482e5af0 15 API calls 49362->49363 49363->49357 49364->49331 49365->49310 49366->49312 49367->49331 49368->49331 49369->49331 49370->49331 49371->49322 49373 7ff6482e2965 49372->49373 49374 7ff6482e2989 49373->49374 49464 7ff6482e2120 calloc 49373->49464 49377 7ff64831f580 8 API calls 49374->49377 49376 7ff6482e299b 49376->49374 49479 7ff6482e4590 49376->49479 49378 7ff6482e1225 49377->49378 49378->49341 49378->49343 49378->49352 49381 7ff6482e29d2 _strdup 49381->49374 49382 7ff6482e29e4 49381->49382 49383 7ff6482e2a02 49382->49383 49384 7ff6482e29f0 _strdup 49382->49384 49529 7ff6482e3330 49383->49529 49384->49374 49384->49383 49388 7ff6482e8e80 13 API calls 49389 7ff6482e2a75 49388->49389 49389->49374 49588 7ff6482e3b80 49389->49588 49390 7ff6482e2ac7 49390->49374 49391 7ff6482e2b22 49390->49391 49392 7ff6482e2b0c _strdup 49390->49392 49393 7ff6482e2b45 49391->49393 49394 7ff6482e2b2c _strdup 49391->49394 49392->49374 49392->49391 49604 7ff6482e3ff0 49393->49604 49394->49374 49394->49393 49399 7ff6482e2b92 49399->49374 49400 7ff6482e2bb4 49399->49400 49402 7ff6482e16c0 38 API calls 49399->49402 49400->49374 49403 7ff6482e16c0 38 API calls 49400->49403 49404 7ff6482e2bd6 49400->49404 49401 7ff6482e16c0 38 API calls 49401->49399 49402->49400 49403->49404 49404->49374 49405 7ff6482e2d6f 49404->49405 49409 7ff6482e2cd4 49404->49409 49626 7ff6482deea0 49405->49626 49407 7ff6482e2f0a 49407->49374 49408 7ff6482deea0 8 API calls 49407->49408 49412 7ff6482e2f21 49408->49412 49410 7ff6482e2cf4 49409->49410 49411 7ff6482e2d5f 49409->49411 49707 7ff6482ddde0 17 API calls 49410->49707 49414 7ff6482e1790 2 API calls 49411->49414 49412->49374 49650 7ff6482e4a50 49412->49650 49414->49374 49415 7ff6482e2d0a 49415->49374 49418 7ff6482e54c0 17 API calls 49415->49418 49425 7ff6482e2d1c 49418->49425 49419 7ff6482e3014 49460 7ff6482e30c1 49419->49460 49711 7ff6482de380 13 API calls 49419->49711 49420 7ff6482e2d22 49420->49374 49422 7ff6482e2f79 49422->49419 49426 7ff6482e2f81 49422->49426 49423 7ff6482e5af0 15 API calls 49428 7ff6482e30d0 49423->49428 49425->49420 49708 7ff6482ec9a0 17 API calls 49425->49708 49710 7ff6482e5170 34 API calls 49426->49710 49714 7ff6482e25b0 44 API calls 49428->49714 49430 7ff6482e2f91 free free 49432 7ff6482e2fb8 49430->49432 49435 7ff6482e5af0 15 API calls 49432->49435 49433 7ff6482e3066 49441 7ff6482e30ab 49433->49441 49712 7ff6482de130 QueryPerformanceCounter GetTickCount 49433->49712 49439 7ff6482e300f 49435->49439 49436 7ff6482e314c 49717 7ff6482ddde0 17 API calls 49436->49717 49438 7ff6482e308d 49444 7ff6482e30a0 49438->49444 49445 7ff6482e30ad 49438->49445 49670 7ff6482e1790 49439->49670 49440 7ff6482e315b 49440->49374 49450 7ff6482e3181 49440->49450 49455 7ff6482e5af0 15 API calls 49440->49455 49441->49436 49715 7ff6482de200 QueryPerformanceCounter GetTickCount 49441->49715 49443 7ff6482e31cb 49674 7ff6482e54c0 49443->49674 49713 7ff6482e1430 90 API calls 49444->49713 49451 7ff6482e5af0 15 API calls 49445->49451 49447 7ff6482e3135 49452 7ff6482e3141 49447->49452 49453 7ff6482e331b 49447->49453 49450->49439 49458 7ff6482e5af0 15 API calls 49450->49458 49451->49460 49716 7ff6482e1430 90 API calls 49452->49716 49457 7ff6482e5af0 15 API calls 49453->49457 49455->49450 49457->49460 49461 7ff6482e31af 49458->49461 49460->49423 49461->49439 49462->49349 49463->49343 49465 7ff6482e2145 49464->49465 49466 7ff6482e2150 calloc 49464->49466 49465->49376 49467 7ff6482e23c1 free 49466->49467 49468 7ff6482e217a 49466->49468 49467->49376 49469 7ff6482ed7b0 2 API calls 49468->49469 49470 7ff6482e2211 49469->49470 49471 7ff6482ed7b0 2 API calls 49470->49471 49472 7ff6482e2225 49471->49472 49473 7ff6482e23fd 49472->49473 49474 7ff6482e2387 _strdup 49472->49474 49476 7ff6482ed7b0 2 API calls 49473->49476 49474->49473 49475 7ff6482e2399 49474->49475 49478 7ff6482e23a7 free free 49475->49478 49477 7ff6482e243d 49476->49477 49477->49376 49478->49467 49718 7ff6482e5570 8 API calls 49479->49718 49482 7ff6482e45b0 49721 7ff64830e540 23 API calls 49482->49721 49483 7ff6482e45b7 49722 7ff64830e500 calloc 49483->49722 49486 7ff6482e45bc 49492 7ff6482e4632 49486->49492 49524 7ff6482e29bc 49486->49524 49723 7ff64830e170 tolower 49486->49723 49487 7ff6482e45b5 49487->49486 49489 7ff6482e46f5 49726 7ff64830e680 8 API calls 49489->49726 49490 7ff6482e45ff 49490->49492 49493 7ff6482e460b free 49490->49493 49494 7ff6482e4618 49490->49494 49492->49489 49492->49524 49725 7ff64830e680 8 API calls 49492->49725 49493->49494 49724 7ff6482e8db0 15 API calls 49494->49724 49495 7ff6482e475c 49727 7ff6482e5970 19 API calls 49495->49727 49499 7ff6482e46dc 49499->49489 49501 7ff6482e46e8 free 49499->49501 49499->49524 49500 7ff6482e476e 49500->49524 49501->49489 49502 7ff6482e471e 49502->49495 49503 7ff6482e4794 49502->49503 49502->49524 49728 7ff64830e680 8 API calls 49503->49728 49505 7ff6482e47bb 49506 7ff6482e47c5 _strdup 49505->49506 49507 7ff6482e47e2 49505->49507 49506->49507 49506->49524 49507->49524 49729 7ff64830e680 8 API calls 49507->49729 49509 7ff6482e4805 49510 7ff6482e480f _strdup 49509->49510 49511 7ff6482e4828 49509->49511 49510->49511 49510->49524 49511->49524 49730 7ff64830e680 8 API calls 49511->49730 49513 7ff6482e4848 49514 7ff6482e4852 _strdup 49513->49514 49515 7ff6482e48dd 49513->49515 49514->49515 49514->49524 49515->49524 49731 7ff64830e680 8 API calls 49515->49731 49517 7ff6482e48f8 49517->49524 49732 7ff64830e680 8 API calls 49517->49732 49519 7ff6482e492d 49519->49524 49733 7ff64830e680 8 API calls 49519->49733 49521 7ff6482e4971 49522 7ff6482e4975 49521->49522 49523 7ff6482e4991 strtoul 49521->49523 49522->49524 49734 7ff64830e680 8 API calls 49522->49734 49523->49522 49524->49374 49524->49381 49524->49382 49526 7ff6482e4a0d _strdup 49526->49524 49527 7ff6482e49d0 49527->49526 49527->49527 49735 7ff6482e5640 20 API calls 49527->49735 49530 7ff6482e344d 49529->49530 49531 7ff6482e337d memset memset 49529->49531 49532 7ff6482e3480 49530->49532 49533 7ff6482e3459 _strdup 49530->49533 49534 7ff6482e33b0 strncpy 49531->49534 49535 7ff6482e33c8 49531->49535 49539 7ff6482e349f 49532->49539 49540 7ff6482e348c _strdup 49532->49540 49533->49532 49538 7ff6482e3467 49533->49538 49534->49535 49536 7ff6482e33d4 strncpy 49535->49536 49537 7ff6482e33ef 49535->49537 49536->49537 49736 7ff6482fc080 malloc strtoul free 49537->49736 49738 7ff6482e5970 19 API calls 49538->49738 49563 7ff6482e34fe 49539->49563 49739 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49539->49739 49540->49538 49540->49539 49544 7ff6482e340f 49547 7ff6482e343c 49544->49547 49737 7ff6482fc080 malloc strtoul free 49544->49737 49545 7ff6482e3476 49548 7ff6482e39a7 free free 49545->49548 49546 7ff6482e34c0 49549 7ff6482e34dc 49546->49549 49740 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49546->49740 49547->49530 49547->49548 49552 7ff64831f580 8 API calls 49548->49552 49556 7ff6482e5af0 15 API calls 49549->49556 49549->49563 49551 7ff6482e3761 free 49553 7ff6482e379e 49551->49553 49554 7ff6482e3771 49551->49554 49557 7ff6482e2a17 49552->49557 49559 7ff6482e37c8 49553->49559 49564 7ff6482e37b8 free 49553->49564 49554->49553 49558 7ff6482e3792 free 49554->49558 49556->49563 49557->49374 49557->49388 49557->49389 49558->49553 49565 7ff6482e37cd 49559->49565 49745 7ff6482e4240 47 API calls 49559->49745 49560 7ff6482e36a9 49741 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49560->49741 49561 7ff6482e3656 49561->49551 49561->49560 49566 7ff6482e3690 tolower 49561->49566 49562 7ff6482e37e4 free free free 49573 7ff6482e37d7 49562->49573 49563->49561 49563->49562 49563->49563 49570 7ff6482e356e strchr 49563->49570 49583 7ff6482e3587 49563->49583 49564->49559 49565->49573 49586 7ff6482e3881 49565->49586 49746 7ff6482e4240 47 API calls 49565->49746 49566->49560 49566->49566 49569 7ff6482e382f free 49569->49565 49569->49573 49570->49561 49570->49583 49572 7ff6482e370c 49575 7ff6482e373f 49572->49575 49743 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49572->49743 49573->49548 49574 7ff6482e3863 free 49574->49573 49574->49586 49577 7ff6482e5af0 15 API calls 49575->49577 49578 7ff6482e375c 49575->49578 49577->49578 49578->49551 49579 7ff6482e36d0 49579->49572 49742 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49579->49742 49580 7ff6482e3728 49580->49575 49744 7ff6482fbf40 realloc GetEnvironmentVariableA realloc free 49580->49744 49581 7ff6482e35b0 strchr 49581->49583 49583->49561 49583->49562 49583->49581 49585 7ff6482e35e0 strchr 49583->49585 49585->49583 49586->49573 49587 7ff6482e38f7 free 49586->49587 49587->49573 49589 7ff6482e3bb1 49588->49589 49590 7ff6482e3be4 49588->49590 49589->49590 49595 7ff6482e3bc4 free 49589->49595 49596 7ff6482e3bd0 49589->49596 49591 7ff6482e3c1b 49590->49591 49592 7ff6482e3bf9 free _strdup 49590->49592 49593 7ff6482e3c2f free _strdup 49591->49593 49594 7ff6482e3c51 49591->49594 49592->49591 49602 7ff6482e3d18 49592->49602 49593->49594 49593->49602 49597 7ff6482e3c65 free _strdup 49594->49597 49599 7ff6482e3c8f 49594->49599 49595->49596 49596->49590 49598 7ff6482e3bd8 free 49596->49598 49597->49599 49597->49602 49598->49590 49599->49602 49747 7ff648310430 36 API calls 49599->49747 49601 7ff6482e3cfe 49601->49602 49603 7ff6482e5af0 15 API calls 49601->49603 49602->49390 49603->49602 49611 7ff6482e4020 49604->49611 49606 7ff6482e40f8 strchr 49607 7ff6482e410d strtol 49606->49607 49606->49611 49607->49611 49609 7ff6482e2b57 49609->49374 49614 7ff6482e16c0 49609->49614 49610 7ff6482e419a free 49610->49611 49611->49606 49611->49609 49611->49610 49612 7ff6482e5af0 15 API calls 49611->49612 49613 7ff6482e40c7 free 49611->49613 49748 7ff6482e8db0 15 API calls 49611->49748 49749 7ff6482e3df0 22 API calls 49611->49749 49612->49611 49613->49610 49613->49611 49616 7ff6482e16f5 49614->49616 49621 7ff6482e170f 49614->49621 49615 7ff64831f580 8 API calls 49617 7ff6482e1721 49615->49617 49616->49621 49750 7ff648310380 18 API calls 49616->49750 49617->49374 49617->49399 49617->49401 49619 7ff6482e1748 49620 7ff6482e175b GetLastError 49619->49620 49619->49621 49751 7ff6482d2640 21 API calls 49620->49751 49621->49615 49623 7ff6482e1773 49752 7ff6482e5970 19 API calls 49623->49752 49625 7ff6482e1789 49625->49621 49627 7ff6482def05 49626->49627 49628 7ff6482deee6 _strdup 49626->49628 49630 7ff6482def12 _strdup 49627->49630 49631 7ff6482def31 49627->49631 49628->49627 49629 7ff6482deef5 49628->49629 49629->49407 49630->49631 49632 7ff6482def21 49630->49632 49633 7ff6482def3e _strdup 49631->49633 49634 7ff6482def5d 49631->49634 49632->49407 49633->49634 49635 7ff6482def4d 49633->49635 49636 7ff6482def6a _strdup 49634->49636 49637 7ff6482def89 49634->49637 49635->49407 49636->49637 49638 7ff6482def79 49636->49638 49639 7ff6482defb5 49637->49639 49640 7ff6482def96 _strdup 49637->49640 49638->49407 49642 7ff6482defc2 _strdup 49639->49642 49643 7ff6482defe1 49639->49643 49640->49639 49641 7ff6482defa5 49640->49641 49641->49407 49642->49643 49644 7ff6482defd1 49642->49644 49645 7ff6482defee _strdup 49643->49645 49646 7ff6482df00d 49643->49646 49644->49407 49645->49646 49647 7ff6482deffd 49645->49647 49648 7ff6482df01a _strdup 49646->49648 49649 7ff6482df029 49646->49649 49647->49407 49648->49649 49649->49407 49651 7ff6482ed7b0 2 API calls 49650->49651 49657 7ff6482e4a63 49651->49657 49652 7ff6482e2f37 49652->49419 49709 7ff6482e0600 15 API calls 49652->49709 49654 7ff6482ee520 9 API calls 49654->49657 49657->49652 49657->49654 49661 7ff6482e4b37 49657->49661 49753 7ff6482eeee0 free free free free 49657->49753 49754 7ff648310d10 8 API calls 49657->49754 49755 7ff648310920 7 API calls 49657->49755 49658 7ff6482e5af0 15 API calls 49658->49661 49660 7ff6482e65d0 closesocket free 49660->49661 49661->49658 49661->49660 49662 7ff6482e4bd6 30 API calls 49661->49662 49756 7ff6482dac00 16 API calls 49661->49756 49757 7ff6482e28a0 free free 49662->49757 49664 7ff6482e4e36 49665 7ff6482e4e44 free 49664->49665 49758 7ff6482df050 8 API calls 49665->49758 49667 7ff6482e4e64 49759 7ff6482df050 8 API calls 49667->49759 49669 7ff6482e4e70 free free free 49669->49657 49671 7ff6482e179e 49670->49671 49672 7ff6482ed7b0 2 API calls 49671->49672 49673 7ff6482e1808 49672->49673 49673->49443 49675 7ff6482e54dc 49674->49675 49707->49415 49708->49411 49709->49422 49710->49430 49711->49433 49712->49438 49713->49441 49714->49374 49715->49447 49716->49436 49717->49440 49719 7ff64830e510 13 API calls 49718->49719 49720 7ff6482e45a4 49719->49720 49720->49482 49720->49483 49721->49487 49723->49490 49724->49492 49725->49499 49726->49502 49727->49500 49728->49505 49729->49509 49730->49513 49731->49517 49732->49519 49733->49521 49734->49527 49735->49526 49736->49544 49737->49547 49738->49545 49739->49546 49740->49549 49741->49579 49742->49572 49743->49580 49744->49575 49745->49569 49746->49574 49747->49601 49748->49611 49749->49611 49750->49619 49751->49623 49752->49625 49753->49657 49756->49661 49757->49664 49758->49667 49759->49669 49765 7ff6482d7df8 49766 7ff6482d7e11 49765->49766 49767 7ff6482d7e9f 49766->49767 49770 7ff6482d8074 49766->49770 49806 7ff6482ec510 49767->49806 49850 7ff6482d57f0 17 API calls 49770->49850 49773 7ff6482d7ec4 49774 7ff6482d7f60 49773->49774 49776 7ff6482d7ece 49773->49776 49779 7ff6482d7ef5 49773->49779 49775 7ff6482d8011 49774->49775 49778 7ff6482d7f68 49774->49778 49803 7ff6482d727b 49775->49803 49849 7ff6482d57f0 17 API calls 49775->49849 49780 7ff6482d6d00 292 API calls 49776->49780 49778->49779 49783 7ff6482d7f7e 49778->49783 49784 7ff6482d7feb free 49778->49784 49785 7ff6482d6d00 292 API calls 49779->49785 49780->49803 49782 7ff6482d8322 49788 7ff6482d7f8b free 49783->49788 49783->49803 49784->49779 49786 7ff6482d7f13 49785->49786 49847 7ff6482ebdd0 28 API calls 49786->49847 49787 7ff6482d8313 49854 7ff6482e5970 19 API calls 49787->49854 49848 7ff6482ebdd0 28 API calls 49788->49848 49791 7ff6482d84a0 17 API calls 49791->49803 49793 7ff6482d7fb3 free 49796 7ff6482d7fc9 49793->49796 49793->49803 49795 7ff6482d7f44 free 49795->49803 49799 7ff6482d6d00 292 API calls 49796->49799 49798 7ff6482e71f0 10 API calls 49798->49803 49799->49803 49800 7ff6482d7f22 49800->49795 49801 7ff6482e5970 19 API calls 49802 7ff6482d731e 49801->49802 49802->49801 49802->49803 49803->49782 49803->49787 49803->49791 49803->49798 49803->49802 49805 7ff6482d6d00 292 API calls 49803->49805 49845 7ff6482e5970 19 API calls 49803->49845 49851 7ff6482e1430 90 API calls 49803->49851 49852 7ff6482d5a20 15 API calls 49803->49852 49853 7ff6482f51e0 22 API calls 49803->49853 49805->49803 49807 7ff6482ec561 49806->49807 49808 7ff6482ec5af 49807->49808 49809 7ff6482f5fe0 19 API calls 49807->49809 49810 7ff6482ec5cd 49808->49810 49811 7ff6482ec5b6 49808->49811 49809->49808 49813 7ff6482ec5f9 49810->49813 49855 7ff6482ecc20 49810->49855 49888 7ff6482e5970 19 API calls 49811->49888 49814 7ff6482ec62e 49813->49814 49815 7ff6482ec616 49813->49815 49833 7ff6482d7eb3 49813->49833 49818 7ff6482ed7b0 2 API calls 49814->49818 49889 7ff6482ed370 90 API calls 49815->49889 49820 7ff6482ec638 49818->49820 49819 7ff6482ec626 49819->49814 49819->49833 49821 7ff6482ec6a8 49820->49821 49826 7ff6482e5af0 15 API calls 49820->49826 49890 7ff6482f51e0 22 API calls 49821->49890 49823 7ff6482ec6b0 49823->49833 49891 7ff6482f6350 23 API calls 49823->49891 49825 7ff6482ec6ce 49827 7ff6482ec6e2 49825->49827 49825->49833 49834 7ff6482ec762 49825->49834 49826->49821 49829 7ff6482e71f0 10 API calls 49827->49829 49828 7ff6482ec7c9 49896 7ff6482f51e0 22 API calls 49828->49896 49832 7ff6482ec6f1 49829->49832 49831 7ff6482ec7a0 49831->49828 49837 7ff6482ec7b3 49831->49837 49832->49833 49835 7ff6482ec6fa 49832->49835 49833->49773 49846 7ff6482ec810 24 API calls 49833->49846 49834->49828 49834->49831 49836 7ff6482ec787 49834->49836 49841 7ff6482ec731 49835->49841 49842 7ff6482ec74c 49835->49842 49894 7ff6482e5970 19 API calls 49836->49894 49895 7ff6482e5970 19 API calls 49837->49895 49840 7ff6482ec5c5 49840->49833 49892 7ff6482e5970 19 API calls 49841->49892 49893 7ff6482e5970 19 API calls 49842->49893 49845->49803 49846->49773 49847->49800 49848->49793 49849->49803 49850->49803 49851->49803 49852->49803 49853->49803 49854->49782 49869 7ff6482ecc70 49855->49869 49857 7ff6482f5090 2 API calls 49857->49869 49858 7ff6482ed7b0 2 API calls 49858->49869 49859 7ff6482ed1aa 49861 7ff6482e5af0 15 API calls 49859->49861 49862 7ff6482ed1c3 49859->49862 49861->49862 49862->49813 49863 7ff6482ed187 49863->49859 49865 7ff6482e5af0 15 API calls 49863->49865 49864 7ff6482ecf00 49864->49869 49901 7ff6482e58b0 fwrite fwrite 49864->49901 49902 7ff6482e58b0 fwrite fwrite 49864->49902 49865->49859 49869->49857 49869->49858 49869->49859 49869->49862 49869->49863 49869->49864 49870 7ff6482ed241 49869->49870 49873 7ff6482ed1af 49869->49873 49875 7ff6482e5af0 15 API calls 49869->49875 49881 7ff6482ecedc 49869->49881 49885 7ff6482e5890 23 API calls 49869->49885 49897 7ff6482e5c60 49869->49897 49900 7ff6482f2890 192 API calls 49869->49900 49903 7ff648312590 23 API calls 49869->49903 49904 7ff6482ff0b0 23 API calls 49869->49904 49871 7ff6482ed25d 49870->49871 49872 7ff6482ed246 49870->49872 49907 7ff6482e5970 19 API calls 49871->49907 49906 7ff6482e5970 19 API calls 49872->49906 49876 7ff6482ed1e3 49873->49876 49877 7ff6482ed1b7 49873->49877 49875->49869 49905 7ff6482e5970 19 API calls 49876->49905 49880 7ff6482e5af0 15 API calls 49877->49880 49880->49862 49883 7ff6482e5af0 15 API calls 49881->49883 49882 7ff6482ed1ef 49882->49862 49884 7ff6482ed208 49883->49884 49887 7ff6482e5af0 15 API calls 49884->49887 49885->49869 49887->49862 49888->49840 49889->49819 49890->49823 49891->49825 49892->49840 49893->49840 49894->49840 49895->49840 49896->49833 49908 7ff6482fb5c0 49897->49908 49900->49869 49901->49864 49902->49869 49903->49869 49904->49869 49905->49882 49906->49882 49907->49882 49909 7ff6482fb63f 49908->49909 49910 7ff6482fb65e 49908->49910 49909->49910 49911 7ff6482fb645 49909->49911 49912 7ff6482fb665 49910->49912 49913 7ff6482fb682 49910->49913 49915 7ff6482e5af0 15 API calls 49911->49915 49916 7ff6482e5af0 15 API calls 49912->49916 49914 7ff6482fb688 49913->49914 49919 7ff6482fb6a1 49913->49919 49917 7ff6482e5af0 15 API calls 49914->49917 49922 7ff6482fb654 49915->49922 49916->49922 49917->49922 49918 7ff6482fb6d0 realloc 49920 7ff6482fb71e 49918->49920 49921 7ff6482fb6fd 49918->49921 49919->49918 49919->49920 49944 7ff6482fb799 49919->49944 49926 7ff6482e5cf0 2 API calls 49920->49926 49954 7ff6482e5970 19 API calls 49921->49954 49923 7ff6482fbaf6 49922->49923 49927 7ff6482e8800 14 API calls 49922->49927 49924 7ff6482fbbf5 memcpy memcpy 49923->49924 49928 7ff6482fbc3b 49923->49928 49924->49928 49932 7ff6482fb767 49926->49932 49933 7ff6482fbae6 49927->49933 49930 7ff64831f580 8 API calls 49928->49930 49929 7ff6482fb714 49929->49922 49934 7ff6482e5cbb 49930->49934 49931 7ff6482e5af0 15 API calls 49931->49944 49935 7ff6482fb95e 49932->49935 49936 7ff6482fb78d 49932->49936 49932->49944 49933->49923 49937 7ff6482e5af0 15 API calls 49933->49937 49934->49869 49939 7ff6482e5af0 15 API calls 49935->49939 49938 7ff6482e5af0 15 API calls 49936->49938 49937->49923 49938->49944 49939->49944 49940 7ff6482e5af0 15 API calls 49940->49922 49941 7ff6482f9a80 306 API calls 49941->49944 49942 7ff6482fbb07 49946 7ff6482fba7e 49942->49946 49947 7ff6482fbb36 49942->49947 49943 7ff6482fb8a0 realloc 49943->49944 49945 7ff6482fbb66 49943->49945 49944->49922 49944->49931 49944->49941 49944->49942 49944->49943 49944->49946 49948 7ff6482fb8eb memcpy 49944->49948 49950 7ff6482fb93b memcpy 49944->49950 49956 7ff6482e5970 19 API calls 49945->49956 49946->49922 49946->49940 49955 7ff6482d1d10 22 API calls 49947->49955 49948->49944 49950->49944 49952 7ff6482fbb4f 49953 7ff6482e5af0 15 API calls 49952->49953 49953->49922 49954->49929 49955->49952 49956->49929
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup$callocmemcpystrstr
                                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                          • API String ID: 2045874074-4264080130
                                          • Opcode ID: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                          • Instruction ID: 8577a82dd03830eefa02a9f49c754e6ae613533b7f8e385c4a94ac5f4678a90a
                                          • Opcode Fuzzy Hash: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                          • Instruction Fuzzy Hash: 1503CC21A0CA8391FB65FB7196502FA27A2BF55B88F480035CF4E97695EF3CE445D388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupstrncmpstrtol
                                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                          • API String ID: 707411602-3372543188
                                          • Opcode ID: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                          • Instruction ID: 53c99d8dd9ce19bd91e77d9f4fe80d2a4eab12e55994263777c3e1dcf133869f
                                          • Opcode Fuzzy Hash: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                          • Instruction Fuzzy Hash: 1E42C021A0CB4295EB25BB75EA507BA23A1FF54B98F444135CB0E87790DF3CE584D788

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 870 7ff6482d1530-7ff6482d157c rand 871 7ff6482d1583-7ff6482d158a 870->871 871->871 872 7ff6482d158c-7ff6482d15be call 7ff6482d0580 rand 871->872 875 7ff6482d1633-7ff6482d164f SetConsoleTitleA 872->875 876 7ff6482d15c0 872->876 878 7ff6482d1685-7ff6482d1700 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff6482c2aa0 875->878 879 7ff6482d1651-7ff6482d1662 875->879 877 7ff6482d15c2-7ff6482d15f7 rand 876->877 880 7ff6482d1619-7ff6482d1624 call 7ff6482d0680 877->880 881 7ff6482d15f9-7ff6482d1617 877->881 889 7ff6482d1705-7ff6482d1907 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 GetStdHandle SetConsoleTextAttribute call 7ff6482d1a70 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 878->889 882 7ff6482d1664-7ff6482d1677 879->882 883 7ff6482d1680 call 7ff64831f22c 879->883 885 7ff6482d1629-7ff6482d162d 880->885 881->885 882->883 887 7ff6482d1679-7ff6482d167f _invalid_parameter_noinfo_noreturn 882->887 883->878 885->877 890 7ff6482d162f 885->890 887->883 923 7ff6482d1982-7ff6482d1985 889->923 924 7ff6482d1909-7ff6482d1981 call 7ff6482c3d30 * 2 call 7ff6482c3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 889->924 890->875 926 7ff6482d1a00-7ff6482d1a08 923->926 927 7ff6482d1987-7ff6482d19ff call 7ff6482c3d30 * 2 call 7ff6482c3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 923->927 924->923 929 7ff6482d1a3e-7ff6482d1a60 call 7ff64831f580 926->929 930 7ff6482d1a0a-7ff6482d1a1b 926->930 927->926 933 7ff6482d1a1d-7ff6482d1a30 930->933 934 7ff6482d1a39 call 7ff64831f22c 930->934 933->934 938 7ff6482d1a32-7ff6482d1a38 _invalid_parameter_noinfo_noreturn 933->938 934->929 938->934
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                          • String ID: Iniciar Valorant Aim (HVCI DESLIGADO): $ Iniciar Valorant Aim (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SeiebingsHosDialog.exe$C:\Windows\System32\SerceubetisHostDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/aimhvcibronkzops.exe$http://185.101.104.122/aimhvciforabronkz.exe$start C:\Windows\System32\SeiebingsHosDialog.exe$start C:\Windows\System32\SerceubetisHostDialog.exe
                                          • API String ID: 2233566951-1582246269
                                          • Opcode ID: 9b615ab752b1db17b677d3e1e2d8fecd8b19d909079fd881a550ae344e632734
                                          • Instruction ID: 58a48fc449e6bec704e30fb84fe850821e9fdf0429b34db7901ac3f29dee2064
                                          • Opcode Fuzzy Hash: 9b615ab752b1db17b677d3e1e2d8fecd8b19d909079fd881a550ae344e632734
                                          • Instruction Fuzzy Hash: 79E16021E1CA4385EB01BBF0DA541FD6361AF85B94F084235E51EC6AF5EE2CF949C388

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 951 7ff6482e8980-7ff6482e899c 952 7ff6482e899e-7ff6482e89b0 WSAStartup 951->952 953 7ff6482e89e6-7ff6482e89ed call 7ff648312480 951->953 955 7ff6482e89b2-7ff6482e89b9 952->955 956 7ff6482e89c9-7ff6482e89e5 call 7ff64831f580 952->956 961 7ff6482e89f3-7ff6482e8a20 GetModuleHandleA 953->961 962 7ff6482e8caf-7ff6482e8cc6 call 7ff64831f580 953->962 958 7ff6482e89c3 WSACleanup 955->958 959 7ff6482e89bb-7ff6482e89c1 955->959 958->956 959->953 959->958 965 7ff6482e8a22-7ff6482e8a29 961->965 966 7ff6482e8a2e-7ff6482e8a63 GetProcAddress strpbrk 961->966 968 7ff6482e8bb3-7ff6482e8ca7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 965->968 969 7ff6482e8a65-7ff6482e8a6b 966->969 970 7ff6482e8a8b-7ff6482e8a8e 966->970 968->962 971 7ff6482e8a7d-7ff6482e8a86 LoadLibraryA 969->971 972 7ff6482e8a6d-7ff6482e8a78 969->972 973 7ff6482e8a90-7ff6482e8aa3 GetProcAddress 970->973 974 7ff6482e8aba-7ff6482e8ad1 GetSystemDirectoryA 970->974 975 7ff6482e8b7a-7ff6482e8b8c 971->975 972->975 973->974 976 7ff6482e8aa5-7ff6482e8ab5 LoadLibraryExA 973->976 977 7ff6482e8b72 974->977 978 7ff6482e8ad7-7ff6482e8aea malloc 974->978 975->968 979 7ff6482e8b8e-7ff6482e8bac GetProcAddress 975->979 976->975 977->975 980 7ff6482e8aec-7ff6482e8afa GetSystemDirectoryA 978->980 981 7ff6482e8b69-7ff6482e8b6c free 978->981 979->968 980->981 983 7ff6482e8afc-7ff6482e8b06 980->983 981->977 984 7ff6482e8b10-7ff6482e8b19 983->984 984->984 985 7ff6482e8b1b-7ff6482e8b20 984->985 986 7ff6482e8b24-7ff6482e8b2b 985->986 986->986 987 7ff6482e8b2d-7ff6482e8b36 986->987 988 7ff6482e8b40-7ff6482e8b4c 987->988 988->988 989 7ff6482e8b4e-7ff6482e8b54 988->989 990 7ff6482e8b60 LoadLibraryA 989->990 991 7ff6482e8b56-7ff6482e8b5e 989->991 992 7ff6482e8b66 990->992 991->992 992->981
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                          • API String ID: 2612373469-2794540096
                                          • Opcode ID: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                          • Instruction ID: 34d07de02629a8d4b1486326518a1e9f5df239fa9f18b63fdc74595e6e77ed23
                                          • Opcode Fuzzy Hash: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                          • Instruction Fuzzy Hash: E0919021E0CB8286EB61FBB1A5143BA6391FF88B80F484235D98D86754EF3CE545D748

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1248 7ff6482e7cc0-7ff6482e7d2d 1249 7ff6482e7d32-7ff6482e7d42 1248->1249 1250 7ff6482e7d2f 1248->1250 1251 7ff6482e7d44-7ff6482e7d4c 1249->1251 1252 7ff6482e7d51-7ff6482e7d69 memcpy 1249->1252 1250->1249 1251->1252 1253 7ff6482e7d6b-7ff6482e7d96 call 7ff6482d6290 * 2 1252->1253 1254 7ff6482e7d98-7ff6482e7dab socket 1252->1254 1255 7ff6482e7dae-7ff6482e7dba 1253->1255 1254->1255 1257 7ff6482e824f 1255->1257 1258 7ff6482e7dc0-7ff6482e7dc8 1255->1258 1262 7ff6482e8254-7ff6482e827d call 7ff64831f580 1257->1262 1260 7ff6482e7dca-7ff6482e7dd2 call 7ff6482f4c90 1258->1260 1261 7ff6482e7dd7-7ff6482e7de0 1258->1261 1260->1261 1266 7ff6482e7de2-7ff6482e7ded 1261->1266 1267 7ff6482e7df0-7ff6482e7df9 1261->1267 1266->1267 1270 7ff6482e7dfb-7ff6482e7dfe 1267->1270 1271 7ff6482e7e0c-7ff6482e7e10 1267->1271 1273 7ff6482e7e04-7ff6482e7e0a 1270->1273 1274 7ff6482e81fa-7ff6482e824d _errno * 3 call 7ff6482d2500 call 7ff6482e5970 call 7ff6482e65d0 1270->1274 1275 7ff6482e7e15-7ff6482e7e27 call 7ff6483111c0 1271->1275 1273->1275 1274->1262 1275->1274 1280 7ff6482e7e2d-7ff6482e7e55 htons call 7ff6482e5af0 1275->1280 1286 7ff6482e7e5c-7ff6482e7e61 1280->1286 1287 7ff6482e7e57-7ff6482e7e5a 1280->1287 1289 7ff6482e7ece 1286->1289 1290 7ff6482e7e63-7ff6482e7e6d 1286->1290 1287->1286 1287->1289 1292 7ff6482e7ed1-7ff6482e7eed 1289->1292 1291 7ff6482e7e6f-7ff6482e7e9b setsockopt 1290->1291 1290->1292 1295 7ff6482e7e9d-7ff6482e7ec4 WSAGetLastError call 7ff6482d2500 call 7ff6482e5af0 1291->1295 1296 7ff6482e7ec9-7ff6482e7ecc 1291->1296 1293 7ff6482e7eef-7ff6482e7f03 call 7ff6482e8800 1292->1293 1294 7ff6482e7f1d-7ff6482e7f20 1292->1294 1307 7ff6482e7f05-7ff6482e7f0f 1293->1307 1308 7ff6482e7f11-7ff6482e7f1b 1293->1308 1298 7ff6482e7f22-7ff6482e7f47 getsockopt 1294->1298 1299 7ff6482e7f74-7ff6482e7f77 1294->1299 1295->1296 1296->1292 1302 7ff6482e7f53-7ff6482e7f6e setsockopt 1298->1302 1303 7ff6482e7f49-7ff6482e7f51 1298->1303 1304 7ff6482e805f-7ff6482e8066 1299->1304 1305 7ff6482e7f7d-7ff6482e7f84 1299->1305 1302->1299 1303->1299 1303->1302 1309 7ff6482e809a-7ff6482e80a1 1304->1309 1310 7ff6482e8068-7ff6482e8095 call 7ff6482d6290 * 2 1304->1310 1305->1304 1311 7ff6482e7f8a-7ff6482e7fb5 setsockopt 1305->1311 1307->1299 1308->1298 1313 7ff6482e80a3-7ff6482e80a6 1309->1313 1314 7ff6482e80a8-7ff6482e80c8 call 7ff648311130 call 7ff6482e7630 1309->1314 1343 7ff6482e80e5-7ff6482e80e7 1310->1343 1344 7ff6482e8097 1310->1344 1316 7ff6482e7fce-7ff6482e8042 call 7ff6482e8370 * 2 WSAIoctl 1311->1316 1317 7ff6482e7fb7-7ff6482e7fc9 call 7ff6482e5af0 1311->1317 1313->1314 1319 7ff6482e80fe-7ff6482e8128 call 7ff6482f4c90 call 7ff6482ed7b0 1313->1319 1314->1319 1337 7ff6482e80ca-7ff6482e80d8 call 7ff6482e65d0 1314->1337 1316->1304 1336 7ff6482e8044-7ff6482e805a WSAGetLastError call 7ff6482e5af0 1316->1336 1317->1304 1339 7ff6482e813f-7ff6482e8142 1319->1339 1340 7ff6482e812a-7ff6482e813a call 7ff6482d57f0 1319->1340 1336->1304 1337->1257 1351 7ff6482e80de-7ff6482e80e0 1337->1351 1346 7ff6482e81ef-7ff6482e81f8 1339->1346 1347 7ff6482e8148-7ff6482e8150 1339->1347 1340->1339 1343->1309 1349 7ff6482e80e9-7ff6482e80f9 call 7ff6482e65d0 1343->1349 1344->1309 1346->1262 1347->1346 1350 7ff6482e8156-7ff6482e815d 1347->1350 1349->1262 1353 7ff6482e815f-7ff6482e8174 connect 1350->1353 1354 7ff6482e8188-7ff6482e8193 WSAGetLastError 1350->1354 1351->1262 1353->1354 1356 7ff6482e8176-7ff6482e8178 1353->1356 1357 7ff6482e8195-7ff6482e819e 1354->1357 1358 7ff6482e81e2-7ff6482e81e4 1354->1358 1359 7ff6482e81eb-7ff6482e81ed 1356->1359 1360 7ff6482e817a-7ff6482e8183 1356->1360 1357->1358 1361 7ff6482e81a0-7ff6482e81e0 call 7ff6482d2500 call 7ff6482e5af0 call 7ff6482e65d0 1357->1361 1358->1359 1359->1262 1360->1262 1361->1262
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                          • API String ID: 3453287622-3868455274
                                          • Opcode ID: a2329d31af6ccdedd8291ba3b20cb9468dd4f4060951aad07901af01d56ef692
                                          • Instruction ID: 971278e358ceac5724eda4662f582b20fea012476930a77d8d79b5ae75ddd351
                                          • Opcode Fuzzy Hash: a2329d31af6ccdedd8291ba3b20cb9468dd4f4060951aad07901af01d56ef692
                                          • Instruction Fuzzy Hash: D1F1D132A0C6828AEB50FB75D5402BE63A0FB44B84F444535EA4DC7795DF3CE945CB88

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1905 7ff6482f4a60-7ff6482f4aae socket 1906 7ff6482f4ab5-7ff6482f4b0e htonl setsockopt 1905->1906 1907 7ff6482f4ab0 1905->1907 1909 7ff6482f4b14-7ff6482f4b29 bind 1906->1909 1910 7ff6482f4c3b-7ff6482f4c57 closesocket * 3 1906->1910 1908 7ff6482f4c64-7ff6482f4c82 call 7ff64831f580 1907->1908 1909->1910 1913 7ff6482f4b2f-7ff6482f4b45 getsockname 1909->1913 1911 7ff6482f4c5c 1910->1911 1911->1908 1913->1910 1915 7ff6482f4b4b-7ff6482f4b5a listen 1913->1915 1915->1910 1916 7ff6482f4b60-7ff6482f4b75 socket 1915->1916 1916->1910 1917 7ff6482f4b7b-7ff6482f4b90 connect 1916->1917 1917->1910 1918 7ff6482f4b96-7ff6482f4bac accept 1917->1918 1918->1910 1919 7ff6482f4bb2-7ff6482f4bce call 7ff6482e8e80 1918->1919 1922 7ff6482f4bd5-7ff6482f4bdc 1919->1922 1922->1922 1923 7ff6482f4bde-7ff6482f4bf8 send 1922->1923 1923->1910 1924 7ff6482f4bfa-7ff6482f4c16 recv 1923->1924 1924->1910 1925 7ff6482f4c18-7ff6482f4c2c memcmp 1924->1925 1925->1910 1926 7ff6482f4c2e-7ff6482f4c39 closesocket 1925->1926 1926->1911
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                          • String ID:
                                          • API String ID: 3699910901-0
                                          • Opcode ID: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                          • Instruction ID: dce21f95a38df211f915b4488f490fc44c8cbc710f18f6d297f4f91defbbb12d
                                          • Opcode Fuzzy Hash: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                          • Instruction Fuzzy Hash: AC515D3160CA4682E750BB75E6441BA7361EB84BB4F545330EABE83AE4DF7CE845C748

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1927 7ff6482e6980-7ff6482e69cd 1928 7ff6482e69cf-7ff6482e69d3 1927->1928 1929 7ff6482e69d8-7ff6482e6a13 call 7ff6482ed7b0 1927->1929 1930 7ff6482e6ef6-7ff6482e6f14 call 7ff64831f580 1928->1930 1935 7ff6482e6a15 1929->1935 1936 7ff6482e6a18-7ff6482e6a1b 1929->1936 1935->1936 1937 7ff6482e6a1d-7ff6482e6a20 1936->1937 1938 7ff6482e6a38 1936->1938 1939 7ff6482e6a33-7ff6482e6a36 1937->1939 1940 7ff6482e6a22-7ff6482e6a25 1937->1940 1941 7ff6482e6a3b-7ff6482e6a67 call 7ff6482ed840 1938->1941 1939->1941 1940->1941 1942 7ff6482e6a27-7ff6482e6a31 1940->1942 1945 7ff6482e6a82-7ff6482e6a8a 1941->1945 1946 7ff6482e6a69-7ff6482e6a7d call 7ff6482e5970 1941->1946 1942->1941 1948 7ff6482e6a8c-7ff6482e6a9e call 7ff6482e7b50 1945->1948 1949 7ff6482e6ab9-7ff6482e6ad7 1945->1949 1953 7ff6482e6ee6-7ff6482e6eee 1946->1953 1957 7ff6482e6ab2-7ff6482e6ab4 1948->1957 1958 7ff6482e6aa0-7ff6482e6aa2 1948->1958 1952 7ff6482e6ae0-7ff6482e6af5 1949->1952 1955 7ff6482e6afb-7ff6482e6b0f call 7ff6482f5fe0 1952->1955 1956 7ff6482e6d7a 1952->1956 1953->1930 1967 7ff6482e6b15-7ff6482e6b40 call 7ff6482ed840 1955->1967 1968 7ff6482e6c90-7ff6482e6c93 1955->1968 1960 7ff6482e6d7e-7ff6482e6d8f 1956->1960 1957->1953 1958->1957 1962 7ff6482e6aa4-7ff6482e6aad call 7ff6482e7c60 1958->1962 1960->1952 1961 7ff6482e6d95-7ff6482e6d97 1960->1961 1964 7ff6482e6d9d-7ff6482e6db4 call 7ff6482e8280 1961->1964 1965 7ff6482e6edc 1961->1965 1962->1957 1983 7ff6482e6dba-7ff6482e6dc1 1964->1983 1984 7ff6482e6e67-7ff6482e6e69 1964->1984 1973 7ff6482e6ede 1965->1973 1979 7ff6482e6b42-7ff6482e6b54 call 7ff6482e5af0 1967->1979 1980 7ff6482e6b59-7ff6482e6b5c 1967->1980 1970 7ff6482e6c95-7ff6482e6c9c 1968->1970 1971 7ff6482e6d04-7ff6482e6d4a SleepEx getsockopt 1968->1971 1970->1971 1975 7ff6482e6c9e-7ff6482e6ca0 1970->1975 1977 7ff6482e6d4c-7ff6482e6d54 WSAGetLastError 1971->1977 1978 7ff6482e6d56 1971->1978 1973->1953 1981 7ff6482e6baf-7ff6482e6bb1 1975->1981 1982 7ff6482e6ca6-7ff6482e6cec SleepEx getsockopt 1975->1982 1985 7ff6482e6d5a-7ff6482e6d5c 1977->1985 1978->1985 1979->1980 1991 7ff6482e6b5e-7ff6482e6b65 1980->1991 1992 7ff6482e6bab 1980->1992 1981->1956 1995 7ff6482e6bb7-7ff6482e6bcc WSASetLastError 1981->1995 1987 7ff6482e6cee-7ff6482e6cf6 WSAGetLastError 1982->1987 1988 7ff6482e6cfb-7ff6482e6cff 1982->1988 1989 7ff6482e6e6b-7ff6482e6e72 1983->1989 1990 7ff6482e6dc7-7ff6482e6dce 1983->1990 1984->1973 1993 7ff6482e6dd3-7ff6482e6e21 1985->1993 1994 7ff6482e6d5e-7ff6482e6d64 1985->1994 1987->1981 1988->1981 1996 7ff6482e6e74-7ff6482e6e7b 1989->1996 1997 7ff6482e6e7d-7ff6482e6e84 1989->1997 1999 7ff6482e6e96-7ff6482e6ed9 call 7ff6482d2500 call 7ff6482e5970 1990->1999 1991->1992 2000 7ff6482e6b67-7ff6482e6b93 call 7ff6482ed840 1991->2000 1992->1981 2001 7ff6482e6e23-7ff6482e6e2b call 7ff6482e65d0 1993->2001 2002 7ff6482e6e36-7ff6482e6e4b call 7ff6482e7b50 1993->2002 1994->1993 2003 7ff6482e6d66-7ff6482e6d75 call 7ff6482e5af0 1994->2003 1995->1956 2004 7ff6482e6bd2-7ff6482e6c3c call 7ff6482eeba0 call 7ff6482d2500 call 7ff6482e5af0 1995->2004 1996->1999 2006 7ff6482e6e8f 1997->2006 2007 7ff6482e6e86-7ff6482e6e8d 1997->2007 1999->1965 2000->1992 2021 7ff6482e6b95-7ff6482e6ba6 call 7ff6482e8280 2000->2021 2001->2002 2002->1973 2022 7ff6482e6e51-7ff6482e6e53 2002->2022 2003->1956 2030 7ff6482e6c5e-7ff6482e6c74 call 7ff6482e8280 2004->2030 2031 7ff6482e6c3e-7ff6482e6c45 2004->2031 2006->1999 2007->1999 2021->1992 2022->1973 2026 7ff6482e6e59-7ff6482e6e62 call 7ff6482e7c60 2022->2026 2026->1984 2037 7ff6482e6c87-7ff6482e6c8b 2030->2037 2038 7ff6482e6c76-7ff6482e6c81 2030->2038 2031->2030 2032 7ff6482e6c47-7ff6482e6c4e 2031->2032 2034 7ff6482e6c50-7ff6482e6c53 2032->2034 2034->2030 2036 7ff6482e6c55-7ff6482e6c5c 2034->2036 2036->2030 2036->2034 2037->1960 2038->1956 2038->2037
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                          • API String ID: 0-3307081561
                                          • Opcode ID: f4fc740730976301a7210c533d194c5813da0a247d4e8c83157ccee1db768edb
                                          • Instruction ID: 506c9b762d66479ba8a01bf7bbdaf40ae351f6958d938c186bcd989dddadf788
                                          • Opcode Fuzzy Hash: f4fc740730976301a7210c533d194c5813da0a247d4e8c83157ccee1db768edb
                                          • Instruction Fuzzy Hash: 39E1F062A0C68282EB64BB35D6443BF27A1FB85794F484235EA5D877C1DF3CE651C388

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 994 7ff6482c2aa0-7ff6482c2aef call 7ff6482c2840 997 7ff6482c2af5-7ff6482c2afa 994->997 998 7ff6482c30a8-7ff6482c3117 call 7ff6482c3120 Sleep exit 994->998 997->998 1000 7ff6482c2b00-7ff6482c2c1e call 7ff6482c3160 call 7ff6482c3c30 call 7ff6482c32d0 call 7ff6482c3c30 call 7ff6482c33d0 call 7ff6482c3c30 997->1000 1003 7ff6482c3118-7ff6482c311f call 7ff6482c19f0 998->1003 1017 7ff6482c2c20-7ff6482c2c31 1000->1017 1018 7ff6482c2c54-7ff6482c2c6d 1000->1018 1019 7ff6482c2c4f call 7ff64831f22c 1017->1019 1020 7ff6482c2c33-7ff6482c2c46 1017->1020 1021 7ff6482c2c6f-7ff6482c2c81 1018->1021 1022 7ff6482c2ca5-7ff6482c2cad 1018->1022 1019->1018 1020->1019 1025 7ff6482c2c48-7ff6482c2c4e _invalid_parameter_noinfo_noreturn 1020->1025 1027 7ff6482c2c9f-7ff6482c2ca4 call 7ff64831f22c 1021->1027 1028 7ff6482c2c83-7ff6482c2c96 1021->1028 1023 7ff6482c2caf-7ff6482c2cc0 1022->1023 1024 7ff6482c2ce3-7ff6482c2cfb 1022->1024 1029 7ff6482c2cde call 7ff64831f22c 1023->1029 1030 7ff6482c2cc2-7ff6482c2cd5 1023->1030 1031 7ff6482c2d32-7ff6482c2d3a 1024->1031 1032 7ff6482c2cfd-7ff6482c2d0e 1024->1032 1025->1019 1027->1022 1028->1027 1033 7ff6482c2c98-7ff6482c2c9e _invalid_parameter_noinfo_noreturn 1028->1033 1029->1024 1030->1029 1035 7ff6482c2cd7-7ff6482c2cdd _invalid_parameter_noinfo_noreturn 1030->1035 1039 7ff6482c2d70-7ff6482c2db7 1031->1039 1040 7ff6482c2d3c-7ff6482c2d4d 1031->1040 1037 7ff6482c2d10-7ff6482c2d23 1032->1037 1038 7ff6482c2d2c-7ff6482c2d31 call 7ff64831f22c 1032->1038 1033->1027 1035->1029 1037->1038 1044 7ff6482c2d25-7ff6482c2d2b _invalid_parameter_noinfo_noreturn 1037->1044 1038->1031 1042 7ff6482c2db9-7ff6482c2dc6 1039->1042 1043 7ff6482c2dc8-7ff6482c2deb 1039->1043 1046 7ff6482c2d4f-7ff6482c2d62 1040->1046 1047 7ff6482c2d6b call 7ff64831f22c 1040->1047 1049 7ff6482c2e42-7ff6482c2e5b call 7ff6482c3550 call 7ff6482c2840 1042->1049 1050 7ff6482c2e1f-7ff6482c2e22 1043->1050 1051 7ff6482c2ded-7ff6482c2df4 1043->1051 1044->1038 1046->1047 1053 7ff6482c2d64-7ff6482c2d6a _invalid_parameter_noinfo_noreturn 1046->1053 1047->1039 1065 7ff6482c2e60-7ff6482c2e98 call 7ff6482c4bd0 call 7ff6482c48c0 1049->1065 1056 7ff6482c2e24-7ff6482c2e29 call 7ff64831f1f0 1050->1056 1057 7ff6482c2e2b 1050->1057 1051->1003 1055 7ff6482c2dfa-7ff6482c2e08 call 7ff64831f1f0 1051->1055 1053->1047 1066 7ff6482c2e18-7ff6482c2e1e _invalid_parameter_noinfo_noreturn 1055->1066 1067 7ff6482c2e0a-7ff6482c2e16 1055->1067 1058 7ff6482c2e2e-7ff6482c2e3d memcpy 1056->1058 1057->1058 1058->1049 1072 7ff6482c2e9e-7ff6482c2ead call 7ff6482c48c0 1065->1072 1073 7ff6482c2fa3-7ff6482c3013 call 7ff6482c48c0 call 7ff64831f1f0 call 7ff6482c4310 call 7ff6482c5a00 call 7ff6482c3e50 1065->1073 1066->1050 1067->1058 1079 7ff6482c2eaf-7ff6482c2eb3 1072->1079 1080 7ff6482c2eb5 1072->1080 1101 7ff6482c3061-7ff6482c30a7 call 7ff6482c48c0 call 7ff6482c4d00 call 7ff6482c3b10 MessageBoxA call 7ff6482c3cd0 exit 1073->1101 1102 7ff6482c3015-7ff6482c3060 call 7ff6482c48c0 call 7ff6482c49a0 call 7ff6482c3b10 ShellExecuteA exit 1073->1102 1082 7ff6482c2eb8-7ff6482c2ec1 1079->1082 1080->1082 1083 7ff6482c2ec3 1082->1083 1084 7ff6482c2ec6-7ff6482c2ee9 call 7ff6482c4310 call 7ff6482c3e50 1082->1084 1083->1084 1094 7ff6482c2f1f-7ff6482c2f33 1084->1094 1095 7ff6482c2eeb-7ff6482c2efc 1084->1095 1099 7ff6482c2f35-7ff6482c2f43 1094->1099 1100 7ff6482c2f69-7ff6482c2fa2 call 7ff64831f580 1094->1100 1097 7ff6482c2efe-7ff6482c2f11 1095->1097 1098 7ff6482c2f1a call 7ff64831f22c 1095->1098 1097->1098 1106 7ff6482c2f13-7ff6482c2f19 _invalid_parameter_noinfo_noreturn 1097->1106 1098->1094 1108 7ff6482c2f61-7ff6482c2f64 call 7ff64831f22c 1099->1108 1109 7ff6482c2f45-7ff6482c2f58 1099->1109 1101->998 1102->1101 1106->1098 1108->1100 1109->1108 1114 7ff6482c2f5a-7ff6482c2f60 _invalid_parameter_noinfo_noreturn 1109->1114 1114->1108
                                          APIs
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C28A7
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2917
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2977
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C29C7
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2A17
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2C48
                                            • Part of subcall function 00007FF6482C48C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C4980
                                            • Part of subcall function 00007FF64831F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6482C43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF64831F20A
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2C98
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2CD7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2D25
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2D64
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2E18
                                          • memcpy.VCRUNTIME140 ref: 00007FF6482C2E3D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2F13
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2F5A
                                          • ShellExecuteA.SHELL32 ref: 00007FF6482C3052
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C305A
                                          • MessageBoxA.USER32 ref: 00007FF6482C3090
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C30A1
                                          • Sleep.KERNEL32 ref: 00007FF6482C3109
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C3111
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482C3118
                                            • Part of subcall function 00007FF6482C3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C326F
                                            • Part of subcall function 00007FF6482C3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C32B0
                                            • Part of subcall function 00007FF6482C3C30: memcpy.VCRUNTIME140 ref: 00007FF6482C3C83
                                            • Part of subcall function 00007FF6482C32D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C33B0
                                            • Part of subcall function 00007FF6482C33D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C34B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                          • String ID: Failure$download$invalidver$message$open$sessionid$success
                                          • API String ID: 3283070336-3881042241
                                          • Opcode ID: 535ff1e8e221f0c1c75af27359ade00078b131d269cead65d7686762db580418
                                          • Instruction ID: f06899072dead41a92499115254d40df1d9ff882402a56c00b70ae1438516477
                                          • Opcode Fuzzy Hash: 535ff1e8e221f0c1c75af27359ade00078b131d269cead65d7686762db580418
                                          • Instruction Fuzzy Hash: A602E522A0CB8285EB11BB78E5443FE2761FB44794F445635EA5D83ADADF7CE484C384

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1125 7ff6482fb5c0-7ff6482fb63d 1126 7ff6482fb63f-7ff6482fb643 1125->1126 1127 7ff6482fb65e-7ff6482fb663 1125->1127 1126->1127 1128 7ff6482fb645-7ff6482fb659 call 7ff6482e5af0 1126->1128 1129 7ff6482fb665-7ff6482fb67d call 7ff6482e5af0 1127->1129 1130 7ff6482fb682-7ff6482fb686 1127->1130 1142 7ff6482fbaac-7ff6482fbab9 1128->1142 1143 7ff6482fbaa3-7ff6482fbaa6 1129->1143 1131 7ff6482fb6a1-7ff6482fb6a4 1130->1131 1132 7ff6482fb688-7ff6482fb69c call 7ff6482e5af0 1130->1132 1136 7ff6482fb9ba 1131->1136 1137 7ff6482fb6aa-7ff6482fb6ae 1131->1137 1132->1143 1144 7ff6482fb9c2-7ff6482fb9ca 1136->1144 1137->1136 1141 7ff6482fb6b4-7ff6482fb6c9 1137->1141 1145 7ff6482fb6d0-7ff6482fb6fb realloc 1141->1145 1146 7ff6482fb6cb-7ff6482fb6ce 1141->1146 1147 7ff6482fbbc5-7ff6482fbbcb 1142->1147 1148 7ff6482fbabf-7ff6482fbac3 1142->1148 1143->1142 1143->1147 1149 7ff6482fb9ce 1144->1149 1153 7ff6482fb71e-7ff6482fb74b 1145->1153 1154 7ff6482fb6fd-7ff6482fb719 call 7ff6482e5970 1145->1154 1146->1145 1152 7ff6482fb74d-7ff6482fb762 call 7ff6482e5cf0 1146->1152 1150 7ff6482fbbdd-7ff6482fbbf3 1147->1150 1151 7ff6482fbbcd-7ff6482fbbd0 1147->1151 1148->1147 1155 7ff6482fbac9-7ff6482fbacd 1148->1155 1156 7ff6482fb9d6-7ff6482fb9dc 1149->1156 1158 7ff6482fbbf5-7ff6482fbc39 memcpy * 2 1150->1158 1159 7ff6482fbc3b-7ff6482fbc41 1150->1159 1151->1150 1157 7ff6482fbbd2-7ff6482fbbda 1151->1157 1170 7ff6482fb767-7ff6482fb76d 1152->1170 1153->1152 1154->1142 1155->1147 1162 7ff6482fbad3-7ff6482fbae8 call 7ff6482e8800 1155->1162 1164 7ff6482fba72-7ff6482fba78 1156->1164 1165 7ff6482fb9e2-7ff6482fb9f7 call 7ff6482e5af0 1156->1165 1157->1150 1166 7ff6482fbc65-7ff6482fbc87 call 7ff64831f580 1158->1166 1168 7ff6482fbc55-7ff6482fbc58 1159->1168 1169 7ff6482fbc43-7ff6482fbc46 1159->1169 1185 7ff6482fbbae-7ff6482fbbc0 call 7ff6482e5af0 1162->1185 1186 7ff6482fbaee-7ff6482fbaf0 1162->1186 1173 7ff6482fb7a0-7ff6482fb7af 1164->1173 1174 7ff6482fba7e-7ff6482fba8e 1164->1174 1198 7ff6482fba02-7ff6482fba12 1165->1198 1199 7ff6482fb9f9-7ff6482fb9fc 1165->1199 1177 7ff6482fbc60-7ff6482fbc62 1168->1177 1178 7ff6482fbc5a-7ff6482fbc5e 1168->1178 1169->1168 1176 7ff6482fbc48-7ff6482fbc50 1169->1176 1179 7ff6482fb773-7ff6482fb77f 1170->1179 1180 7ff6482fb972-7ff6482fb97a 1170->1180 1173->1143 1188 7ff6482fb7b5-7ff6482fb7b7 1173->1188 1174->1143 1189 7ff6482fba90-7ff6482fba94 1174->1189 1176->1168 1177->1166 1178->1177 1181 7ff6482fb781-7ff6482fb787 1179->1181 1182 7ff6482fb799-7ff6482fb79e 1179->1182 1183 7ff6482fb992 1180->1183 1184 7ff6482fb97c-7ff6482fb98d 1180->1184 1191 7ff6482fb95e-7ff6482fb96d call 7ff6482e5af0 1181->1191 1192 7ff6482fb78d-7ff6482fb794 call 7ff6482e5af0 1181->1192 1182->1173 1183->1182 1193 7ff6482fb998-7ff6482fb9b5 1183->1193 1184->1173 1185->1147 1186->1185 1194 7ff6482fbaf6-7ff6482fbb02 1186->1194 1188->1143 1196 7ff6482fb7bd-7ff6482fb7c0 1188->1196 1197 7ff6482fba9b 1189->1197 1191->1182 1192->1182 1193->1173 1194->1147 1201 7ff6482fb7d2-7ff6482fb850 call 7ff6482e83c0 1196->1201 1202 7ff6482fb7c2-7ff6482fb7c6 1196->1202 1203 7ff6482fba9e call 7ff6482e5af0 1197->1203 1206 7ff6482fbb9a-7ff6482fbba9 1198->1206 1207 7ff6482fba18-7ff6482fba59 call 7ff6482e5af0 call 7ff6482f9a80 1198->1207 1199->1198 1204 7ff6482fbb82-7ff6482fbb89 1199->1204 1220 7ff6482fb864-7ff6482fb869 1201->1220 1221 7ff6482fb852-7ff6482fb857 1201->1221 1202->1201 1208 7ff6482fb7c8-7ff6482fb7cc 1202->1208 1203->1143 1204->1197 1206->1203 1218 7ff6482fba5f-7ff6482fba6d call 7ff6482e5af0 1207->1218 1219 7ff6482fbb8e-7ff6482fbb95 1207->1219 1208->1143 1208->1201 1218->1173 1219->1203 1222 7ff6482fb86f-7ff6482fb899 1220->1222 1223 7ff6482fb90e-7ff6482fb912 1220->1223 1221->1220 1225 7ff6482fb859-7ff6482fb85e 1221->1225 1227 7ff6482fb8a0-7ff6482fb8bb realloc 1222->1227 1228 7ff6482fb89b-7ff6482fb89e 1222->1228 1223->1144 1230 7ff6482fb918-7ff6482fb91d 1223->1230 1225->1220 1226 7ff6482fbb07-7ff6482fbb0d 1225->1226 1234 7ff6482fbb0f-7ff6482fbb20 1226->1234 1235 7ff6482fbb36-7ff6482fbb61 call 7ff6482d1d10 call 7ff6482e5af0 1226->1235 1232 7ff6482fb8c1-7ff6482fb8e1 1227->1232 1233 7ff6482fbb66-7ff6482fbb7d call 7ff6482e5970 1227->1233 1228->1227 1231 7ff6482fb8e5-7ff6482fb8e9 1228->1231 1230->1144 1236 7ff6482fb923-7ff6482fb935 1230->1236 1237 7ff6482fb90c 1231->1237 1238 7ff6482fb8eb-7ff6482fb908 memcpy 1231->1238 1232->1231 1233->1143 1239 7ff6482fbb22 1234->1239 1240 7ff6482fbb2a-7ff6482fbb31 1234->1240 1235->1143 1236->1156 1242 7ff6482fb93b-7ff6482fb95c memcpy 1236->1242 1237->1223 1238->1237 1239->1240 1240->1197 1242->1149
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                          • API String ID: 3510742995-857957974
                                          • Opcode ID: cac85cc79ed5ed7f6d07cdb661102536f9163d80bf62f0a97a5fbbab425035fd
                                          • Instruction ID: 4390610c7377fb747876132a4982de4c9e9c7ab2ff3a59f8553b5eb9f7591167
                                          • Opcode Fuzzy Hash: cac85cc79ed5ed7f6d07cdb661102536f9163d80bf62f0a97a5fbbab425035fd
                                          • Instruction Fuzzy Hash: 8502FF72A1CB8685EB60FB29D9843AA27A6FB54B90F100536CE4DC77A0DF7CD441D788

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1368 7ff6482faa50-7ff6482faabe 1369 7ff6482faae0 1368->1369 1370 7ff6482faac0-7ff6482faad5 1368->1370 1372 7ff6482faae7-7ff6482fab01 1369->1372 1370->1369 1371 7ff6482faad7-7ff6482faade 1370->1371 1371->1372 1373 7ff6482fb1cb 1372->1373 1374 7ff6482fab07-7ff6482fab0c 1372->1374 1374->1373 1375 7ff6482fab12-7ff6482fab20 1374->1375 1376 7ff6482fab62-7ff6482fab66 1375->1376 1377 7ff6482fab22-7ff6482fab5c malloc 1375->1377 1379 7ff6482fabb3-7ff6482fabc4 1376->1379 1380 7ff6482fab68-7ff6482fabad malloc 1376->1380 1377->1376 1378 7ff6482fb1bf 1377->1378 1378->1373 1381 7ff6482fac38-7ff6482fac3a 1379->1381 1382 7ff6482fabc6-7ff6482fabe0 realloc 1379->1382 1380->1378 1380->1379 1385 7ff6482fac3c-7ff6482fac60 call 7ff6482e5cf0 1381->1385 1386 7ff6482fac9a-7ff6482fad41 call 7ff6482e83c0 malloc 1381->1386 1383 7ff6482fabe2-7ff6482fabec call 7ff6482e5970 1382->1383 1384 7ff6482fac20-7ff6482fac36 1382->1384 1392 7ff6482fabf1 1383->1392 1384->1381 1390 7ff6482fac65-7ff6482fac68 1385->1390 1386->1378 1395 7ff6482fad47-7ff6482fad61 memcpy 1386->1395 1393 7ff6482faedf-7ff6482faee6 1390->1393 1394 7ff6482fac6e-7ff6482fac70 1390->1394 1396 7ff6482fabf6-7ff6482fac1f call 7ff64831f580 1392->1396 1399 7ff6482faeec-7ff6482faef8 1393->1399 1400 7ff6482fb1b8-7ff6482fb1ba 1393->1400 1397 7ff6482faec6-7ff6482faeda call 7ff6482e5970 1394->1397 1398 7ff6482fac76-7ff6482fac7e 1394->1398 1395->1392 1401 7ff6482fad67-7ff6482fadd3 free 1395->1401 1397->1396 1398->1397 1404 7ff6482fac84-7ff6482fac96 1398->1404 1399->1396 1400->1396 1408 7ff6482fb1a3-7ff6482fb1aa 1401->1408 1409 7ff6482fadd9-7ff6482fade0 1401->1409 1404->1386 1410 7ff6482fb1ae 1408->1410 1411 7ff6482fb14c-7ff6482fb158 1409->1411 1412 7ff6482fade6-7ff6482faded 1409->1412 1410->1400 1413 7ff6482fb18b-7ff6482fb19e 1411->1413 1414 7ff6482fb15a-7ff6482fb186 call 7ff6482d1d10 call 7ff6482e5970 1411->1414 1415 7ff6482fadef-7ff6482fadf2 1412->1415 1416 7ff6482fadf8-7ff6482fadff 1412->1416 1413->1396 1414->1396 1415->1416 1418 7ff6482faefd-7ff6482faf04 1415->1418 1419 7ff6482fae00-7ff6482fae04 1416->1419 1423 7ff6482faf44-7ff6482faf6d call 7ff6482d1d10 call 7ff6482e5970 1418->1423 1424 7ff6482faf06-7ff6482faf0d 1418->1424 1420 7ff6482fae43-7ff6482fae4a 1419->1420 1421 7ff6482fae06-7ff6482fae0a 1419->1421 1427 7ff6482fae4c 1420->1427 1428 7ff6482fae59-7ff6482fae62 1420->1428 1421->1420 1425 7ff6482fae0c-7ff6482fae27 call 7ff6482e6230 1421->1425 1423->1392 1424->1414 1429 7ff6482faf13-7ff6482faf3f call 7ff6482d1d10 call 7ff6482e5970 1424->1429 1436 7ff6482fae2c-7ff6482fae32 1425->1436 1427->1428 1428->1419 1434 7ff6482fae64-7ff6482fae68 1428->1434 1429->1396 1438 7ff6482fae6e-7ff6482fae73 1434->1438 1439 7ff6482faf98-7ff6482faf9f 1434->1439 1441 7ff6482faf72-7ff6482faf93 call 7ff6482e5970 1436->1441 1442 7ff6482fae38-7ff6482fae3d 1436->1442 1438->1439 1445 7ff6482fae79-7ff6482fae8a 1438->1445 1443 7ff6482fafa7-7ff6482fafae 1439->1443 1441->1396 1442->1420 1442->1441 1443->1410 1448 7ff6482fafb4-7ff6482fafb7 1443->1448 1445->1443 1450 7ff6482fae90-7ff6482faeb4 memcpy 1445->1450 1452 7ff6482fafc3-7ff6482fafcb 1448->1452 1453 7ff6482fafb9 1448->1453 1450->1448 1454 7ff6482faeba-7ff6482faebf 1450->1454 1455 7ff6482faff3 1452->1455 1456 7ff6482fafcd-7ff6482fafe7 1452->1456 1453->1452 1454->1397 1458 7ff6482faffb-7ff6482faffe 1455->1458 1456->1455 1457 7ff6482fafe9-7ff6482faff1 1456->1457 1457->1458 1459 7ff6482fb004-7ff6482fb035 1458->1459 1460 7ff6482fb120-7ff6482fb128 1458->1460 1465 7ff6482fb0f3-7ff6482fb11e call 7ff6482d1d10 call 7ff6482e5970 1459->1465 1466 7ff6482fb03b-7ff6482fb043 1459->1466 1460->1400 1461 7ff6482fb12e-7ff6482fb139 1460->1461 1461->1400 1462 7ff6482fb13b-7ff6482fb147 call 7ff648315ad0 1461->1462 1462->1396 1470 7ff6482fb0c5-7ff6482fb0c8 1465->1470 1466->1465 1467 7ff6482fb049-7ff6482fb04c 1466->1467 1467->1470 1471 7ff6482fb04e-7ff6482fb055 1467->1471 1473 7ff6482fb0d0-7ff6482fb0d2 1470->1473 1474 7ff6482fb0ca CertFreeCertificateContext 1470->1474 1475 7ff6482fb0c0 1471->1475 1476 7ff6482fb057-7ff6482fb07e memset call 7ff6483184b0 1471->1476 1473->1460 1478 7ff6482fb0d4-7ff6482fb0e5 call 7ff6482e5970 1473->1478 1474->1473 1475->1470 1484 7ff6482fb080-7ff6482fb08a 1476->1484 1485 7ff6482fb0bb 1476->1485 1478->1396 1486 7ff6482fb08c-7ff6482fb096 1484->1486 1487 7ff6482fb0ea-7ff6482fb0f1 1484->1487 1485->1475 1486->1487 1489 7ff6482fb098-7ff6482fb0aa call 7ff6482df0e0 1486->1489 1488 7ff6482fb0b3-7ff6482fb0b6 call 7ff6482e5970 1487->1488 1488->1485 1489->1485 1493 7ff6482fb0ac 1489->1493 1493->1488
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                          • API String ID: 860210379-3059304359
                                          • Opcode ID: 3a96623b7a79f0fd522c26667b77cad6706a34cfff424cc6794582d72b9afb6a
                                          • Instruction ID: b96f2adc44cf74192cfa40ee3875d70e65e485456ddf07e974537891ca92c8e4
                                          • Opcode Fuzzy Hash: 3a96623b7a79f0fd522c26667b77cad6706a34cfff424cc6794582d72b9afb6a
                                          • Instruction Fuzzy Hash: F412AF72608B8286EB21AB39D9503AF37A1FB54B88F144136DB5E97790DF3CE481D784

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1494 7ff6482f9c70-7ff6482f9ce0 1495 7ff6482f9ce2-7ff6482f9cf4 1494->1495 1496 7ff6482f9cff 1494->1496 1495->1496 1497 7ff6482f9cf6-7ff6482f9cfd 1495->1497 1498 7ff6482f9d06-7ff6482f9d20 call 7ff6482e8800 1496->1498 1497->1498 1501 7ff6482f9d22-7ff6482f9d2c call 7ff6482e5af0 1498->1501 1502 7ff6482f9d31-7ff6482f9d38 1498->1502 1501->1502 1504 7ff6482f9d3a-7ff6482f9d5a GetModuleHandleA GetProcAddress 1502->1504 1505 7ff6482f9d78 1502->1505 1504->1505 1507 7ff6482f9d5c-7ff6482f9d72 call 7ff6482e8800 1504->1507 1506 7ff6482f9d7a-7ff6482f9d8b 1505->1506 1508 7ff6482f9db0 1506->1508 1509 7ff6482f9d8d-7ff6482f9da5 1506->1509 1507->1505 1516 7ff6482f9d74-7ff6482f9d76 1507->1516 1512 7ff6482f9db7-7ff6482f9dba 1508->1512 1509->1508 1511 7ff6482f9da7-7ff6482f9dae 1509->1511 1511->1512 1514 7ff6482f9dbc-7ff6482f9dd3 call 7ff6482e8800 1512->1514 1515 7ff6482f9dfb-7ff6482f9e02 1512->1515 1524 7ff6482f9dd5-7ff6482f9de0 1514->1524 1525 7ff6482f9de2-7ff6482f9df6 call 7ff6482e5970 1514->1525 1518 7ff6482f9e06-7ff6482f9e17 1515->1518 1516->1506 1520 7ff6482f9e3c 1518->1520 1521 7ff6482f9e19-7ff6482f9e31 1518->1521 1523 7ff6482f9e43-7ff6482f9e45 1520->1523 1521->1520 1522 7ff6482f9e33-7ff6482f9e3a 1521->1522 1522->1523 1526 7ff6482f9e88-7ff6482f9e92 1523->1526 1527 7ff6482f9e47-7ff6482f9e63 call 7ff6482e0360 call 7ff6482dfd80 1523->1527 1524->1518 1537 7ff6482fa9fd-7ff6482faa26 call 7ff64831f580 1525->1537 1530 7ff6482f9e98-7ff6482f9ec3 1526->1530 1531 7ff6482fa707-7ff6482fa71e call 7ff6482f7900 1526->1531 1555 7ff6482f9e65-7ff6482f9e7d 1527->1555 1556 7ff6482f9e80-7ff6482f9e83 call 7ff6482e0390 1527->1556 1535 7ff6482f9ec5-7ff6482f9edc 1530->1535 1536 7ff6482f9efb 1530->1536 1549 7ff6482fa733-7ff6482fa73d call 7ff6482e5af0 1531->1549 1550 7ff6482fa720-7ff6482fa731 call 7ff6482f7900 1531->1550 1541 7ff6482f9ee5-7ff6482f9eec 1535->1541 1542 7ff6482f9ede-7ff6482f9ee3 1535->1542 1538 7ff6482f9f00-7ff6482f9f0a 1536->1538 1546 7ff6482f9f12-7ff6482f9f1d 1538->1546 1547 7ff6482f9f0c-7ff6482f9f0f 1538->1547 1544 7ff6482f9ef5-7ff6482f9ef9 1541->1544 1545 7ff6482f9eee-7ff6482f9ef3 1541->1545 1542->1538 1544->1538 1545->1538 1553 7ff6482f9f23-7ff6482f9f38 1546->1553 1554 7ff6482fa6ef-7ff6482fa6fe call 7ff6482e5970 1546->1554 1547->1546 1559 7ff6482fa742-7ff6482fa74d 1549->1559 1550->1549 1550->1559 1553->1554 1567 7ff6482fa9f8 1554->1567 1555->1556 1556->1526 1562 7ff6482fa753-7ff6482fa7d4 call 7ff6482e5af0 call 7ff6482e8380 1559->1562 1563 7ff6482fa7d6-7ff6482fa7e8 1559->1563 1566 7ff6482fa7ed-7ff6482fa845 calloc 1562->1566 1563->1566 1569 7ff6482fa860-7ff6482fa863 1566->1569 1570 7ff6482fa847-7ff6482fa851 call 7ff6482e5970 1566->1570 1567->1537 1573 7ff6482fa865-7ff6482fa8c3 1569->1573 1574 7ff6482fa856-7ff6482fa85b 1569->1574 1570->1574 1577 7ff6482fa96c-7ff6482fa988 call 7ff6482e6230 1573->1577 1578 7ff6482fa8c9-7ff6482fa8f8 free 1573->1578 1574->1537 1584 7ff6482fa98d-7ff6482fa9aa 1577->1584 1579 7ff6482fa8fa-7ff6482fa900 1578->1579 1580 7ff6482fa946-7ff6482fa967 call 7ff6482d1d10 call 7ff6482e5970 1578->1580 1582 7ff6482fa902-7ff6482fa91b call 7ff6482d1d10 call 7ff6482e5970 1579->1582 1583 7ff6482fa920-7ff6482fa941 call 7ff6482d1d10 call 7ff6482e5970 1579->1583 1580->1537 1582->1567 1583->1537 1595 7ff6482fa9ac-7ff6482fa9af 1584->1595 1596 7ff6482fa9e9-7ff6482fa9f3 call 7ff6482e5970 1584->1596 1595->1596 1599 7ff6482fa9b1-7ff6482fa9e7 1595->1599 1596->1567 1599->1537
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                          • API String ID: 1646373207-2477831187
                                          • Opcode ID: 2338b05bd6f938158b7bbd3647836caff589d68b3deee7ea365616dd5d438d8c
                                          • Instruction ID: a7bead12df0448d2c4587577983b3bb0d27a0f241c97342f35e8a980f3223cd7
                                          • Opcode Fuzzy Hash: 2338b05bd6f938158b7bbd3647836caff589d68b3deee7ea365616dd5d438d8c
                                          • Instruction Fuzzy Hash: 38029A32A0CB818AEB11BB35DA403EA37A5FB54788F504136DB4E87795DF38E584DB84

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1602 7ff6482db2b0-7ff6482db2fb calloc 1603 7ff6482db43e-7ff6482db447 _errno 1602->1603 1604 7ff6482db301-7ff6482db38a malloc 1602->1604 1605 7ff6482db449-7ff6482db465 1603->1605 1606 7ff6482db38c-7ff6482db3b1 InitializeCriticalSectionEx call 7ff6482f4a60 1604->1606 1607 7ff6482db3c7-7ff6482db3ce 1604->1607 1614 7ff6482db3b7-7ff6482db3bf 1606->1614 1615 7ff6482db466-7ff6482db47a _strdup 1606->1615 1609 7ff6482db3e0-7ff6482db3f1 free 1607->1609 1610 7ff6482db3d0-7ff6482db3da DeleteCriticalSection free 1607->1610 1612 7ff6482db3f3 call 7ff6482f8680 1609->1612 1613 7ff6482db3f8-7ff6482db400 1609->1613 1610->1609 1612->1613 1617 7ff6482db402 closesocket 1613->1617 1618 7ff6482db408-7ff6482db438 free 1613->1618 1614->1607 1615->1607 1619 7ff6482db480-7ff6482db4a0 free _strdup 1615->1619 1617->1618 1618->1603 1620 7ff6482db4a2-7ff6482db4b1 call 7ff6482f8d50 1619->1620 1621 7ff6482db4ce-7ff6482db4d8 1619->1621 1625 7ff6482db4b6-7ff6482db4bc 1620->1625 1623 7ff6482db551-7ff6482db56c free 1621->1623 1624 7ff6482db4da-7ff6482db502 EnterCriticalSection LeaveCriticalSection 1621->1624 1623->1603 1626 7ff6482db515-7ff6482db518 1624->1626 1627 7ff6482db504-7ff6482db50c CloseHandle 1624->1627 1628 7ff6482db50e-7ff6482db510 1625->1628 1629 7ff6482db4be-7ff6482db4cb _errno 1625->1629 1631 7ff6482db522-7ff6482db532 call 7ff6482db130 free 1626->1631 1632 7ff6482db51a-7ff6482db51d call 7ff6482f8da0 1626->1632 1630 7ff6482db538-7ff6482db53b 1627->1630 1628->1605 1629->1621 1634 7ff6482db53d-7ff6482db543 call 7ff6482d5b00 1630->1634 1635 7ff6482db548-7ff6482db54b closesocket 1630->1635 1631->1630 1632->1631 1634->1635 1635->1623
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                          • String ID:
                                          • API String ID: 259767416-0
                                          • Opcode ID: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                          • Instruction ID: dc44c45321dfd77aa59d3006d4d372ffe2d5adbf818b4509ca50c63a4e16e8b2
                                          • Opcode Fuzzy Hash: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                          • Instruction Fuzzy Hash: 8F814A22E09B8182E665FF21E65026A77A0FB98B50F045235DB9E427A2DF7CF4D4C344
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                          • API String ID: 0-760484938
                                          • Opcode ID: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                          • Instruction ID: beb2c7fba79f431e537da085935dc50fa763ab40e084dce58d5f5fe4553b5990
                                          • Opcode Fuzzy Hash: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                          • Instruction Fuzzy Hash: 68429D62A0DB8291EB59BB35D6443BA67E0FB45B84F084135DE5E8B785DF3CE460C388

                                          Control-flow Graph

                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482D1B61,?,?,?,?,00007FF6482C3591), ref: 00007FF6482E18C8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482E1911
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: callocfree
                                          • String ID: <$<$<$`$v
                                          • API String ID: 306872129-2056843887
                                          • Opcode ID: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                          • Instruction ID: 935be667b37a24e952f548a508eacf084646a3516c7320ca48fd17d0ed30a034
                                          • Opcode Fuzzy Hash: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                          • Instruction Fuzzy Hash: 95915972908BC186E301AF34D5043E937A0FB95B5CF085238CE995B79ADFBAA094C764

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,?,00007FF6483124BA,?,?,?,?,00007FF6482E89EB), ref: 00007FF6482E8674
                                          • GetProcAddress.KERNEL32(?,?,00007FF6483124BA,?,?,?,?,00007FF6482E89EB), ref: 00007FF6482E8699
                                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF6483124BA,?,?,?,?,00007FF6482E89EB), ref: 00007FF6482E86AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProcstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 27745253-3327535076
                                          • Opcode ID: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                          • Instruction ID: 98ebf2fba629c6aed970fb95e2a1fb4732954d151cd6c3144574782d3a3ad0b2
                                          • Opcode Fuzzy Hash: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                          • Instruction Fuzzy Hash: 7041B516B0D64286EB16BF76A64017A6791EF46BE1F0C4130CE4D877D4EE3CE886D748

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                          • API String ID: 2911674258-670633250
                                          • Opcode ID: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                          • Instruction ID: 2a8ceb5cb99af05ac0a7ebc73f6c47bb4ee21c00c7917ea28aa2470c47b391f7
                                          • Opcode Fuzzy Hash: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                          • Instruction Fuzzy Hash: 69918F22A18BC186E711EF75D5502ED33A0FB98B88F485236DE4C87659EF38E185CB48

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2074 7ff6482f86d0-7ff6482f86fd getaddrinfo 2075 7ff6482f8894-7ff6482f88a1 2074->2075 2076 7ff6482f8703-7ff6482f8715 2074->2076 2077 7ff6482f8874-7ff6482f887d WSASetLastError 2076->2077 2078 7ff6482f871b 2076->2078 2079 7ff6482f8883-7ff6482f8890 2077->2079 2080 7ff6482f8720-7ff6482f8726 2078->2080 2079->2075 2081 7ff6482f872d-7ff6482f8730 2080->2081 2082 7ff6482f8728-7ff6482f872b 2080->2082 2084 7ff6482f87e1-7ff6482f87e8 2081->2084 2085 7ff6482f8736 2081->2085 2083 7ff6482f8739-7ff6482f873d 2082->2083 2083->2084 2087 7ff6482f8743-7ff6482f874a 2083->2087 2084->2080 2086 7ff6482f87ee 2084->2086 2085->2083 2089 7ff6482f8822-7ff6482f882f 2086->2089 2087->2084 2088 7ff6482f8750-7ff6482f8753 2087->2088 2088->2084 2090 7ff6482f8759-7ff6482f876a malloc 2088->2090 2091 7ff6482f8831 freeaddrinfo 2089->2091 2092 7ff6482f8837-7ff6482f883a 2089->2092 2095 7ff6482f8770-7ff6482f87a5 malloc 2090->2095 2096 7ff6482f881c 2090->2096 2091->2092 2093 7ff6482f886f-7ff6482f8872 2092->2093 2094 7ff6482f883c-7ff6482f883f 2092->2094 2093->2077 2093->2079 2097 7ff6482f8841-7ff6482f8868 free * 3 2094->2097 2098 7ff6482f886a-7ff6482f886d 2094->2098 2099 7ff6482f880b-7ff6482f881a free 2095->2099 2100 7ff6482f87a7-7ff6482f87bd memcpy 2095->2100 2096->2089 2097->2097 2097->2098 2098->2079 2099->2089 2101 7ff6482f87bf-7ff6482f87cc _strdup 2100->2101 2102 7ff6482f87ce-7ff6482f87d8 2100->2102 2101->2102 2103 7ff6482f87f0-7ff6482f8809 free * 2 2101->2103 2104 7ff6482f87de 2102->2104 2105 7ff6482f87da 2102->2105 2103->2089 2104->2084 2105->2104
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                          • String ID:
                                          • API String ID: 2364279375-0
                                          • Opcode ID: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                          • Instruction ID: cdb9a9479455a5c7fdae133512d1646bdd2c022c09b6b9dcf53341072d43a339
                                          • Opcode Fuzzy Hash: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                          • Instruction Fuzzy Hash: D3512D36A0DB4593EA25BF61A65023AA7A1FB54B90F084035CF8E97B50DF3CF844E748

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2106 7ff6482f5fe0-7ff6482f6025 2107 7ff6482f605b-7ff6482f6075 2106->2107 2108 7ff6482f6027-7ff6482f602a 2106->2108 2110 7ff6482f608c-7ff6482f60a7 2107->2110 2111 7ff6482f6077-7ff6482f6087 2107->2111 2108->2107 2109 7ff6482f602c-7ff6482f602f 2108->2109 2109->2107 2112 7ff6482f6031-7ff6482f6034 2109->2112 2113 7ff6482f60ad-7ff6482f60b2 2110->2113 2114 7ff6482f6137-7ff6482f6143 2110->2114 2111->2110 2115 7ff6482f6054-7ff6482f6056 2112->2115 2116 7ff6482f6036 2112->2116 2119 7ff6482f60b4-7ff6482f60be 2113->2119 2120 7ff6482f60c7-7ff6482f60ca 2113->2120 2117 7ff6482f6145-7ff6482f6159 2114->2117 2118 7ff6482f6190-7ff6482f619a 2114->2118 2127 7ff6482f62fd 2115->2127 2125 7ff6482f604b-7ff6482f604e Sleep 2116->2125 2126 7ff6482f6038-7ff6482f6046 WSASetLastError 2116->2126 2128 7ff6482f616f-7ff6482f6171 2117->2128 2129 7ff6482f615b 2117->2129 2123 7ff6482f61d3-7ff6482f61db 2118->2123 2124 7ff6482f619c-7ff6482f619f 2118->2124 2119->2120 2130 7ff6482f60c0-7ff6482f60c5 2119->2130 2121 7ff6482f60cc-7ff6482f60d0 2120->2121 2122 7ff6482f60ed-7ff6482f60f2 2120->2122 2121->2122 2133 7ff6482f60d2-7ff6482f60e6 2121->2133 2134 7ff6482f6104-7ff6482f610e 2122->2134 2135 7ff6482f60f4-7ff6482f60fb 2122->2135 2138 7ff6482f61e2 2123->2138 2139 7ff6482f61dd-7ff6482f61e0 2123->2139 2124->2123 2137 7ff6482f61a1-7ff6482f61a3 2124->2137 2125->2115 2126->2127 2136 7ff6482f62ff-7ff6482f631f call 7ff64831f580 2127->2136 2131 7ff6482f6173-7ff6482f6176 2128->2131 2132 7ff6482f6189-7ff6482f618c 2128->2132 2140 7ff6482f6160-7ff6482f6167 2129->2140 2130->2119 2130->2120 2131->2132 2141 7ff6482f6178-7ff6482f6185 2131->2141 2132->2118 2133->2122 2145 7ff6482f6110-7ff6482f6118 2134->2145 2146 7ff6482f612b-7ff6482f6133 2134->2146 2135->2134 2142 7ff6482f60fd-7ff6482f6102 2135->2142 2137->2123 2144 7ff6482f61a5-7ff6482f61a8 2137->2144 2148 7ff6482f61e4-7ff6482f620e 2138->2148 2149 7ff6482f6210-7ff6482f6213 2138->2149 2147 7ff6482f621a-7ff6482f624a select 2139->2147 2140->2128 2150 7ff6482f6169-7ff6482f616d 2140->2150 2141->2132 2142->2134 2142->2135 2154 7ff6482f61b1 2144->2154 2155 7ff6482f61aa-7ff6482f61ac 2144->2155 2145->2146 2156 7ff6482f611a-7ff6482f6127 2145->2156 2146->2114 2152 7ff6482f6250-7ff6482f625a 2147->2152 2148->2147 2149->2147 2151 7ff6482f6215 2149->2151 2150->2128 2150->2140 2151->2147 2157 7ff6482f6264 2152->2157 2158 7ff6482f625c-7ff6482f625f 2152->2158 2159 7ff6482f61b3-7ff6482f61c1 WSASetLastError 2154->2159 2160 7ff6482f61c6-7ff6482f61d1 Sleep 2154->2160 2155->2152 2156->2146 2161 7ff6482f626d-7ff6482f6270 2157->2161 2162 7ff6482f6266-7ff6482f6268 2157->2162 2158->2136 2159->2152 2160->2152 2163 7ff6482f6272-7ff6482f629a __WSAFDIsSet * 2 2161->2163 2164 7ff6482f629f-7ff6482f62a2 2161->2164 2162->2136 2163->2164 2165 7ff6482f629c 2163->2165 2166 7ff6482f62a4-7ff6482f62b5 __WSAFDIsSet 2164->2166 2167 7ff6482f62ce-7ff6482f62d1 2164->2167 2165->2164 2168 7ff6482f62ba-7ff6482f62c9 __WSAFDIsSet 2166->2168 2169 7ff6482f62b7 2166->2169 2167->2127 2170 7ff6482f62d3-7ff6482f62e4 __WSAFDIsSet 2167->2170 2168->2167 2173 7ff6482f62cb 2168->2173 2169->2168 2171 7ff6482f62e9-7ff6482f62f8 __WSAFDIsSet 2170->2171 2172 7ff6482f62e6 2170->2172 2171->2127 2174 7ff6482f62fa 2171->2174 2172->2171 2173->2167 2174->2127
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                          • Instruction ID: 8b06bacf414cc6352c9f7cd10f7dcf355ea880c1b030cde5cc74d874fb3cf883
                                          • Opcode Fuzzy Hash: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                          • Instruction Fuzzy Hash: 0E911B31B0C6828AEB257E749A502BB6292FF68354F144135EB19C7BC4DF3CEB44D684
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                          • API String ID: 2635317215-3812100122
                                          • Opcode ID: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                          • Instruction ID: 1f260f1bc5f709635dfc9cff9a53077b7e6613cbae4f476ed27da3d3ad043269
                                          • Opcode Fuzzy Hash: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                          • Instruction Fuzzy Hash: 9251B122B0CB8292FA1ABB35E6503BA6790FB44790F140031DB4D877A4DF3DE9919788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: system
                                          • String ID: .8$h%49
                                          • API String ID: 3377271179-4206735779
                                          • Opcode ID: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                          • Instruction ID: 9db5958d95517588d1008e316a9b5974eb17520d88227e347bd2f93e0003957a
                                          • Opcode Fuzzy Hash: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                          • Instruction Fuzzy Hash: 7C613F22E187D689F302EBB8E8451FC7770BB99B48F445368DFC565916EFAC5148C388
                                          APIs
                                            • Part of subcall function 00007FF6482F86D0: getaddrinfo.WS2_32 ref: 00007FF6482F86F2
                                            • Part of subcall function 00007FF6482F86D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F875E
                                            • Part of subcall function 00007FF6482F86D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F8798
                                            • Part of subcall function 00007FF6482F86D0: memcpy.VCRUNTIME140(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F87B1
                                            • Part of subcall function 00007FF6482F86D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F87BF
                                            • Part of subcall function 00007FF6482F86D0: freeaddrinfo.WS2_32(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F8831
                                            • Part of subcall function 00007FF6482F86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F8845
                                            • Part of subcall function 00007FF6482F86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F884F
                                            • Part of subcall function 00007FF6482F86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482DB1F5), ref: 00007FF6482F885C
                                          • WSAGetLastError.WS2_32 ref: 00007FF6482DB1FB
                                          • WSAGetLastError.WS2_32 ref: 00007FF6482DB205
                                          • EnterCriticalSection.KERNEL32 ref: 00007FF6482DB220
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF6482DB22F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DB240
                                          • send.WS2_32 ref: 00007FF6482DB263
                                          • WSAGetLastError.WS2_32 ref: 00007FF6482DB26D
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF6482DB280
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                          • String ID:
                                          • API String ID: 506363382-0
                                          • Opcode ID: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                          • Instruction ID: 17d120fd5f64b9dd74ad10ee43c3405ca3797540c6dde1de8baaf8a365763a46
                                          • Opcode Fuzzy Hash: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                          • Instruction Fuzzy Hash: 43314F32A0C642C6EB41BFB5D55426E27A0EF44B94F544132D95EC3694DF3CE845C784
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                          • Instruction ID: b6e0ba0f67bf95b9e132951ce61da9668774e33dffdaa61ea5a5651ef3f538e1
                                          • Opcode Fuzzy Hash: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                          • Instruction Fuzzy Hash: 8BA10431A1D68386EB697B3497042BA6296FF65B94F444334EB1AC6BC4DE3CD800D78C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                          • API String ID: 3056473165-3891197721
                                          • Opcode ID: 58276ae4104af4279235665e12cd0472266481aaff42abc0abba8617f3f097de
                                          • Instruction ID: 622d2026c9de2318745421c459a230fb40b8f5b564e97d90abb45eabbe16e98b
                                          • Opcode Fuzzy Hash: 58276ae4104af4279235665e12cd0472266481aaff42abc0abba8617f3f097de
                                          • Instruction Fuzzy Hash: 26719F72B08B018AEB10EB75D5506AE37A2FB58BA8F440635DF2D877D4EE38E405C784
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                          • String ID:
                                          • API String ID: 1328870896-0
                                          • Opcode ID: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                          • Instruction ID: 3baeb20a599ae38e4bf45bdf8aa23988ba88cac514d4fa335720e7754b31c3ff
                                          • Opcode Fuzzy Hash: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                          • Instruction Fuzzy Hash: 25316B21E0C64382FA52BBF4E5613F95B91AF45B84F4C4435EE4DCB6D7DE2CE8488288
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s$Connection #%ld to host %s left intact
                                          • API String ID: 1294909896-118628944
                                          • Opcode ID: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                          • Instruction ID: 8a4ceb358555b643dc0e64391359ab337a56a4960bc0e5aad212c897c7a46031
                                          • Opcode Fuzzy Hash: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                          • Instruction Fuzzy Hash: 93917072A0CA8196EB69BB3596407BA67E1FF44B84F484431DE4E87795CF3CE56083C8
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482E11BB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482E11D1
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E0FED
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E100A
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E101E
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E103A
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E1057
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E107A
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E108E
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10A2
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10C8
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10DC
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10F0
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E113F
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E114C
                                            • Part of subcall function 00007FF6482E0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E1175
                                          • memset.VCRUNTIME140 ref: 00007FF6482E1205
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 2717317152-3248832348
                                          • Opcode ID: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                          • Instruction ID: 8c5d87a7c16b9652b7a46c690da46365cc9d40d2dcd26816248b90d33a84fe39
                                          • Opcode Fuzzy Hash: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                          • Instruction Fuzzy Hash: B5717A62A0CAC281E751FF3595503FE27A1FB95B84F084136DB9D9B686DF3CE4818398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$memcpy
                                          • String ID: 1.1
                                          • API String ID: 4107583993-2150719395
                                          • Opcode ID: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                          • Instruction ID: dbb81fc89625edec90da059179de1f5962b29e097ec6f55c0e2c559988a03a9d
                                          • Opcode Fuzzy Hash: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                          • Instruction Fuzzy Hash: 92519E72608B8596E669EF32EA403AA73A5FB54B84F444031CF9E97754CF3CE194D384
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastmallocrecvsend
                                          • String ID: Send failure: %s
                                          • API String ID: 25851408-857917747
                                          • Opcode ID: e7aa3ecffacd2081bbf43444e43266681bc0ee491360cb4430632f44b078b7a1
                                          • Instruction ID: 24be2b3d1aa2f33d933013d86d55ad13f94e75693ff51300c2995d32e361b8a0
                                          • Opcode Fuzzy Hash: e7aa3ecffacd2081bbf43444e43266681bc0ee491360cb4430632f44b078b7a1
                                          • Instruction Fuzzy Hash: C2419022A09B4245EB65BF75EA1077A6690BB09BA8F144235DE6D877C4DF3CD440C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 1294909896-3343404259
                                          • Opcode ID: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                          • Instruction ID: cc7b69e4b7f647ee3eb9583ddf01b4fb6c033ecb45066e44f9a6f5625e2b3f05
                                          • Opcode Fuzzy Hash: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                          • Instruction Fuzzy Hash: 52D1B022A0C68286FB24BF3596443BA27E1FF44B88F045532CE0D97699DF3CE544D388
                                          APIs
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C28A7
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2917
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2977
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C29C7
                                            • Part of subcall function 00007FF6482C2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2A17
                                          • MessageBoxA.USER32 ref: 00007FF6482C3727
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C378A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                          • String ID: keyauth.win$null
                                          • API String ID: 3545939226-2841560827
                                          • Opcode ID: 79ccd1b35729c2f2b7c2be3b61086d29319e1764c5c35db29fb58a3430b23799
                                          • Instruction ID: 98030f7bbbb5c98e637c7d7f06a4e1e39442ce5af7585681efd1601586a629a0
                                          • Opcode Fuzzy Hash: 79ccd1b35729c2f2b7c2be3b61086d29319e1764c5c35db29fb58a3430b23799
                                          • Instruction Fuzzy Hash: 3B51CE22B08B5285FB04FBB5D6193BE2761EF44B88F404534DE4D57A96DF7CD0828388
                                          APIs
                                            • Part of subcall function 00007FF6482E8660: GetModuleHandleA.KERNEL32(?,?,?,00007FF6483124BA,?,?,?,?,00007FF6482E89EB), ref: 00007FF6482E8674
                                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF6482E89EB), ref: 00007FF6483124D0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: AddressCallerHandleModuleProc
                                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                          • API String ID: 2084706301-3788156360
                                          • Opcode ID: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                          • Instruction ID: cccb602d837552b2696e9f3f0c233392f1566bb8965014bdb4e7b55000ddfcd5
                                          • Opcode Fuzzy Hash: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                          • Instruction Fuzzy Hash: 25F03764E0EB4380FE16FBB5A9817B01791AF55B40F8C4434C44CC2A91EE3CA599D348
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 0-3343404259
                                          • Opcode ID: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                          • Instruction ID: cf8ea7b9ac785b01d758ac558b95e6a6e53572764836897ac72fea79e22267ba
                                          • Opcode Fuzzy Hash: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                          • Instruction Fuzzy Hash: 3AB19322A1C6428AFB64BE35965437E2BE0EF41B88F145536CE0E87295DF3DE944D3C8
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482F13D0
                                            • Part of subcall function 00007FF6482F1960: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482F19BA
                                            • Part of subcall function 00007FF6482F1710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482F17A8
                                            • Part of subcall function 00007FF6482F1710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482F17B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$calloc
                                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                          • API String ID: 3095843317-1242256665
                                          • Opcode ID: 576f52932e20a67f69501a890910ecf293095fa115c1143bd2a4251892c664de
                                          • Instruction ID: aad5552fc66a8e0ff4b06688ed454d09500944ff5cbd1e57ed5ec1793b3efeeb
                                          • Opcode Fuzzy Hash: 576f52932e20a67f69501a890910ecf293095fa115c1143bd2a4251892c664de
                                          • Instruction Fuzzy Hash: 5641B331A0C68286EB61FB71A5403BB27A2AF95784F584036DB8CD7685DF3DD404DB84
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: closesocket$calloc
                                          • String ID:
                                          • API String ID: 2958813939-0
                                          • Opcode ID: 6726d0aa8d66446f52f79849a812bac3dfc78dd39627bec9a0ad9fa3862d7e62
                                          • Instruction ID: dd1b7735d4f48ac3a0fff7db784e98cf0e8646361ed2701499aaf108726724a5
                                          • Opcode Fuzzy Hash: 6726d0aa8d66446f52f79849a812bac3dfc78dd39627bec9a0ad9fa3862d7e62
                                          • Instruction Fuzzy Hash: 54415E32A0CA4281E740FF35D6502FA27A1EF98724F984631DE5DC62DAEF78E5458398
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                          • API String ID: 0-3791222319
                                          • Opcode ID: 679e295fc6ef9dac0797c2cd924231e25b208d8f0f9d6fee978d21ac4117f7fd
                                          • Instruction ID: b9728630b81b5e6ea56003b9e954ba5da4ea44fb5d2623bbeb3e90be9c223a72
                                          • Opcode Fuzzy Hash: 679e295fc6ef9dac0797c2cd924231e25b208d8f0f9d6fee978d21ac4117f7fd
                                          • Instruction Fuzzy Hash: 4D51A221B0C69689EB15FB3597443BB6692EF697A8F148231CF2D872D0DE3CE441D788
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freerecv
                                          • String ID:
                                          • API String ID: 2032557106-0
                                          • Opcode ID: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                          • Instruction ID: bbd30006e3ef5112257605bede5637889a00019ae956aa1dff74e8601bd4850d
                                          • Opcode Fuzzy Hash: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                          • Instruction Fuzzy Hash: 98C11732A0C68286EB25BB3596003BB6AD0FF447A4F444235DEAE877C4DF7CE9418784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 1294909896-3248832348
                                          • Opcode ID: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                          • Instruction ID: 7a327010f035d0d7593f5b3850102fe8e7ae0a46be03db5c8497e5be9035cea2
                                          • Opcode Fuzzy Hash: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                          • Instruction Fuzzy Hash: AA517D62A0CAC181E751AF35D1503BA67A0EB94B98F084135EF8D9B3DACF7CD491C398
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastrecv
                                          • String ID:
                                          • API String ID: 2514157807-0
                                          • Opcode ID: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                          • Instruction ID: c481784bacf34a0ede134f81b2a77fe2b5783d8de62cc0da1e0712f60f1a55c2
                                          • Opcode Fuzzy Hash: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                          • Instruction Fuzzy Hash: 28E0DF61F0850542FF2A67F4A95437911909F48772F584774CA3BC63C0DE2C48D24344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: closesocket
                                          • String ID:
                                          • API String ID: 2781271927-0
                                          • Opcode ID: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                          • Instruction ID: d612581609d573500a549c1f532521ce8e0a5635f5b8be6259f35c96d689fa19
                                          • Opcode Fuzzy Hash: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                          • Instruction Fuzzy Hash: E2019212B1D54281EF54FB7AE2983BE2790EF88B84F184031DB0EC7296CE2CD591C788
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: socket
                                          • String ID:
                                          • API String ID: 98920635-0
                                          • Opcode ID: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                          • Instruction ID: 9cd523706a3aad1371710aed37ece72544acb1fcb37ceed424e5f0b461c61a12
                                          • Opcode Fuzzy Hash: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                          • Instruction Fuzzy Hash: B2E0D83AF0A64582DE88BB75C8922BB2360AF55734FC44771C63D473D0DE2CE6969B44
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _beginthreadex
                                          • String ID:
                                          • API String ID: 3014514943-0
                                          • Opcode ID: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                          • Instruction ID: ba0fb7b8abf92d673f40e82a117d588432951a677b84a294aa3a1384779ec343
                                          • Opcode Fuzzy Hash: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                          • Instruction Fuzzy Hash: 1ED02B63B18A00839F10DFB1A84006DE351B788774B4C4338EE7D827E0DF3CD1454604
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ioctlsocket
                                          • String ID:
                                          • API String ID: 3577187118-0
                                          • Opcode ID: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                          • Instruction ID: 45c71889f44103be22027de3c9f50c9f812cfde323200df9c85f28843542f3cb
                                          • Opcode Fuzzy Hash: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                          • Instruction Fuzzy Hash: D8C08027F14581C2D3447FB154850DB6771ABC4204F955435D24B82124DD3CD6E58B44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                          • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                          • API String ID: 2059720140-3844637060
                                          • Opcode ID: f95ef0917ce51c0cb13b4cb9c775ec3e14fb74c515eb4bcdbab68ce709324142
                                          • Instruction ID: 06ab31c99e1077dc25fc235d3bf4793d1f6ccb10ae358ea02d81fd95cefe46f3
                                          • Opcode Fuzzy Hash: f95ef0917ce51c0cb13b4cb9c775ec3e14fb74c515eb4bcdbab68ce709324142
                                          • Instruction Fuzzy Hash: C672C461A0D79286FB62BB35D6403BA2BE0EF54794F480531DE8E826D1DF3CE484D388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$#211$fwrite$#217calloc
                                          • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                          • API String ID: 2742731861-78870445
                                          • Opcode ID: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                          • Instruction ID: 03880568feabdfb4ed40ede464eb7e0c52fa87439ff259e6c5e7e756c561d5d3
                                          • Opcode Fuzzy Hash: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                          • Instruction Fuzzy Hash: 69425E65B0DB4286EB12FBB295542BD23A1FB46B98F484131DE0E97B98DE3CF445C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 1664669839-85532522
                                          • Opcode ID: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                          • Instruction ID: d5d8a6687e10fb274752440f4327a6430313269082de4d6b8680bf81f5969daf
                                          • Opcode Fuzzy Hash: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                          • Instruction Fuzzy Hash: C7A2A472A1CA8695EB11BBB8E5443FE2361FB457A4F404231DA5D87ADADF7CE081C384
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                                          • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                          • API String ID: 1025660337-777782649
                                          • Opcode ID: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                          • Instruction ID: 4b231bc1bc44fc90b82eadcb53101f065c1ce4229fb9a26cc65bd7618f68a6c9
                                          • Opcode Fuzzy Hash: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                          • Instruction Fuzzy Hash: 47126C31A0C68285EB66BFB5A5443BA63A0FB46B98F484135DE4E87798DF7CE440C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 969624648-85532522
                                          • Opcode ID: 4b3d2206014de7f61fa1300ad114516bb9951d61e68c3632b4719bc4a50493be
                                          • Instruction ID: 970ba04ff9b0b66389db54b893fca0ca8204217a30a99b7a4a4257ec5aae5a67
                                          • Opcode Fuzzy Hash: 4b3d2206014de7f61fa1300ad114516bb9951d61e68c3632b4719bc4a50493be
                                          • Instruction Fuzzy Hash: 6D92B462A1CB8586EB11FBB8E5443BE2361FB457A4F401231DA5D87ADADF7CE085C384
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                          • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                          • API String ID: 561913010-2037819326
                                          • Opcode ID: b99ef1342f43ec3ae102a7ff4fd16fab8c957940eb817becddc35c7575eee630
                                          • Instruction ID: c650ebd47d3dd5d94ded5ecab8481909c9ff3bbcbdc09082a85ab350bbfa8763
                                          • Opcode Fuzzy Hash: b99ef1342f43ec3ae102a7ff4fd16fab8c957940eb817becddc35c7575eee630
                                          • Instruction Fuzzy Hash: 7242AD32A0CB4282EB12BBB5E5402BD6BA0FB44B94F584235DE5D87794DF3CE945C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastcallocfreegetsockname
                                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                          • API String ID: 2454324209-2383553807
                                          • Opcode ID: b97dba633d30b4d0c544a2ffe8f3c3dcebe4e1f558373a43b1b957c6b0dbfa42
                                          • Instruction ID: 16e30650852aaee28df70a14400da13c197157c2c5dbcc7d8197cf8c9d9f7bb7
                                          • Opcode Fuzzy Hash: b97dba633d30b4d0c544a2ffe8f3c3dcebe4e1f558373a43b1b957c6b0dbfa42
                                          • Instruction Fuzzy Hash: AA22C761A0C78282EB52BBB5E4502BE67A1FF47788F484031DA4EC769ADF7CE544C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocstrncmp
                                          • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                          • API String ID: 1436789207-471711153
                                          • Opcode ID: 87d8b74bfaf9f01fe411e33134954ef59d3277864874ae862f6e598a426349ef
                                          • Instruction ID: df509d44ac2f00276fb8641c052ccb76b9e4e2b9aa65c816045a044669aac870
                                          • Opcode Fuzzy Hash: 87d8b74bfaf9f01fe411e33134954ef59d3277864874ae862f6e598a426349ef
                                          • Instruction Fuzzy Hash: 1DA1B361B0D78281FA51BB76AA542BA6BD2FF44BD0F484031DE0E97795DE3CE845838C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CreateFile_errnofree
                                          • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                          • API String ID: 1377488173-902404565
                                          • Opcode ID: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                          • Instruction ID: 398a2ed256da8105470b906958407f966df3c08547c6cf7110e791d8b3c0608c
                                          • Opcode Fuzzy Hash: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                          • Instruction Fuzzy Hash: 81B1B161B1C74282E712BBF5E4002BA67A1BF44B94F484136DD8D87B94EE7CF905C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                          • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                          • API String ID: 1339443121-1021110354
                                          • Opcode ID: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                          • Instruction ID: 2093bd04923b5800c8db4fe03c2a82066be90dbb919149b53ad7e480939d2f9f
                                          • Opcode Fuzzy Hash: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                          • Instruction Fuzzy Hash: 64029D62A0D78291EA62FB39A5583BB6794FF85B89F080035DE8D87785DF3CE444C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-4282655970
                                          • Opcode ID: 0f6e02ceec97318be6b8f6dc4e8b7d26f1a3ae136c02508b05c6ed373cd8a422
                                          • Instruction ID: 4b6bda5d2f319614da3b1807c862ec8f97f1384499492f3584cf235467b964aa
                                          • Opcode Fuzzy Hash: 0f6e02ceec97318be6b8f6dc4e8b7d26f1a3ae136c02508b05c6ed373cd8a422
                                          • Instruction Fuzzy Hash: 5A818321B0D64291FB56BB75AA503BA2692BF54B98F484135CB1E877D0EF3CE484E348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-1887299029
                                          • Opcode ID: 15180cf14c634b185d4ef2093e72c7660534080491c5eda22c727618502a933b
                                          • Instruction ID: ea718239e313251545e51c88f65c748068f991d41360111b114c3fc8678c252e
                                          • Opcode Fuzzy Hash: 15180cf14c634b185d4ef2093e72c7660534080491c5eda22c727618502a933b
                                          • Instruction Fuzzy Hash: 93818321B0D64291FB56BF75AA503BA2692BF54B98F484135CB1E877D0EF3CE484E348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup$fclosefgetsfopen
                                          • String ID: $default$login$machine$password
                                          • API String ID: 431015889-155862542
                                          • Opcode ID: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                          • Instruction ID: d4fa7a4d2f560446110a0177dcefee2b65b5c6a574fd4aecf4e4d38507541fff
                                          • Opcode Fuzzy Hash: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                          • Instruction Fuzzy Hash: 86A1A422A0C79285FA62BFB5D56037A6AD0EF95F84F0C4031DE8E86694EF3CE4448748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno
                                          • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                          • API String ID: 3939687465-1752685260
                                          • Opcode ID: 708f498282070d420d337acb99e452de26abb5abd9db17b713cf8609bfd7f0db
                                          • Instruction ID: 37fb7d4e9353712d0b2975c676aec1127e24ed9d41e0a1ae41211175e2a5e7d2
                                          • Opcode Fuzzy Hash: 708f498282070d420d337acb99e452de26abb5abd9db17b713cf8609bfd7f0db
                                          • Instruction Fuzzy Hash: F3519322A0C68286F721BBB0A6443FE7BA4FF44B40F484536DA9D82695DF3CF505C698
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _errno$strtol
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                          • API String ID: 3596500743-988243589
                                          • Opcode ID: d5ea2b37de5eb515f93575f2e8a4e345096032bb43ad1bb4d757d0c498c82414
                                          • Instruction ID: 1cfea739d7f26706c27ce8e8b7fd035f9f8d0ef4b1bcdb217c1f8fabcd6c3bde
                                          • Opcode Fuzzy Hash: d5ea2b37de5eb515f93575f2e8a4e345096032bb43ad1bb4d757d0c498c82414
                                          • Instruction Fuzzy Hash: 8AF1E072F1C5428AEB24BB7885101BE33A2BB64758F904236DF1AA77D4DF3CA805D784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                          • String ID: @
                                          • API String ID: 2041421932-2766056989
                                          • Opcode ID: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                          • Instruction ID: 85d5328b5d4448c188e071fd6a9b2bd61490cbcaebff361283cadc74125210a4
                                          • Opcode Fuzzy Hash: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                          • Instruction Fuzzy Hash: 25318D3261868186EB65EF61E544AAEB761FBD4BC4F048031EF8E93A18CF3CD405DB44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                          • String ID: @
                                          • API String ID: 3606780921-2766056989
                                          • Opcode ID: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                          • Instruction ID: c2f758f3ac54b273786b66ea9a4ed144a9d5d1a96373cf03e1a2f426b3c6858e
                                          • Opcode Fuzzy Hash: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                          • Instruction Fuzzy Hash: 4121643261C68186E761AFA1E45066AB760FBC9B94F445135EA8E47A18CF3CD4058B44
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                          • String ID:
                                          • API String ID: 313767242-0
                                          • Opcode ID: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                          • Instruction ID: f33b1c2fc7312b698ceede2e41b4ee854c51abb78d2795eb88c08a940b09c242
                                          • Opcode Fuzzy Hash: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                          • Instruction Fuzzy Hash: 01312F72608B818AEB61EFA0E8503ED7764FB84744F44443ADA4E87B99EF7CD548C714
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                          • String ID: @
                                          • API String ID: 3016261861-2766056989
                                          • Opcode ID: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                          • Instruction ID: e657a208d55867765ed461a9d8601299d2c185c49da7f26c490f4ed45a2589f4
                                          • Opcode Fuzzy Hash: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                          • Instruction Fuzzy Hash: 1941AE22B086A08EF7119BB5E4503EE3BB0F74A788F084026DE8D57A5ACF3CD11AD754
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: calloc$ErrorLastbind
                                          • String ID: bind() failed; %s
                                          • API String ID: 2604820300-1141498939
                                          • Opcode ID: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                          • Instruction ID: 5eab0e2d374553c14ce846ae435e7c1cbc512488dabf9bd4623d068fad864b4e
                                          • Opcode Fuzzy Hash: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                          • Instruction Fuzzy Hash: 3F51BC72A0CB868AFB16AB75D4543E927A0FB4AB84F084035CA4D8B785DF7CE456CB44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                          • API String ID: 0-2102732564
                                          • Opcode ID: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                          • Instruction ID: f0db8fb294e1d534f0a3675702b5e474b4efc5b2fe2463cb0f293e689315b1e7
                                          • Opcode Fuzzy Hash: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                          • Instruction Fuzzy Hash: F721A491E0D98B83FE14FBB5A7107F602625F94B80EC81432E90E86391EEBC6551D2CC
                                          APIs
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF64832016B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 1848478996-631824599
                                          • Opcode ID: ab1929773185d78aa00c1a2a7ebb499de6df1f4eca2485d34b4072589dd37bee
                                          • Instruction ID: b27bd69220f33372647740a598769cdc564ad2a88431c1a421e4e001ec44eee2
                                          • Opcode Fuzzy Hash: ab1929773185d78aa00c1a2a7ebb499de6df1f4eca2485d34b4072589dd37bee
                                          • Instruction Fuzzy Hash: D4116D32A18B4292E745BBB2D6513B933A0FF04314F084539C64DC2A60EF3CF468C784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireRandom
                                          • String ID: @
                                          • API String ID: 2916321625-2766056989
                                          • Opcode ID: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                          • Instruction ID: 69a7383cc4c589e572d2c03e2ff34792fe1d37b9780c644e1eb4391314e70650
                                          • Opcode Fuzzy Hash: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                          • Instruction Fuzzy Hash: 39F08665B0C68182E710ABA5F54436BE360FFC8BE4F448031DF8C87668DE7CD4858748
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8.2$8117cf7ad254a9a5d0d88f66a496a899a0f91b99fcda9b68c5bcd64eda7e1913$9WIvTVJa9m$https://keyauth.win/api/1.2/$loader principal
                                          • API String ID: 0-222467820
                                          • Opcode ID: 198cf660564fbbd7d4705920a8d0edb8e8ebed0ffb8d8fc4396b7e4d5df849be
                                          • Instruction ID: d09fb14726cc19499c6d059a3aaf1c92a60bcd575cc4fffb49250d7bedb60117
                                          • Opcode Fuzzy Hash: 198cf660564fbbd7d4705920a8d0edb8e8ebed0ffb8d8fc4396b7e4d5df849be
                                          • Instruction Fuzzy Hash: D7124B26D2EB924AF703B77594011B9E7149FA37C4F54D336ED48B1D62EF2DB2828248
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                          • String ID:
                                          • API String ID: 2933794660-0
                                          • Opcode ID: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                          • Instruction ID: a5e41dbd535cde095851eb217984c13fcc977264b9aa6f3b19b76f16448cfbb3
                                          • Opcode Fuzzy Hash: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                          • Instruction Fuzzy Hash: 92113326B18F0189EB00EFB0E8552B833A4F719B58F480E31DA6D86794DF7CE5548344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                          • String ID:
                                          • API String ID: 2110207923-0
                                          • Opcode ID: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                          • Instruction ID: 82753405528d1715bdf7770916aba9931b6fb6e0f1e7421193397fa0808d860e
                                          • Opcode Fuzzy Hash: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                          • Instruction Fuzzy Hash: 64015A3660868182EB50EFB4E55476EB731FB85BD8F188536DB4946A68CF3CD848CB84
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Crypt$AcquireContextCreateHash
                                          • String ID: @
                                          • API String ID: 1914063823-2766056989
                                          • Opcode ID: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                          • Instruction ID: 540509012e864c55441c1d084ff286ebf762b7b6bae01cc2f00150d905e1bdff
                                          • Opcode Fuzzy Hash: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                          • Instruction Fuzzy Hash: 0FE0D861B1869243F7206BB1E401F5A6350FB94B88F488031CF4C47A18CF3CD0418B48
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _getpidhtons
                                          • String ID:
                                          • API String ID: 3416910171-0
                                          • Opcode ID: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                          • Instruction ID: a3ddb892f0c2f919f3a1472a93641e009bcb9679ef556ea97db441b33a672b58
                                          • Opcode Fuzzy Hash: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                          • Instruction Fuzzy Hash: A5112A26A287D0CAD304DF75E5001AD77B0FB58B88F04962AFB8987B19EB7CD690C744
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@
                                          • String ID:
                                          • API String ID: 1029415015-0
                                          • Opcode ID: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                          • Instruction ID: e87d4acfe0b5997ac33f26beb7cf6466abe32afbe27794e3eb704aa866cc0263
                                          • Opcode Fuzzy Hash: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                          • Instruction Fuzzy Hash: 46818D62B09B9989EB00EB79D4843BD37B0E715B88F984026DF4E97796DF39D081C384
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@
                                          • String ID:
                                          • API String ID: 1029415015-0
                                          • Opcode ID: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                          • Instruction ID: 2758bdc5fff72e016ea474cacf7ea436efef3604cdd74ab1e530fa0919946fa0
                                          • Opcode Fuzzy Hash: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                          • Instruction Fuzzy Hash: D981AD66B19B9989EB00EB79D0843BD3BB4E719B88F584422CF4D87796CF39D081C394
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                          • Instruction ID: 9cd377626f205f94810892442cfd42c52c003e6001d31734a6c7fa21c8c80c8d
                                          • Opcode Fuzzy Hash: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                          • Instruction Fuzzy Hash: 93610362B0DB8882EA10EB29E54427A63A1FB597D4F109235DF5D87B89EF3CE041D744
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction ID: d2ff6923fffca0b598910b26649e3c982845d9ded6c75c15994ae2b301fe7650
                                          • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction Fuzzy Hash: 6AF08C25724767BEFE01853B4624FBD1E419BD0B40FA77974CC80420CB8A9F5493D714
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                          • Instruction ID: c253c596fd21983b7f4979928796f6033eb4f98f550d047d35db9131688cfe4d
                                          • Opcode Fuzzy Hash: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                          • Instruction Fuzzy Hash: 72A00265A099458097115755E650D555650F7987657559031C50D45410CD2995458244
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                          • Instruction ID: 45b2505b9f5c2bdcc0ef46984285c702a860534a71e99160d449ddd0dc22fb24
                                          • Opcode Fuzzy Hash: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                          • Instruction Fuzzy Hash: 35A0022191CC02D1E606FBE0EA500742735FB55740B490431D51EC10609F7CB900C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strcmp$strncpy$strchr
                                          • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                          • API String ID: 1395212091-3550120021
                                          • Opcode ID: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                          • Instruction ID: e96659a0dc2914e726681a2d5e3e1802dae3081560935b4845022e1c84816edc
                                          • Opcode Fuzzy Hash: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                          • Instruction Fuzzy Hash: 63121F10F1C66390FB12F7B5DA505FA2266AF2035CF845032EA0EC65D9EE2CE519E7C8
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$CounterPerformanceQuery
                                          • String ID: Closing connection %ld
                                          • API String ID: 3490100708-2599090834
                                          • Opcode ID: b9841c2d2f7e244eaf557c7957d55c27c61e3d7d63ad313c88b15d1e5c17b3dc
                                          • Instruction ID: e7ec1ba4b3de839f7a2898dcdd20119a263279519ab93c146be4c9a27703de65
                                          • Opcode Fuzzy Hash: b9841c2d2f7e244eaf557c7957d55c27c61e3d7d63ad313c88b15d1e5c17b3dc
                                          • Instruction Fuzzy Hash: 00C10A7590CB8282E741BF31E9902AD3364FB85F98F084231DE9E87799CF3C95968358
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                          • API String ID: 1294909896-2200874227
                                          • Opcode ID: 2ec97d5793b2a055e3b496001f5adaffbf27f7ecb529a76ec01f4e511673b300
                                          • Instruction ID: 828fb57fdf8eca9e5608640c0d12844db59084fc29f59a1c048a7c9d80ebcc25
                                          • Opcode Fuzzy Hash: 2ec97d5793b2a055e3b496001f5adaffbf27f7ecb529a76ec01f4e511673b300
                                          • Instruction Fuzzy Hash: 87029061A0DB8281FA66BBB5E9403FA2391EF46780F480035CE4DC7799EF3DE5458798
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy$htonl
                                          • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                          • API String ID: 82385936-242323837
                                          • Opcode ID: 5ccaf9b6bd47add414f92efa479d141dd7631a221141d7cb2d10b0ad0c26a9f5
                                          • Instruction ID: 9f47b8b2b645f96e7f6f60a62b55dc57cf6a1b2f83450e7e9a8559288cb73cf7
                                          • Opcode Fuzzy Hash: 5ccaf9b6bd47add414f92efa479d141dd7631a221141d7cb2d10b0ad0c26a9f5
                                          • Instruction Fuzzy Hash: 76C14C72A1CB4286EB51BBB5E8902AD7BA0FB45B84F084435DE4E87B54DF3CE845C744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 1391767211-579821726
                                          • Opcode ID: 2b25a70388e658df558de5c10f1f6de355e433b31a00a9922361f82aacf7a162
                                          • Instruction ID: 624e6aaab06703243ea0658d24a549f7243c7294161b283c5dab92e0b003dff8
                                          • Opcode Fuzzy Hash: 2b25a70388e658df558de5c10f1f6de355e433b31a00a9922361f82aacf7a162
                                          • Instruction Fuzzy Hash: 1022B362A1CB8585EB11BBB8E9443FE2361FB457A4F504232DA5D87AD6DF7CE081C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: calloc$_strdupfreehtonsmemset
                                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                          • API String ID: 130798683-4053692942
                                          • Opcode ID: 56bba87fc7c51af6d924c74d1b1b2e1982686a9a0faedffc57aa1329a3a47c90
                                          • Instruction ID: 519f234722d20a5d2bb6617482148fd9bd2ac48a10fc16b6f76b5e092eada76c
                                          • Opcode Fuzzy Hash: 56bba87fc7c51af6d924c74d1b1b2e1982686a9a0faedffc57aa1329a3a47c90
                                          • Instruction Fuzzy Hash: C4E18C32A0C68686EB61FFB5D5403BA7BA0FB44B84F484135DA8E87A48DF3CE545C744
                                          APIs
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DB96
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DBBC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DBCD
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DC3B
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DC6C
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DC8C
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DC9E
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DD00
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DD71
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DD88
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DE43
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DEB7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF64830D2CF), ref: 00007FF64830DEC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$free$_strdupcalloc
                                          • String ID: LDAP$base$one$onetree$sub$subtree
                                          • API String ID: 112326314-884163498
                                          • Opcode ID: 0558161d3525c0c5b2a966061e87bab19ec401be3912131fe2ef438a4881e9cb
                                          • Instruction ID: 4c0f5833962070bdb808808dfa73f6519c3eca7219dbe2a693ea2858d55fda14
                                          • Opcode Fuzzy Hash: 0558161d3525c0c5b2a966061e87bab19ec401be3912131fe2ef438a4881e9cb
                                          • Instruction Fuzzy Hash: BCB16F26A0DB8292EA56BB75955027A27D0FF96B80F4C4235DE4D87B88EF3CF445C708
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memchrstrtol
                                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                          • API String ID: 1626215102-895336422
                                          • Opcode ID: 590790d0129b1d5c45be9896e4dc915168101e99f472bba4d13294d82c54f45f
                                          • Instruction ID: 01da8bad1f2363c0366ff19a35e29837e8698d4d7c2681e1f977e7427e2f0a9d
                                          • Opcode Fuzzy Hash: 590790d0129b1d5c45be9896e4dc915168101e99f472bba4d13294d82c54f45f
                                          • Instruction Fuzzy Hash: AB61D160B0C64695EA16FBB6A5002FA6350AF42BE0F484671D95EC77E9DF3CE105C788
                                          APIs
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5757
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5763
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC094
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC09C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC0C3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC0CC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC150
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DC159
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                          • API String ID: 1294909896-1595554923
                                          • Opcode ID: 300bd899a9cef0cdbabd0a11104f44b44084b0c6fc07b8b834b64faa677ac54b
                                          • Instruction ID: 41c10da5b33b7bf896ff8b7d1a854e4143d5dd29f00feae426a649a4c351c8db
                                          • Opcode Fuzzy Hash: 300bd899a9cef0cdbabd0a11104f44b44084b0c6fc07b8b834b64faa677ac54b
                                          • Instruction Fuzzy Hash: BDE18222A0C79295FAA5BB3296102BA6BD0FF45B84F884435DE4DC7781DF3CE855C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                          • API String ID: 1294909896-115817326
                                          • Opcode ID: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                          • Instruction ID: bff65cdd16eb75500b5b2fda336a43b0b83b5c7f57db8c2a01bf8730bf1a92ee
                                          • Opcode Fuzzy Hash: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                          • Instruction Fuzzy Hash: C1919E21E0CE9291FA61FB7196503BA2391EF61B94F184032DB4C877A1EF7CE855D788
                                          APIs
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                          • memcpy.VCRUNTIME140 ref: 00007FF6482C6486
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6482C6518
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6482C6559
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C66A3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C66E2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C6730
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C6771
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C67CE
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C6888
                                            • Part of subcall function 00007FF64831F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6482C43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF64831F20A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C68C9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C6996
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C69D7
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482C69FA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                          • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                          • API String ID: 264867259-3075834232
                                          • Opcode ID: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                          • Instruction ID: 334247f72ab1d2950cf544a81bf19499786d7fdbd0692b2b5a04d274f118a757
                                          • Opcode Fuzzy Hash: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                          • Instruction Fuzzy Hash: AF12D362E0CA4645EB11BBB4E6043BE2761EB447E8F144735DA6D836DADF7CE184C388
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                          • String ID:
                                          • API String ID: 1087521380-0
                                          • Opcode ID: be88be890d69c48f3ab97c3fa41fe16f5b033f2fd1f21b873e75df2716961dc1
                                          • Instruction ID: f512b3d7452acf3f0bf313830cc669475a2e00e7ec40cf1786c13e92f454aaef
                                          • Opcode Fuzzy Hash: be88be890d69c48f3ab97c3fa41fe16f5b033f2fd1f21b873e75df2716961dc1
                                          • Instruction Fuzzy Hash: 22B1AE65A0EB5255EA57BF75A65037A2BD0EF45B94F080130DE4E83781DF3CE894C398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchrstrrchr$_strdupstrstr
                                          • String ID: .$/$/$/$?
                                          • API String ID: 2325335452-1821401756
                                          • Opcode ID: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                          • Instruction ID: 0817f61b6c0033aa91cc31bd48b20ed6b07a405f81d6a6caa4ed74e554727486
                                          • Opcode Fuzzy Hash: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                          • Instruction Fuzzy Hash: 9781BD12F0C28285FB67BBB195103796B91AF87784F4C4475DE8D8A7CADE3CE8458308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$free
                                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                          • API String ID: 3578582447-31095704
                                          • Opcode ID: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                          • Instruction ID: a417d69853c5194d2eeba8025eed45893f44716c9755de8eab20e1ba3128370f
                                          • Opcode Fuzzy Hash: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                          • Instruction Fuzzy Hash: 2C818F21A0C68284FF27BBB299502B96395AF47BC8F8C4071DE4D87799DE2CF505C758
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                          • Instruction ID: a0b6cc60168a746fad079360342caab7039f198b698ab513bb44b79afc004698
                                          • Opcode Fuzzy Hash: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                          • Instruction Fuzzy Hash: F491B576618B81A3E74AAF31D9902AC7368F749F48F080135EF9D47755CF38A6A5C314
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                          • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                          • API String ID: 3103143820-2414412286
                                          • Opcode ID: e3891626471682f6b1a9a5526d2baab70864a2c76d2e9b59f3580da1619b8368
                                          • Instruction ID: a5e133e2934d200782e2ef8011014f526a1642cef28d1a1ecee2e4ef5d8818f7
                                          • Opcode Fuzzy Hash: e3891626471682f6b1a9a5526d2baab70864a2c76d2e9b59f3580da1619b8368
                                          • Instruction Fuzzy Hash: 01D19722B0C68252EA66FB75D5402BAB7A0FF47784F480036DB4D83A59DF3CE564C749
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                          • API String ID: 1294909896-874090715
                                          • Opcode ID: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                          • Instruction ID: 019ab164f88391d2f1d85be88dfeedbc7a31af8698bb23f7f1ef9d4f918b4868
                                          • Opcode Fuzzy Hash: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                          • Instruction Fuzzy Hash: EFA16B62F0CE4285FB11FBB1EA406BE27A4AB44794F494532DE0D97A95DF3CE944838C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                          • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                          • API String ID: 2243338858-131330169
                                          • Opcode ID: 9dcf305a52cd3e23aaf1153be538e4d3e6a8ad2efff6f173cfe376763f3954e1
                                          • Instruction ID: cf12e3b63b15050b55f4ba0a89811b83a18b936eec68ade7943abbb0ca0d8e84
                                          • Opcode Fuzzy Hash: 9dcf305a52cd3e23aaf1153be538e4d3e6a8ad2efff6f173cfe376763f3954e1
                                          • Instruction Fuzzy Hash: 6D91D621B0D78282EA56BBB9D4543B923E0FB47B80F5C4435DA4E83B99DF3CE4558705
                                          APIs
                                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA403
                                          • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA47D
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA4A1
                                          • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA4F0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA52A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA53C
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA54F
                                          • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA56A
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA580
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482E10B9,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482DA589
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                          • API String ID: 1368378007-4087121635
                                          • Opcode ID: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                          • Instruction ID: ad22b46deb00aba31452a398a64704006a3d64df21f2e34b837f36f56da41545
                                          • Opcode Fuzzy Hash: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                          • Instruction Fuzzy Hash: D651A311E0D64251FE65BB75AA146BB27E1BF85BC4F484430DD4FC6791EE3CE8858388
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                          • API String ID: 0-3760664348
                                          • Opcode ID: d637e8b93964d19652cbde8d3f989b517b3b87a2f501727801d216937b0aa004
                                          • Instruction ID: 958f00f070261b727cd6aee8536219bef7bdb92426b9ef8f116931d3298019a8
                                          • Opcode Fuzzy Hash: d637e8b93964d19652cbde8d3f989b517b3b87a2f501727801d216937b0aa004
                                          • Instruction Fuzzy Hash: 34E1F16290C2C28AEB55BB35D2403BA7BA1FB49784F088136DB4E87795DF3CE544D788
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C55CE
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482C55FC
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482C560A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C5644
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C5695
                                          • memset.VCRUNTIME140 ref: 00007FF6482C54C3
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                            • Part of subcall function 00007FF6482C6310: memcpy.VCRUNTIME140 ref: 00007FF6482C6486
                                            • Part of subcall function 00007FF6482C1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2121
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C5802
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482C582E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482C583C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C5877
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C58CA
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C59B1
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6482C59C9
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6482C59D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                          • String ID: value
                                          • API String ID: 2102519606-494360628
                                          • Opcode ID: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                          • Instruction ID: 3d4c95737ceb83a6c4cece0cc60835d6707693840d62a9996c6c2f5468739bca
                                          • Opcode Fuzzy Hash: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                          • Instruction Fuzzy Hash: 4CF1D822A0CA8285EB11FB74E5443BE6760FB857A4F145331EAAD43AEADF3CD185C744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                          • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                          • API String ID: 2572311694-3353508759
                                          • Opcode ID: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                          • Instruction ID: b85d409371579f7043ab8f96303b5e2f06db062d53f9d5539263def5726d2c29
                                          • Opcode Fuzzy Hash: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                          • Instruction Fuzzy Hash: 3AB19261A0CA8285EB61BB35DA103BA2392FF94B94F484032DE4DC7794DF3CD945D788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup
                                          • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                          • API String ID: 1922034842-2519073162
                                          • Opcode ID: 7e1ad2abd64872e1a6c8b3d4c2903b2d40eb7b32a9edbe3065d4335cf41a8063
                                          • Instruction ID: 2010daeb5e43c4813cb0a14463b1f1ef6e66ed9979847e32e8111066a1bae6d8
                                          • Opcode Fuzzy Hash: 7e1ad2abd64872e1a6c8b3d4c2903b2d40eb7b32a9edbe3065d4335cf41a8063
                                          • Instruction Fuzzy Hash: 8C91A521A0C68281FB63BB31D6503BA6792AF64B84F894031CF4DD7685EE2DE541E389
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF64830FD2F), ref: 00007FF64831D02D
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF64830FD2F), ref: 00007FF64831D04F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF64830FD2F), ref: 00007FF64831D060
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF64830FD2F), ref: 00007FF64831D08E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: ../$/..$/../$/./
                                          • API String ID: 111713529-456519384
                                          • Opcode ID: 190f5f5efba5df30148cf3e06b309bf7ce750d830b12a83570053c044d9442d2
                                          • Instruction ID: 2c1d227e8e756b25a547fa66cb467069a8dbd6d6908e7c3f19259bd3dceefe03
                                          • Opcode Fuzzy Hash: 190f5f5efba5df30148cf3e06b309bf7ce750d830b12a83570053c044d9442d2
                                          • Instruction Fuzzy Hash: F371B421E0C69241FBA3BBB1A500279BFA0AB57FA4F0C4131CA6D866D1DE3CF456C309
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID:
                                          • API String ID: 2653869212-0
                                          • Opcode ID: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                          • Instruction ID: 8d23c88251524fda09d18ef336654e791bd308e65d7a3643b8ae8993b56dff69
                                          • Opcode Fuzzy Hash: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                          • Instruction Fuzzy Hash: FAB17C36A0EB8296EA65AF65E64036A37E1FF44B14F184135CF8D87B50DF3CE4649388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                          • API String ID: 111713529-3006446216
                                          • Opcode ID: 855c74e2298b12dfae87e416f71bfb0fd242813ebbe9111dfcebbe4282bd71ec
                                          • Instruction ID: 5b54d09a10edfa69e5d10abe48a66b7610654a480d536f837a0d8286ec1b6ac0
                                          • Opcode Fuzzy Hash: 855c74e2298b12dfae87e416f71bfb0fd242813ebbe9111dfcebbe4282bd71ec
                                          • Instruction Fuzzy Hash: F571C767E0D6C155EB53BBB994042BA7FA0EF46B48F5C4432CA4D83362DE2CD54AD309
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                          • API String ID: 2190258309-1086287758
                                          • Opcode ID: 59aae337aff638c80ea522d502be7416802ba366a363efdf939df804e7f274dd
                                          • Instruction ID: b3e6c27b653b1ab6ac2a720a466f61754a209611c74e9c9628abb5a5349f0f73
                                          • Opcode Fuzzy Hash: 59aae337aff638c80ea522d502be7416802ba366a363efdf939df804e7f274dd
                                          • Instruction Fuzzy Hash: 27B13A72A0CB4686EB11BBB5E8802AD77A0FB48B98F481135DE4D87B58DF3CE945C744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                          • API String ID: 1294909896-1220118048
                                          • Opcode ID: ee4d974dc3b3459793741b3c071e06878cee760591840d70200e270625e77535
                                          • Instruction ID: a1224e6a352e006cd68d0dd98b61afa8b8ce1a637c6264bb0ec20968194f9761
                                          • Opcode Fuzzy Hash: ee4d974dc3b3459793741b3c071e06878cee760591840d70200e270625e77535
                                          • Instruction Fuzzy Hash: 89716FA1B0D74642EA12FBB1A5401F96790FF88B80F584132DE4D8778AEF3CE641C688
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloctolower
                                          • String ID: %%%02x
                                          • API String ID: 1244608590-4020994737
                                          • Opcode ID: e50ef931bf97fd6978a02dacd3bdcb8e3fa39a162dbfd03a69ca58af84868c80
                                          • Instruction ID: 0126a33cb9a451a78cef6db86d9ce95952d746a2d68c7b0929d2e532904127ef
                                          • Opcode Fuzzy Hash: e50ef931bf97fd6978a02dacd3bdcb8e3fa39a162dbfd03a69ca58af84868c80
                                          • Instruction Fuzzy Hash: E6A1B112E0D28245FB67BBB195103796BE0AF47B85F0C8471EE8EC67C9DE2DE4059318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcmp
                                          • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                          • API String ID: 1475443563-555813803
                                          • Opcode ID: 5e11bfa2a84c0bb5aa158c4cf855aa4d81f042b1f6a2de6bc2e49222ceafe7f8
                                          • Instruction ID: 99d3138f4e684d9ac2ccdd88cab10fe5f22f6c461efa787eeb3f265dc6e034c7
                                          • Opcode Fuzzy Hash: 5e11bfa2a84c0bb5aa158c4cf855aa4d81f042b1f6a2de6bc2e49222ceafe7f8
                                          • Instruction Fuzzy Hash: D8D1C121E0C24342FBA27F35D6442BA6792AF21754F885032DB5DC65C5EF6CF842E389
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                          • API String ID: 1294909896-2312071747
                                          • Opcode ID: a239f058e62c514e76706a9140ba831bcd74617e94364339e7ba736567eb66f4
                                          • Instruction ID: bd77f46c9b5c98644430a10261635e7872d9abb6b218df6e44772b7ce3f7727a
                                          • Opcode Fuzzy Hash: a239f058e62c514e76706a9140ba831bcd74617e94364339e7ba736567eb66f4
                                          • Instruction Fuzzy Hash: 0DD1D322A0C68646EA66BFB591403FE6251FB43394F480236DB6D836C6DF7CE885C348
                                          APIs
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                            • Part of subcall function 00007FF6482C6310: memcpy.VCRUNTIME140 ref: 00007FF6482C6486
                                            • Part of subcall function 00007FF6482C1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2121
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC0E0
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482CC10E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482CC11C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC156
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC1B3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC26C
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482CC29A
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6482CC2A8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC2E2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC333
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482CC37D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                          • String ID: value
                                          • API String ID: 3212548336-494360628
                                          • Opcode ID: 9efa30662b9e0125733c549c7ddb0404d6325bb906536454243b4d6c7a755523
                                          • Instruction ID: 2cbffb61b76804622eff703d5b68dbf99aface1eef408e3d7a1bae684b1eede8
                                          • Opcode Fuzzy Hash: 9efa30662b9e0125733c549c7ddb0404d6325bb906536454243b4d6c7a755523
                                          • Instruction Fuzzy Hash: 43A19562A1CA8581EB01BBB8E5443BE6361FB457B4F041331EA6D83AD9DF7CE081D744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                          • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                          • API String ID: 4109794434-4095489131
                                          • Opcode ID: 992fbeba35ba7d9cfd174204178d183b8fb1cad6507cabc141d8163f4fd3fce8
                                          • Instruction ID: 64a125436893816ec5ef8b06b95ee9bd990c9f6ca686d1dee80394f2ee119bc0
                                          • Opcode Fuzzy Hash: 992fbeba35ba7d9cfd174204178d183b8fb1cad6507cabc141d8163f4fd3fce8
                                          • Instruction Fuzzy Hash: 3E61C322A0D78291EA55BB359604BBB2BD4FF85B84F484035DE8E87781DF3DE485D388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                          • String ID: Unknown error %d (%#x)
                                          • API String ID: 4262108436-2414550090
                                          • Opcode ID: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                          • Instruction ID: a6861ed167b6228fcbec78a410349f7dd0ae33e48943c3ed4cbb1a3a69f5784f
                                          • Opcode Fuzzy Hash: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                          • Instruction Fuzzy Hash: 49318121A0C74285FA1A7FB1AA2427E6AD1EF84F80F4C0435DE4E87795DE3CF8018398
                                          APIs
                                          • memset.VCRUNTIME140 ref: 00007FF648309D8B
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF648309EB5
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5757
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5763
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF648309E6F
                                            • Part of subcall function 00007FF6482D5690: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6482D56A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freestrncpy$_strdupmemset
                                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                          • API String ID: 3826632026-748038847
                                          • Opcode ID: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                          • Instruction ID: b2a30f5a15742bef5452b4310ff3aae356df5bfc19f4a33a564b289408bc96c0
                                          • Opcode Fuzzy Hash: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                          • Instruction Fuzzy Hash: 2C714B32A0CAC695FB22BF64D5417EA6360FF86788F884032DE8D87259EF78D545C784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: sendto$ErrorLast
                                          • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                          • API String ID: 4042023021-4197595102
                                          • Opcode ID: 50e73455d7e3a75b11b53e943120c7777fc9fe00b525068e7abcedd1a1672a85
                                          • Instruction ID: 1c0c63a4c2d94779f763529ed8ddccec2210e7ddaf17e5aea7e8bba39710a1b7
                                          • Opcode Fuzzy Hash: 50e73455d7e3a75b11b53e943120c7777fc9fe00b525068e7abcedd1a1672a85
                                          • Instruction Fuzzy Hash: C5B16D7260C682C6EB66AF79D4407A937A0FB8AF89F484132DE4D8B758DF38E441C754
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: sendto$_time64
                                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                          • API String ID: 2327272419-1785996722
                                          • Opcode ID: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                          • Instruction ID: b987be33e474967f0560bc997d0a6b761b26849ebf2c3e520e9d509b8d9a481c
                                          • Opcode Fuzzy Hash: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                          • Instruction Fuzzy Hash: 7A914A3661C681C6D752EF79D4503A93BA0FB89F88F488132DA4D8B758DF39E406C754
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup$freestrchrstrncmpstrtol
                                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                          • API String ID: 2070079882-2404041592
                                          • Opcode ID: 0d1e06a6d0f9712c3ca27df683fb699d76da4af6e053dfbf71b887b8ca41c8f6
                                          • Instruction ID: c6fd392c6afe37b11547c3310799092176e221641aafc66b64e628e6fe05781f
                                          • Opcode Fuzzy Hash: 0d1e06a6d0f9712c3ca27df683fb699d76da4af6e053dfbf71b887b8ca41c8f6
                                          • Instruction Fuzzy Hash: 4E51F561A0C69345EB26BB3A95683BB67E1AF01B95F4C4031DA4D866C1DE3DE4468388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                          • String ID: Set-Cookie:$none
                                          • API String ID: 4109794434-3629594122
                                          • Opcode ID: c845ef27a6eb0f70cfb5e5d8d0ec943c7a71320ffd18cdb9581be7247b181f35
                                          • Instruction ID: d64b6bf984a073c423d3ae7d0f6309300bd834aa593931527d888117f03fe645
                                          • Opcode Fuzzy Hash: c845ef27a6eb0f70cfb5e5d8d0ec943c7a71320ffd18cdb9581be7247b181f35
                                          • Instruction Fuzzy Hash: B351E421A0C79255FA67BB316A102BB6AD0AF45B80F584434EE8E837D1DF3CE445C388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                          • API String ID: 3510742995-1652449680
                                          • Opcode ID: 6c3bbffbfaa8afe039b59d5f2ad093e3cc1498ca40d8528e7d0893ab42bc7699
                                          • Instruction ID: 3fa0e47d3ac7de2bbbe8bce916997944e1024840a88d1c3eecf96b4440cf8753
                                          • Opcode Fuzzy Hash: 6c3bbffbfaa8afe039b59d5f2ad093e3cc1498ca40d8528e7d0893ab42bc7699
                                          • Instruction Fuzzy Hash: D4A18F32A0CA8681E751FF71DA403FA2391EB85B94F480531DE5E9B295EF7CE541C398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                          • API String ID: 1294909896-3146291949
                                          • Opcode ID: 2bc415dddcf2fbc5f9affb62417552fc3cfeb8ceedfac8cd1da88004e01584b9
                                          • Instruction ID: 29eb02c52f74efb6191b49d69343a3c1bd468bf215a839e7d40c0adfb5f9702f
                                          • Opcode Fuzzy Hash: 2bc415dddcf2fbc5f9affb62417552fc3cfeb8ceedfac8cd1da88004e01584b9
                                          • Instruction Fuzzy Hash: B0913E61B0CA4286FB65BB31D6903BB2392EF65B84F544035DF4E87685DF6CE844E388
                                          APIs
                                            • Part of subcall function 00007FF6482C2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2469
                                            • Part of subcall function 00007FF6482C2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C24A8
                                            • Part of subcall function 00007FF6482C4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                            • Part of subcall function 00007FF6482C3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C3BF6
                                            • Part of subcall function 00007FF6482C5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5E61
                                            • Part of subcall function 00007FF6482C3C30: memcpy.VCRUNTIME140 ref: 00007FF6482C3C83
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2121
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2171
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C21C2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2202
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2254
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2293
                                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF6482C22E6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2337
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                          • String ID: parse error$parse_error
                                          • API String ID: 2484256320-1820534363
                                          • Opcode ID: 796c5f3307eb32e0ad6337efd212abd60be5357c1e3d7b385b4cd24bde934b85
                                          • Instruction ID: 2d675cb0cb6b9a4e87e4061f78b1364384fbbd5429caee8f1909e0fc77deaf3f
                                          • Opcode Fuzzy Hash: 796c5f3307eb32e0ad6337efd212abd60be5357c1e3d7b385b4cd24bde934b85
                                          • Instruction Fuzzy Hash: 41B18262A08B4585FB11EBB4E5443AE3761EB847A8F145621EA6D43AEADF7CE0C0C344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$_time64calloctolower
                                          • String ID: :%u$Shuffling %i addresses
                                          • API String ID: 133842801-338667637
                                          • Opcode ID: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                          • Instruction ID: 014d183ca9f039de2ba331ebe282447c3c4e6ff794c6cc0f75493d55742844aa
                                          • Opcode Fuzzy Hash: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                          • Instruction Fuzzy Hash: 11719D76A0CA8281EB61BF31E6447BA63A1FB48B94F444532DE4E87794EF3CE445C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                          • API String ID: 1865132094-1312055526
                                          • Opcode ID: eedddef45915e7ee78f04db88568bb3b1bf7b9df837a40408026672cc07be263
                                          • Instruction ID: 1e895fb0cae9685f210c65b25b8d02c5813cec5618314e860c2ab75b0678fd87
                                          • Opcode Fuzzy Hash: eedddef45915e7ee78f04db88568bb3b1bf7b9df837a40408026672cc07be263
                                          • Instruction Fuzzy Hash: 0D719062A0C68380E760BB79D5403BE27E1EB85B94F5C0535DE4D8BA99CF3DD881839D
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E0FED
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E100A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E101E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E103A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E1057
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E107A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E108E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10A2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10C8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10DC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E10F0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E113F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E114C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E1175
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                          • Instruction ID: cf9ef304fde84d8cdf9837916d50cd62908266d4135e5c81780e2a07d5046cdc
                                          • Opcode Fuzzy Hash: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                          • Instruction Fuzzy Hash: 0D51D672A0DA8291EB14BF71D9902FE23A0FF84F95F0C4031DE4E8B655CE3C948583A8
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F0FB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F161
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F16F
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F26D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F2D6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F2EE
                                            • Part of subcall function 00007FF64830E240: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64830E250
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F316
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F32D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F352
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F39F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64830F3B4
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F4FC
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F506
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F510
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F51A
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F524
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F52E
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F538
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F542
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F54C
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F556
                                            • Part of subcall function 00007FF64830F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F560
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$calloc$_strdup
                                          • String ID: ,$:
                                          • API String ID: 2460172880-4193410690
                                          • Opcode ID: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                          • Instruction ID: 84d778d00088087c3520cf9f8f0e6cf6cfb6282ceb764ac96fc55391a32455ed
                                          • Opcode Fuzzy Hash: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                          • Instruction Fuzzy Hash: A0518016E0CB8642F722BB7595102B96350FB57B88F08D230DE8D9668AEF6CF5C48304
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy$strchr
                                          • String ID:
                                          • API String ID: 1615377186-0
                                          • Opcode ID: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                          • Instruction ID: ece297c814237a490bf50649f9e08c861de9cc3671e1e99c8373874e8e8f90ca
                                          • Opcode Fuzzy Hash: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                          • Instruction Fuzzy Hash: 19517C25B0DB8585EA66BF35A6142BA6291FF48BC5F4C4431DE8E97B44EF3CE805834C
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6482E3D09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 97b97c4f9b03deb6ba4f315342eb381be36a29c9834092b213fdfb9fd5abec28
                                          • Instruction ID: 55fdd0956b331d41e455bbc76938194ebc2fc5af6c0ac057b9610304420c6e5b
                                          • Opcode Fuzzy Hash: 97b97c4f9b03deb6ba4f315342eb381be36a29c9834092b213fdfb9fd5abec28
                                          • Instruction Fuzzy Hash: 60718D22A0CB8286EB65BB39D6583BB67A0FB85745F080035DB8D87790DF3DE854C358
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6482E3D09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 06bdd3633e5708c44053d2bde8a132e77b6d53fc0ee967ead5b8041a6449c34a
                                          • Instruction ID: 987d440260adb04ac399a3819a139442942aa10dc48cc618acc80ae4a6c45cd6
                                          • Opcode Fuzzy Hash: 06bdd3633e5708c44053d2bde8a132e77b6d53fc0ee967ead5b8041a6449c34a
                                          • Instruction Fuzzy Hash: 6D619F62A0CB8286E716BB79D5683BB6BA0FB44B45F094035CB8D87750DF3CE495C748
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6482F450A), ref: 00007FF6482E851F
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6482F450A), ref: 00007FF6482E8571
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6482F450A), ref: 00007FF6482E8595
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6482F450A), ref: 00007FF6482E85E5
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6482F450A), ref: 00007FF6482E8628
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupstrchr
                                          • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                          • API String ID: 153040452-3976116069
                                          • Opcode ID: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                          • Instruction ID: cbdb35247888845a931438fb2b1831cf9e1b2b0a4e2e911187d4dbc613480740
                                          • Opcode Fuzzy Hash: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                          • Instruction Fuzzy Hash: 0041BF2260CB8692EA21BF21E5403AA77A0FB84B84F480035DE8D87B94DF3CD556D348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                          • API String ID: 600764987-1502336670
                                          • Opcode ID: 597226f125e326fc4276559fb01c1fdade4893ea3d3427af41880d6c60d103f9
                                          • Instruction ID: f4685fca91273e51ba27f57b732c12bb18a003ad3232f0ffc102009a6ffa8009
                                          • Opcode Fuzzy Hash: 597226f125e326fc4276559fb01c1fdade4893ea3d3427af41880d6c60d103f9
                                          • Instruction Fuzzy Hash: D6316D22A0C6C185F722BB70A5143EEB7A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                          • API String ID: 600764987-2628789574
                                          • Opcode ID: da84ee425c665103f0509870f9862496ac41dbffd059b21d0e085cc4c39f0c10
                                          • Instruction ID: a2f02440209e9a328d18d555aa3e92329468062ec3604619c7583fcf7bd9719d
                                          • Opcode Fuzzy Hash: da84ee425c665103f0509870f9862496ac41dbffd059b21d0e085cc4c39f0c10
                                          • Instruction Fuzzy Hash: 05314D22A0C6C185F722BB70A5543EE77A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                          • API String ID: 600764987-1965992168
                                          • Opcode ID: d6c51fbaba7f869f43a916abab987e5ed6b2a07158bb5033ab135ee3800e9c5b
                                          • Instruction ID: b11d0e19a831c02b40548ac1e8c0c3b28e64412f2a732e6603e748792d240163
                                          • Opcode Fuzzy Hash: d6c51fbaba7f869f43a916abab987e5ed6b2a07158bb5033ab135ee3800e9c5b
                                          • Instruction Fuzzy Hash: 28316D22A0C6C185F722BB70A5143EE77A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                          • API String ID: 600764987-1052566392
                                          • Opcode ID: f85a2a735a9d920cdfcb51d5e4cf70fc8eb07e7097d1353a9d283ee2013f9742
                                          • Instruction ID: d4a0b212cbf6ed545aebf19bfeba1ae7e91c4de3834a519a1ed79f2bb341fe14
                                          • Opcode Fuzzy Hash: f85a2a735a9d920cdfcb51d5e4cf70fc8eb07e7097d1353a9d283ee2013f9742
                                          • Instruction Fuzzy Hash: 58316D22A0C6C185F722BB70A5143EE77A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                          • API String ID: 600764987-2710416593
                                          • Opcode ID: fed2a8485bd53f2b9fc33547e3bf34e68c56676f5b9d2557088d6d2309b96134
                                          • Instruction ID: e003c078ba67151cc7ae5898d273d9ccb4f8817fd87bd7990a3571066ce2e388
                                          • Opcode Fuzzy Hash: fed2a8485bd53f2b9fc33547e3bf34e68c56676f5b9d2557088d6d2309b96134
                                          • Instruction Fuzzy Hash: 45314D22A0C6C185F722BB70A5543EE77A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                          • API String ID: 600764987-1381340633
                                          • Opcode ID: e079303a299a1b80ca10b30e1ba550ec69c8fd7568ac497db52d7815dacb691d
                                          • Instruction ID: f7e9206d7c22ee8573cb96386cc6bf83f5a1de708328931356c7754059a11ea1
                                          • Opcode Fuzzy Hash: e079303a299a1b80ca10b30e1ba550ec69c8fd7568ac497db52d7815dacb691d
                                          • Instruction Fuzzy Hash: 95316D22A0C6C185F722BB70A5143EEB7A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                          • API String ID: 600764987-3862749013
                                          • Opcode ID: 034b749fa52bb0e83432a6375c736f1c388a10f79a58ee50a6da77af21e3aa5c
                                          • Instruction ID: 72af230334434b46df51fe3385607e6fa442a06bf566fced13b4cb96ad1d3533
                                          • Opcode Fuzzy Hash: 034b749fa52bb0e83432a6375c736f1c388a10f79a58ee50a6da77af21e3aa5c
                                          • Instruction Fuzzy Hash: 7F314D22A0C6C185F722BB70A5543FE77A4FF85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                          • API String ID: 600764987-618797061
                                          • Opcode ID: d12fab4b8c6893375368121d2eff4d50167fa0c363ab1c99d00b3eb034989995
                                          • Instruction ID: ba62875fb219e78d98818e7e6dad189330cc314e29d7bb1e6014865b52f6f943
                                          • Opcode Fuzzy Hash: d12fab4b8c6893375368121d2eff4d50167fa0c363ab1c99d00b3eb034989995
                                          • Instruction Fuzzy Hash: 9E317C22A0C7C186FB22BBB0E5143EE77A4FB85740F480536EA9D82A95DF3CE544C758
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_time64
                                          • String ID:
                                          • API String ID: 3087401894-0
                                          • Opcode ID: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                          • Instruction ID: d244c2d16d58cdf680c7e57de5ee0633ed5187ca0bb87a3efcb682fa1e3e7e73
                                          • Opcode Fuzzy Hash: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                          • Instruction Fuzzy Hash: 2D21EC76A0DA5191DB11BF72E94456967B0FB88F94F094031DE8E83B54DE3CE885D384
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64831E30A
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64831E358
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64831E3BB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64831E4F9
                                            • Part of subcall function 00007FF6483122A0: strchr.VCRUNTIME140(00000000,?,?,00007FF64831185F), ref: 00007FF6483122E6
                                            • Part of subcall function 00007FF6483122A0: strchr.VCRUNTIME140(00000000,?,?,00007FF64831185F), ref: 00007FF6483122F6
                                            • Part of subcall function 00007FF6483122A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF64831185F), ref: 00007FF648312320
                                            • Part of subcall function 00007FF6483122A0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF648312355
                                            • Part of subcall function 00007FF6483122A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64831237A
                                            • Part of subcall function 00007FF6483122A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64831239C
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64831E584
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup$callocmallocstrchr$freestrncpy
                                          • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                          • API String ID: 370574955-353107822
                                          • Opcode ID: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                          • Instruction ID: 812213e85c47669d92c15532bd11b8eb3b8a3b0d1e052c49c0d9535718b5e341
                                          • Opcode Fuzzy Hash: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                          • Instruction Fuzzy Hash: 5EA15C72A0CB558AEB51EFB5E4402AD7BA5FB48B88F080035DE4D93B58EF39E845C744
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                          • API String ID: 0-808606891
                                          • Opcode ID: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                          • Instruction ID: acd30725605beba65ec152a5a2e1c98424fe4566dbfff0654b1d0294f7e1cad1
                                          • Opcode Fuzzy Hash: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                          • Instruction Fuzzy Hash: F9B16C6290CA8189E765BF38D64027D3B71FB16B58F644531CA5E822DADF3CE885C398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                          • Instruction ID: 16c5f06c0c2100c4f930f9cca31d0bba8b1539f792b44c3c9d435544c669c9e9
                                          • Opcode Fuzzy Hash: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                          • Instruction Fuzzy Hash: B4915721A0D79685FF72B73596443BB6BE4EF45754F480035EA8E82792DF2CE484C394
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                          • API String ID: 1169197092-907567932
                                          • Opcode ID: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                          • Instruction ID: d255afe2443378d0b2cd8aea3480e7dbd825a6e336b05902ae109feefea1e689
                                          • Opcode Fuzzy Hash: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                          • Instruction Fuzzy Hash: 25712B6190C28256FB19BB3296502BB7AC2EF22785F484034DF5ACB6C2DF3CE454D798
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                          • API String ID: 1169197092-978722393
                                          • Opcode ID: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                          • Instruction ID: 0f5ddbaf3a9ee78efb71441cd64edefe9a29dc97f8fcf5896f7146320d01f979
                                          • Opcode Fuzzy Hash: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                          • Instruction Fuzzy Hash: 41714261A0D79645FF72BB35E2443BB6BD0EF45754F084036EA8E86692DF2CE484C398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$strchrstrtol
                                          • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                          • API String ID: 137861075-1224060940
                                          • Opcode ID: ae296eaaf9617ce67e340360966fd7ce56b0ec3a65961541972d05b3815a59bf
                                          • Instruction ID: a24986534fd37c027d53475e8a81f7ae37bd902441bf9a5a7e7d11dce131eb1f
                                          • Opcode Fuzzy Hash: ae296eaaf9617ce67e340360966fd7ce56b0ec3a65961541972d05b3815a59bf
                                          • Instruction Fuzzy Hash: FC51B522A0CED294EA21BB75E9403BA2790FB41B94F484135DE9D8BB85CF3DD545C388
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                          • API String ID: 1294909896-1147549499
                                          • Opcode ID: 9b66fc2e34baff06f096cbca24ff7e3129ac13fcb66a14bdd11d473ac3b2e9fc
                                          • Instruction ID: c9a1af1e86d54557ddd882f12d63850abdea062608e09e01a17b85ebc4228987
                                          • Opcode Fuzzy Hash: 9b66fc2e34baff06f096cbca24ff7e3129ac13fcb66a14bdd11d473ac3b2e9fc
                                          • Instruction Fuzzy Hash: D4415F20B0CA4251F924BB359B512BB56D5AF94BC0F585031DE0EC7792DF3DE89593C8
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup$callocfreestrrchr
                                          • String ID: Wildcard - Parsing started
                                          • API String ID: 2641349667-2274641867
                                          • Opcode ID: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                          • Instruction ID: 49c2af9a933ff7490e9df7f99359da7daff6972964e659854692e39340020eb7
                                          • Opcode Fuzzy Hash: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                          • Instruction Fuzzy Hash: AC515C32A0CB82C5EB16FFA5E4541B826A5EB86B90F494035CA4E9B358EF3CE455D314
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                          • API String ID: 2653869212-3672398475
                                          • Opcode ID: 595424baaf0bc46a46dd7db77f120e4f57f80110cac3368c3dfe95d5b267a38e
                                          • Instruction ID: b03ca0da4b87b43b80f6544886201516d044c857720175de73d3d36ae312a6de
                                          • Opcode Fuzzy Hash: 595424baaf0bc46a46dd7db77f120e4f57f80110cac3368c3dfe95d5b267a38e
                                          • Instruction Fuzzy Hash: DF419166A0D78244EB12BBB594442FA6BA1BF05B88F4C0835DE4E8B756DF3CE544C348
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F4FC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F506
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F510
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F51A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F524
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F52E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F538
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F542
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F54C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F556
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64830E522,?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830F560
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                          • Instruction ID: 4b9fb510bfa796e5bb75cdfad6962af2b5e3d4725d7085030afd52848dcff34b
                                          • Opcode Fuzzy Hash: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                          • Instruction Fuzzy Hash: 4901B2A6A18901D2EB15BFB6EC940382330FF88F59B181031CE4E86624DE3CDC99D348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                          • API String ID: 3313557100-1003742340
                                          • Opcode ID: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                          • Instruction ID: 7996c2c2530dd46fc4205dd3a6d251343818c368772dd221c15a509025b96337
                                          • Opcode Fuzzy Hash: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                          • Instruction Fuzzy Hash: FC81C362A0CB8285DA55FBB6E5403AA2BA0FB45B85F484531DF8E87B41DF3CE5E1C344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: 6c311b3fbb936d4f8b460a342f698634143a57b26a858afa4ef3053f5e110cbc
                                          • Instruction ID: d1b5b3f4a2f6dc65024d6c7493a7ddb4989cea0f726ce12d7b78feca948e9a44
                                          • Opcode Fuzzy Hash: 6c311b3fbb936d4f8b460a342f698634143a57b26a858afa4ef3053f5e110cbc
                                          • Instruction Fuzzy Hash: 1161E652A0D68245EB1ABBB585141F92B92FB05B94F0C4936CE5F8B7D9DF3CE1498308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: 54122bf5e3d3342fd2a96bae5bdd9d8b9827785846c702c0f1603b4f91230c77
                                          • Instruction ID: cb20e2a12f315ef7de29e2d336f74adc90ca4ebcf5e8b6cf281b54ebdf210644
                                          • Opcode Fuzzy Hash: 54122bf5e3d3342fd2a96bae5bdd9d8b9827785846c702c0f1603b4f91230c77
                                          • Instruction Fuzzy Hash: 49610352A0D79245EF1ABBF585142B92B92BB05FC4F0C4535DE1F8B786EE3CE9498308
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6482F44E8), ref: 00007FF648311010
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6482F44E8), ref: 00007FF648311047
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6482F44E8), ref: 00007FF64831106E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                          • API String ID: 1294909896-3948863929
                                          • Opcode ID: 33b6c4fc7c206a8ba251b097363a5618546007abb926c668e6bcb56dbfa46066
                                          • Instruction ID: 26d67cbc16d7db17d968569d8b381d8507d8de07841d034d009609cc3c06330e
                                          • Opcode Fuzzy Hash: 33b6c4fc7c206a8ba251b097363a5618546007abb926c668e6bcb56dbfa46066
                                          • Instruction Fuzzy Hash: 5E615E32A0CB8685E7A2EFA5E8443AAB7A5FB44F84F084036DA8D87754DF3CD545C705
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                          • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                          • API String ID: 1392894463-1168109407
                                          • Opcode ID: 6e76f70bd5b8103ca8f58d44c944ae791c305b292061b6a87a6ed5ada98c8c51
                                          • Instruction ID: f42e84606285aa6928ce1514e66ab575809a3427718dee90c5fc6dcef1a8e87e
                                          • Opcode Fuzzy Hash: 6e76f70bd5b8103ca8f58d44c944ae791c305b292061b6a87a6ed5ada98c8c51
                                          • Instruction Fuzzy Hash: A141D261A0CA8282EA16BBB595403FA6790EF47BC4F4C4131EA9EC73C9DF2DE405C358
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$mallocrealloc
                                          • String ID: 0123456789-$<DIR>$APM0123456789:
                                          • API String ID: 359134164-4291660576
                                          • Opcode ID: b87fbd036890b47f9b0cd1bab2e43e5707946047c1b405ef22310b67469fa962
                                          • Instruction ID: 43a5b31b77fe3c66936bf45c3dbc936eb7c473c930791a4eb3694b23ee5c9fe0
                                          • Opcode Fuzzy Hash: b87fbd036890b47f9b0cd1bab2e43e5707946047c1b405ef22310b67469fa962
                                          • Instruction Fuzzy Hash: 82B14936A0CA468AEB26BF75D0503396BA0FB54F48F1C4435CA8E877A5DF78E451C784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: malloc$Ioctlsetsockopt
                                          • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                          • API String ID: 3352517165-607151321
                                          • Opcode ID: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                          • Instruction ID: 7fe683ec1816e9cd7f119380d4df8d3cd96c22347857328d84a3988d14cd0c4b
                                          • Opcode Fuzzy Hash: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                          • Instruction Fuzzy Hash: 57B17F32A0DB8685EB65BF39D2443FA2390EB44B98F080135DE5D8A789DF3CA495C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: %s?%s$Failed sending Gopher request
                                          • API String ID: 111713529-132698833
                                          • Opcode ID: 429b144afca1d25600d0a197d5eccfa2b60d4d1d99bd5ac6cdc2e9354a3dc877
                                          • Instruction ID: 7fccdb53bc29de262f1d0769d42871568021ad6d19801bd1eb77957c40373ccd
                                          • Opcode Fuzzy Hash: 429b144afca1d25600d0a197d5eccfa2b60d4d1d99bd5ac6cdc2e9354a3dc877
                                          • Instruction Fuzzy Hash: 8C51A861B0CA4282F612BBB6A8401BA6390FF46BE4F584331DE5DC7BD9DE3CD5428748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 8139019e80c5ec88f17aeb8915c878c5d1d47a621de3c7b0d0edb2625798ab54
                                          • Instruction ID: 073e9445faca289882d0146b07afafa6747889605c04cb031fedf2a61bb151ac
                                          • Opcode Fuzzy Hash: 8139019e80c5ec88f17aeb8915c878c5d1d47a621de3c7b0d0edb2625798ab54
                                          • Instruction Fuzzy Hash: 1A61A222A1CA8585EB11EBB4E5443FE2361FB457A4F041331EA6D87AD9DF7CE081D344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                          • Instruction ID: 9ca1076868c6598e5f454c712b4d7a0c376b09244b8a1af04bae39fd3d531270
                                          • Opcode Fuzzy Hash: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                          • Instruction Fuzzy Hash: AB61B172A1CA8595EB11EBB4E9453FE2361EB457A4F100331EA6D82ADADF7CD0C1C344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _close$_fstat64_openstrchr
                                          • String ID: Can't get the size of %s$Can't open %s for writing
                                          • API String ID: 423814720-3544860555
                                          • Opcode ID: 13e5b1f758b492002390f4d21743b9d9be13eeb5f45215b79f59d9c128932a50
                                          • Instruction ID: 6cc1764f0899d22f39d7e995b9efda5ddc166cb2c7516a84d02b548614a46a6e
                                          • Opcode Fuzzy Hash: 13e5b1f758b492002390f4d21743b9d9be13eeb5f45215b79f59d9c128932a50
                                          • Instruction Fuzzy Hash: 7351946170CB4682EA26BB75E8103FA6391FB86BD4F484435DA4ED7399EE7CE4418348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdupstrtol
                                          • String ID: %%%02x
                                          • API String ID: 2999891020-4020994737
                                          • Opcode ID: 0729c3e4434bc5675d099d01015e06993560b35443a2945d2449c0f814ce84fd
                                          • Instruction ID: 6f40a270f36352a19da882ec21c7d11396a578f7f92a5bd0178dd642802d830d
                                          • Opcode Fuzzy Hash: 0729c3e4434bc5675d099d01015e06993560b35443a2945d2449c0f814ce84fd
                                          • Instruction Fuzzy Hash: 5751CE12E0D2C245FA63BBB190143B92A91AF47B94F0C8171EE9E867C9DE3DE449D358
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1496848336-4020994737
                                          • Opcode ID: a8f65ed0a19ceec9d11366574aeb1cfd595ab54779fa0fea19c01c3edba6243c
                                          • Instruction ID: efdfa2b140d8b4c387e1241d81f82820a1d3912dfb187b1eaedf53088560410d
                                          • Opcode Fuzzy Hash: a8f65ed0a19ceec9d11366574aeb1cfd595ab54779fa0fea19c01c3edba6243c
                                          • Instruction Fuzzy Hash: 1941CE12E0D2C245FA23BBB1A0143B92B91AF47794F0C4171EE9E867C9DE3DE449D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 111713529-517259162
                                          • Opcode ID: bbb5a7a9f1b646046fe03c8c4798a3fb899d3ca6497a6504817b76176552b82e
                                          • Instruction ID: 4dab841f5c6f06fe8d76309849ef36ba6d18aba94995e5e71346fc4f6860ffed
                                          • Opcode Fuzzy Hash: bbb5a7a9f1b646046fe03c8c4798a3fb899d3ca6497a6504817b76176552b82e
                                          • Instruction Fuzzy Hash: 2A317E62E0D78244EB12BBF594441F92BA1BF06B88F4C0835DE0E9B756EF3CA5449348
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                          • String ID:
                                          • API String ID: 3063020102-0
                                          • Opcode ID: ed39c7d1c51f3db297fe99c6e755470af78e6e1de6504059e5262683a49ffbc1
                                          • Instruction ID: e4b1542a521b92155803819df928c9faa5758b234a41bda5b0fee85b8c3fc041
                                          • Opcode Fuzzy Hash: ed39c7d1c51f3db297fe99c6e755470af78e6e1de6504059e5262683a49ffbc1
                                          • Instruction Fuzzy Hash: A9B1B022B1CB4685EB11FBB4E6013BE2361AB447A4F444631DE6C936C6DF3CE195D388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-599393795
                                          • Opcode ID: 83c56e755e620055c0fa3659b43fafff221207177ab0696b05b148a0a566e44a
                                          • Instruction ID: a1407d546a1c2017250b2d323d855f2190b11bedf25f57d0b6a5384f938f24c0
                                          • Opcode Fuzzy Hash: 83c56e755e620055c0fa3659b43fafff221207177ab0696b05b148a0a566e44a
                                          • Instruction Fuzzy Hash: E261EDA2A0D69244EB12BBF199041F96FA5FB05B84F4C4436DA4D87B55EF3CE944C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 901724546-1663925961
                                          • Opcode ID: bb8f0aea14a187f571e5c0d63ffc4fdd4b91024d0d33eb01ebf09ce82b63cb64
                                          • Instruction ID: eb826b9f17c79a465a7b56ee06ff9f3d5b9f624c53b431239a60a5d17119e4d5
                                          • Opcode Fuzzy Hash: bb8f0aea14a187f571e5c0d63ffc4fdd4b91024d0d33eb01ebf09ce82b63cb64
                                          • Instruction Fuzzy Hash: AD514512A0D68642EE1ABBB595542BA2B91FF45FD0F0C0536CA5F87BD5DE3CE0459308
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID:
                                          • API String ID: 1169197092-0
                                          • Opcode ID: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                          • Instruction ID: fe011ae8c281dc3393a9cbc62c1ec64e93cff87c0972cc583d00a03858337eb3
                                          • Opcode Fuzzy Hash: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                          • Instruction Fuzzy Hash: 21515E26A1EB8086EB95EF65F18012977E4FF48B84B081135EF9D43B49EF38D8A19744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-3876350232
                                          • Opcode ID: 718e0edb844c39f72f5a5453fececd066911b5f4b0fc70f80471252c26b35449
                                          • Instruction ID: 0c2f3e5426990904a00abaad69fb3e5aab1afa0eb68a7de5a250ba9a65532bef
                                          • Opcode Fuzzy Hash: 718e0edb844c39f72f5a5453fececd066911b5f4b0fc70f80471252c26b35449
                                          • Instruction Fuzzy Hash: CE518062A0DB8284EB12BBF594401F97BA1BB45F88F4C4435DA4D9B796EF3CE944C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: 2ceff9df3f33277577f0104260bbffde3566e5b22424af7c496f0e4332a6a445
                                          • Instruction ID: 5417ecaf3fc18c54da418a929f54846121bc09f1e55304371159a8d00eb31a48
                                          • Opcode Fuzzy Hash: 2ceff9df3f33277577f0104260bbffde3566e5b22424af7c496f0e4332a6a445
                                          • Instruction Fuzzy Hash: 8A41B366A0D78244EF16BBB195041F96BA2BF05BC4F4C4935CE0D8B79AEF3CE5448348
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                          • Instruction ID: b0b06626a66628aed4026b38a6616285e3d59aa3e06f671bf0a42d6135a1710e
                                          • Opcode Fuzzy Hash: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                          • Instruction Fuzzy Hash: 5C0135A6619A4192DB16BF72ED940286360FF88F95B081031DD8E97B64CE3CD899D344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpymemset
                                          • String ID:
                                          • API String ID: 1579693990-0
                                          • Opcode ID: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                          • Instruction ID: ac38fc2ad5266d592a299c6c716dcff6b89799ca8f7994a3bd3b2308322c5811
                                          • Opcode Fuzzy Hash: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                          • Instruction Fuzzy Hash: 52915C61B0D74242EA96BEB6955037A6AD1BF45FC4F0C4034DE5DCBB85EF2CE4528348
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6482E8FA8), ref: 00007FF6482E90F5
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6482E8FA8), ref: 00007FF6482E910F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64$Internal error removing splay node = %d
                                          • API String ID: 1114863663-13178787
                                          • Opcode ID: 9e80ba9495084d9940152a93fe6650defdac990b8f6d3432b4772d1b7d51b77b
                                          • Instruction ID: d72b4764cb6cc89a64aa8f9af10f77a8c44cd5232856792fcf170a72fc659cb8
                                          • Opcode Fuzzy Hash: 9e80ba9495084d9940152a93fe6650defdac990b8f6d3432b4772d1b7d51b77b
                                          • Instruction Fuzzy Hash: DCA1C372A1C65186EB21BF34E4547BE7BA4FB49B48F494136CA8D83254DF3CD208C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                          • API String ID: 1294909896-116363806
                                          • Opcode ID: 20c94608d0b51b5192543fb49e03ba8152e3f7264e32a9afe7f9e7dcf3f4099a
                                          • Instruction ID: 4415b743128a26d3dcdacbddd04d8cafa23357d90dbcbdc4848025a943a9d9b7
                                          • Opcode Fuzzy Hash: 20c94608d0b51b5192543fb49e03ba8152e3f7264e32a9afe7f9e7dcf3f4099a
                                          • Instruction Fuzzy Hash: 3F915832608F8186EB11EF66E8906AE37A5FB88B88F440535DF4D87BA4DF38D445DB44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                          • Instruction ID: e9b770c1ab426075ee5391ea7f794dd07057a275ca86f4eafbfdded117c36bb4
                                          • Opcode Fuzzy Hash: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                          • Instruction Fuzzy Hash: 0E614561A0D79645FF72BB35A2443BB6BE4EF44754F084036EB8E82692DF2CE484C394
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdup$strchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3404610657-2292467869
                                          • Opcode ID: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                          • Instruction ID: c314aea85fc7d7c4c86f1ebfb2e547278cb34d874d8147a9d8a356aef2380d26
                                          • Opcode Fuzzy Hash: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                          • Instruction Fuzzy Hash: D1614461A0D79645FF72BB35A2443BB6BE4EF44754F084035EB8E82692DF2CE484C394
                                          APIs
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5E61
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5EA5
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5EBD
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5F42
                                            • Part of subcall function 00007FF64831F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6482C43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF64831F20A
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5F74
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5F8F
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482C5FAC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 1155477157-0
                                          • Opcode ID: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                          • Instruction ID: bd5e7890c8919c11c38df9ccf93baa6cdc81f265db25ac676753e34f75b53d24
                                          • Opcode Fuzzy Hash: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                          • Instruction Fuzzy Hash: 46519C32A08B8682EA09FF3596042BA2365FB15BD4F544A31DE6D573D2CF78E195C388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freememcpy$malloc
                                          • String ID: Failed to alloc scratch buffer!
                                          • API String ID: 169112436-1446904845
                                          • Opcode ID: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                          • Instruction ID: 2033746f98b2c16d4761099812df1155168d7ff7710203f66fdece126e9cc752
                                          • Opcode Fuzzy Hash: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                          • Instruction Fuzzy Hash: C251AD6261878196EA26BBB5A5106EAB7A0FB0A788F480035CF8D87755CF3CE154C708
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strstr
                                          • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                          • API String ID: 1392478783-2096918210
                                          • Opcode ID: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                          • Instruction ID: f0b8a94ec6b616ddadf883224858e755802d0d6a782717daf892e6f1435af064
                                          • Opcode Fuzzy Hash: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                          • Instruction Fuzzy Hash: 2951F762A0D78642FB26F7BDA4442B96390EB47774F4C0231DE9D866D9DF7CE4828704
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                          • API String ID: 2190258309-3231818857
                                          • Opcode ID: 486b11a5dbf6f6220d0470a4a60f1b5c1fbc44e62c4a92e0fa326115e51303ef
                                          • Instruction ID: 2120bd5d104351a192627e347cb57f81adbb427339ffb0b41ad031f41ee8d131
                                          • Opcode Fuzzy Hash: 486b11a5dbf6f6220d0470a4a60f1b5c1fbc44e62c4a92e0fa326115e51303ef
                                          • Instruction Fuzzy Hash: C051C462A0C6C685EA12BBB5A4441F9BBA4FB45F84F5C0432DA8D83759CF3CE945C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastfreememcpy
                                          • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                          • API String ID: 1248052217-2335292235
                                          • Opcode ID: 7f1b63b8f03d3fdbfa67beb3f169362ae6ab96c88611e78a276ff859e2cc5821
                                          • Instruction ID: 8f79d21100aa0cf7e32369eaf762b8b8e39b0f60356f65c3e9a36753c3f89f49
                                          • Opcode Fuzzy Hash: 7f1b63b8f03d3fdbfa67beb3f169362ae6ab96c88611e78a276ff859e2cc5821
                                          • Instruction Fuzzy Hash: 1D518F21B0C68285FF66BAB9D6407FA1290BF47B94F488179DE4DC72D9EE2CE4458348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Digest$stale$true
                                          • API String ID: 1294909896-2487968700
                                          • Opcode ID: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                          • Instruction ID: 107a5dd33e28c422864cb1d43904f95a31d4809c8bf9c8f9b4c655a19717e247
                                          • Opcode Fuzzy Hash: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                          • Instruction Fuzzy Hash: 09517F22A0CA8292EB22FB71E9503B977A0FF45F84F484131EA9D876C1DF2CE555C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memchrmemcpyrecvfrom
                                          • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                          • API String ID: 3107918033-477593554
                                          • Opcode ID: b5abf7ddbc41a4e4313125dd5a2000d1c180a3dd02d87012433adc899920b445
                                          • Instruction ID: b44c6a2e7af767b0f91a4e29076503471f9a94984e4e7ed23ff5691ac91187f0
                                          • Opcode Fuzzy Hash: b5abf7ddbc41a4e4313125dd5a2000d1c180a3dd02d87012433adc899920b445
                                          • Instruction Fuzzy Hash: C051CF72A0C68285EB6ABB75D5103BA6390FB46B85F084132DE4EC7789DE3CE446CB44
                                          APIs
                                            • Part of subcall function 00007FF6482C6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6482C23CB), ref: 00007FF6482C6E4E
                                            • Part of subcall function 00007FF6482C6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6482C23CB), ref: 00007FF6482C6E5C
                                            • Part of subcall function 00007FF6482C6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6482C23CB), ref: 00007FF6482C6E72
                                            • Part of subcall function 00007FF6482C3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C3BF6
                                            • Part of subcall function 00007FF6482C5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF6482C1DBA), ref: 00007FF6482C5E61
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2469
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C24A8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C24F6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6482C2544
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                          • String ID: at line $, column
                                          • API String ID: 2665656946-191570568
                                          • Opcode ID: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                          • Instruction ID: eb0e0c25ac4189ab179579308efcc48cc277e0b656aa752216a57a6ec5e32833
                                          • Opcode Fuzzy Hash: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                          • Instruction Fuzzy Hash: 7F517E62F08A8586FB15EBB4E5443AD3321EB44BE8F005225DE6D53ADADE38D485D388
                                          APIs
                                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4A93
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4AE7
                                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4B0E
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4B36
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4B7C
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4B83
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF6482C314B,?,?,?,00007FF6482C3104), ref: 00007FF6482C4B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                          • String ID:
                                          • API String ID: 1492985063-0
                                          • Opcode ID: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                          • Instruction ID: d9f1f1da05368b7e9e10371e09c20cd051e955d4707c95deaae89cff443cd9b6
                                          • Opcode Fuzzy Hash: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                          • Instruction Fuzzy Hash: CD51573260CE4181EB21AB69D69037AABA0FB85F95F15C631CE5E837A5CF3DD446834C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                          • API String ID: 1294909896-1255959952
                                          • Opcode ID: 41c08fb2ae54d73b9aad3b1fb28f7d5162b95befd8a93294c5f9c0ba9144d006
                                          • Instruction ID: 453a0d98f210678aabcca32fe91dd2ef0856a5457e009cd58b56eace2defe4bf
                                          • Opcode Fuzzy Hash: 41c08fb2ae54d73b9aad3b1fb28f7d5162b95befd8a93294c5f9c0ba9144d006
                                          • Instruction Fuzzy Hash: 6F51C072A0C69296FB12FBB5D4A02B92B90FB40B94F4C4032DA8DC7685DF3DE455C758
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 995a1957d159ea99697b42c3a6b6bf0ff12af625b36380b0b66350f6ea9b707c
                                          • Instruction ID: a69b1c529f0594af6a3851d6512f39db17246b827f383944fa132b1d515b4a1a
                                          • Opcode Fuzzy Hash: 995a1957d159ea99697b42c3a6b6bf0ff12af625b36380b0b66350f6ea9b707c
                                          • Instruction Fuzzy Hash: 4141DC12E0D2C245FA63BBB1A0103B92A91AF47794F0C8171EEDE867C9DE3DE409D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: ca10f7099a8e11b7cfc61e554ba5e926ab0c0bb5474b4376fd2f4e3479e7f3e1
                                          • Instruction ID: b6e95b6378dead30ea97acd138426e489d59658e3e7f530cebf3707c0a15b999
                                          • Opcode Fuzzy Hash: ca10f7099a8e11b7cfc61e554ba5e926ab0c0bb5474b4376fd2f4e3479e7f3e1
                                          • Instruction Fuzzy Hash: B841DD12E0E2D245FA63BBB1A0143B92A91AF47794F0C8171EE9E867C9DE3DE445D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 83e1fb0100f905c57ab9f068d43ff6605369474d9e078fffc21d34a0778c98eb
                                          • Instruction ID: 4c43c8faaf4d1b64864f9f01e92bcd83674cdef87dbbb5d07d7db7ed73266a71
                                          • Opcode Fuzzy Hash: 83e1fb0100f905c57ab9f068d43ff6605369474d9e078fffc21d34a0778c98eb
                                          • Instruction Fuzzy Hash: 9F41EE12E0D2D245FA23BBB1A0143B92A919F07794F0C8171EE9E877C9DE3DE405D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 4ce7970afd5a9239f65debad424b97acd0ba8e2cc2fc0e723198cdc55f5ca029
                                          • Instruction ID: 49f7f06848c226551d5ac353adc3d01969ef24dca6df303ce1aff774d4323f64
                                          • Opcode Fuzzy Hash: 4ce7970afd5a9239f65debad424b97acd0ba8e2cc2fc0e723198cdc55f5ca029
                                          • Instruction Fuzzy Hash: 3E41CE12E0E2D245FA63BBB1A0143B92A919F47794F0C8171EE9E877C9DE3DE445D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: e40c05a633061906cd65db25f240a886dccca3a985eefeb9232968f34b6f1054
                                          • Instruction ID: bc5e8a1ab977de608ed8cdae65b9e65d3e52094c5808aa87770b32d3a0b8ec14
                                          • Opcode Fuzzy Hash: e40c05a633061906cd65db25f240a886dccca3a985eefeb9232968f34b6f1054
                                          • Instruction Fuzzy Hash: E341EE12E0D2D245FA23BBB1A0143B92A919F07794F0C8171EE9E877C9DE3DE405D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 9d88bebb43b2fbc7647fe023011e1ba91fe3620b1f9d8eca84b5e207088da114
                                          • Instruction ID: 0bde46b34906986a1ff09e0764477e00b535f67d49fb56b4b4552be128a78e59
                                          • Opcode Fuzzy Hash: 9d88bebb43b2fbc7647fe023011e1ba91fe3620b1f9d8eca84b5e207088da114
                                          • Instruction Fuzzy Hash: F941CE12E0D2D245FA63BBB1A0143B92A91AF47794F0D8171EE9E877C9DE3DE405D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: a37f3f224fc798ce1b298b1525752757f579e6cf70c552f4d4f4674165861193
                                          • Instruction ID: c5f825afaa798550d443fc8a6ff4d4e4206c2c89cd8209dec97a62e2196f2391
                                          • Opcode Fuzzy Hash: a37f3f224fc798ce1b298b1525752757f579e6cf70c552f4d4f4674165861193
                                          • Instruction Fuzzy Hash: D141CE12E0D2D245FA63BBB1A0143B92A919F47794F0C8171EE9E877C9DE3DE445D318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _time64
                                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                          • API String ID: 1670930206-870032562
                                          • Opcode ID: 5603a38b167ad5d39fbdc1c17dec4cf10488a2e3eb711140c002149bca51ea0d
                                          • Instruction ID: fc8172a4cfcc2e48a22461ca7124143a3f60b6886974b7f9f38cc9967689a7f4
                                          • Opcode Fuzzy Hash: 5603a38b167ad5d39fbdc1c17dec4cf10488a2e3eb711140c002149bca51ea0d
                                          • Instruction Fuzzy Hash: CE411872B2861986DB20EF7AE04066833A0F789F88F545031DE0CC7788DE3DE542CB44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr
                                          • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                          • API String ID: 2830005266-711804848
                                          • Opcode ID: 066994a40ad3c2aec7f29a05448feede43c7ce5909703161cc52556192049a5a
                                          • Instruction ID: c245f839cd80ea5f5d8f845f94ddfb38ca27680063e9500a782a0bbd7ba0a7a1
                                          • Opcode Fuzzy Hash: 066994a40ad3c2aec7f29a05448feede43c7ce5909703161cc52556192049a5a
                                          • Instruction Fuzzy Hash: C5412B21B0CB8285FA55FB36A5000FA63D1EFA5B84F4C1034EB4E87786EE6DE445D788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: fseek
                                          • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                          • API String ID: 623662203-959247533
                                          • Opcode ID: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                          • Instruction ID: f0aca3bdc637d4d0afcc72d235181e21e23c60833ac66070fb26255d9073b231
                                          • Opcode Fuzzy Hash: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                          • Instruction Fuzzy Hash: 15419566A1C68242FB55BF7A95453FA1391EF84B94F4C2031DE0D8B799DE3DE480878C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                          • API String ID: 2190258309-3662781045
                                          • Opcode ID: 2d839c62f561e1cb6da38a300fc64ca3975719bf1c477f748898bce26a61f6bd
                                          • Instruction ID: 748ff2b27540da4a7ecf0702033d760068ce8df97bfa3b61ca2459c0e4f8a031
                                          • Opcode Fuzzy Hash: 2d839c62f561e1cb6da38a300fc64ca3975719bf1c477f748898bce26a61f6bd
                                          • Instruction Fuzzy Hash: BF41A122A0CA8691EB12BBB5E4401FAB7A1FB45B84F5C0432DA4D8775ADF3CE545C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-659367561
                                          • Opcode ID: 43aff7a05e90a007a98c231397dc463d57d0ef91e1f3fe74e4c719b20d4e5bc1
                                          • Instruction ID: 88b197e12183e077a90e9286c9ba09e8830870b676eb254e279e7d9878350220
                                          • Opcode Fuzzy Hash: 43aff7a05e90a007a98c231397dc463d57d0ef91e1f3fe74e4c719b20d4e5bc1
                                          • Instruction Fuzzy Hash: AD416D52A1D78245EE12BBF694441F96BA1AF06B88F4C4835DE0E8B786EF3CE5449348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: .
                                          • API String ID: 1865132094-916926321
                                          • Opcode ID: f91b2f7d14dfdf7098ab5232583014ba284079e117e41f318c1d2d3077799d1f
                                          • Instruction ID: 59356af1e48e7cc441f19367f394b16ce848d7bb37b74b5525102a8406de4a8b
                                          • Opcode Fuzzy Hash: f91b2f7d14dfdf7098ab5232583014ba284079e117e41f318c1d2d3077799d1f
                                          • Instruction Fuzzy Hash: 1E41B122A0CB8682E721FB31AA4027A7292FB59B90F584131EF0D876D5DF3CE441D788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: d8f8e0a4a0e375cd5f204021ae47b3fac140e17fff0a1bf2cfc304c0a5c5ad0c
                                          • Instruction ID: ddeabc2b622ecba253ece4075bf28f958c12936edc8f29a82dead8687ea6e2b8
                                          • Opcode Fuzzy Hash: d8f8e0a4a0e375cd5f204021ae47b3fac140e17fff0a1bf2cfc304c0a5c5ad0c
                                          • Instruction Fuzzy Hash: 0241A262A0D78244EF16BBB595442F96BA2BF05FC8F4C4835DD0E9B756EF3CA9448308
                                          APIs
                                            • Part of subcall function 00007FF6482FBF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBF68
                                            • Part of subcall function 00007FF6482FBF40: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBF8E
                                            • Part of subcall function 00007FF6482FBF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBFAF
                                            • Part of subcall function 00007FF6482FBF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBFC0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6483104CF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF648310518
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF648310521
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$realloc$EnvironmentVariable
                                          • String ID: %s%s.netrc$%s%s_netrc$HOME
                                          • API String ID: 4174189579-3384076093
                                          • Opcode ID: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                          • Instruction ID: 5e57346307c713ad035281f1133d21d8181924541419374521612f73f64fe87e
                                          • Opcode Fuzzy Hash: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                          • Instruction Fuzzy Hash: 34319525A0CB5181EA12FBB6F8500A6B6A0BF48FD4F4C4132ED8C87B55EF3CE4459748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 3519880569-1663925961
                                          • Opcode ID: ea8e12948d5eba480ab9cceb9eaed845a41fc177baa4ac14c91b0ce5b74563bd
                                          • Instruction ID: cb16d6a937db31a143045c1c119af2782943ceb2746b266b0dbc877adcbb67f2
                                          • Opcode Fuzzy Hash: ea8e12948d5eba480ab9cceb9eaed845a41fc177baa4ac14c91b0ce5b74563bd
                                          • Instruction Fuzzy Hash: D231E262B0DB8241EE12BB76A5442BA6790FF85FD4F0C0432CE1D87B95EE3CE0058308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanf_strdupfree
                                          • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                          • API String ID: 860312144-3309259123
                                          • Opcode ID: 3aaf3bd9c98613ab1b966e3da1ed5605299526585c756a4ca27d5f183527908c
                                          • Instruction ID: d817c92883405aeb664d1378f5a1901bde7c8e87e5ac7a89827080de8fa9a488
                                          • Opcode Fuzzy Hash: 3aaf3bd9c98613ab1b966e3da1ed5605299526585c756a4ca27d5f183527908c
                                          • Instruction Fuzzy Hash: 30316129E0C64295EAA6BB30D2501BF2352FF64B94F944432CF4E8B655DF2CE851E3C9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                          • API String ID: 1865132094-176635895
                                          • Opcode ID: 1f487dde392c3a3120692d44dd57c5843b08388db113ca8ef60605f3459bfef1
                                          • Instruction ID: 28e0171e41cc1064d2f1ad1e640f49bb955342a206c13d15ea1617d3d1418063
                                          • Opcode Fuzzy Hash: 1f487dde392c3a3120692d44dd57c5843b08388db113ca8ef60605f3459bfef1
                                          • Instruction Fuzzy Hash: 12216262A0D7C245EB22BB75A4442FA6761FB05B98F4C4431CA4E8776ADF3CE584C349
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1941130848-1663925961
                                          • Opcode ID: e1078ee6254317aa7f302fe12d14b7c1b0a0c2898ed5fbaf491c85de4fe40530
                                          • Instruction ID: fd90949bd4f9624cf28f55ad080c43343ce8b5ea4cb7facab3d38b3fbb8b356c
                                          • Opcode Fuzzy Hash: e1078ee6254317aa7f302fe12d14b7c1b0a0c2898ed5fbaf491c85de4fe40530
                                          • Instruction Fuzzy Hash: 80218166A0CA8292EA62FBB5A4442FA63A0FF85B84F480432DE4E97715DF3CD445C748
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E5584
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E559A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E55AE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E55C2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E55D6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E55EA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E55FE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482E5612
                                            • Part of subcall function 00007FF64830E510: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E562B,?,?,00000000,00007FF6482E1073,?,?,00000000,00007FF6482E15F5), ref: 00007FF64830E525
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                          • Instruction ID: 13524ae43341ac2320cd8eca22c2d284d25f8a2a0a5180a9808be70f5b2adc40
                                          • Opcode Fuzzy Hash: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                          • Instruction Fuzzy Hash: C8113F76508F81D1D701AF75ED940EC33A4FBC9FDAB180135DE8E8FA589F38949A9214
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF061
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF071
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF07F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF08D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF09B
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF0A9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF0B7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E2856), ref: 00007FF6482DF0C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                          • Instruction ID: 1f42abb023610388592d0b1e7b22a5d194245ad5e2af6dfda04426b88be7cbd5
                                          • Opcode Fuzzy Hash: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                          • Instruction Fuzzy Hash: B8019276508B01D2D705AF71E9D413C73B8FB88FA9B141125CE8E82B18CF38D8A9D344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcmpmemcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2846809682-0
                                          • Opcode ID: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                          • Instruction ID: e3632b849aed650f7b76a492ab2548696ccc206e6abde4dfbeb40b828b54a64b
                                          • Opcode Fuzzy Hash: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                          • Instruction Fuzzy Hash: 3CA1E122A0CA8586EA14BF25D6442BA67A0FB48FD4F584531DFAD877C6DF7CD091C348
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6482E299B), ref: 00007FF6482E2137
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6482E299B), ref: 00007FF6482E2168
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID:
                                          • API String ID: 2635317215-0
                                          • Opcode ID: c13eb664660336fd0cc8a44c18222f56f9417570d696fd593da57c98a09dd568
                                          • Instruction ID: 244da6a558c70a6abe600e2894601d7fb8f75e7fcffc6cf37152c1ea62004c5a
                                          • Opcode Fuzzy Hash: c13eb664660336fd0cc8a44c18222f56f9417570d696fd593da57c98a09dd568
                                          • Instruction Fuzzy Hash: 7E919C26609BC189E755AF3895403FD37A0FB55B28F080236DFAC4B3D6CF29A5A4C725
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3401966785-2389359183
                                          • Opcode ID: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                          • Instruction ID: 94958213c3132fdaf44c3e76297d2d3fb7470a2fecc069840afdfd436f828728
                                          • Opcode Fuzzy Hash: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                          • Instruction Fuzzy Hash: EC412851A0D2C246EF1AB7B585542B92F92EB15F94F0C4635CA2F877D9DF3CE1458308
                                          APIs
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6482C3C25,?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C4FA3
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6482C3C25,?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C4FB1
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF6482C3C25,?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C4FEA
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6482C3C25,?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C4FF4
                                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF6482C3C25,?,?,?,?,?,00007FF6482C1D8B), ref: 00007FF6482C5002
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482C5031
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                          • Instruction ID: 507c757135a86bf0b899adbcf92ecc646841be586586a88785b333903c04db00
                                          • Opcode Fuzzy Hash: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                          • Instruction Fuzzy Hash: 4541D72170DA8285EE15BB36A60427FA791BB04BE4F584631DF6D877DACF3CE0418348
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr$mallocstrncpy
                                          • String ID:
                                          • API String ID: 2121287944-0
                                          • Opcode ID: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                          • Instruction ID: 921e6845db6281958462cb269202972c427d2b36a5702b6a5cb7c9ee81c70a1f
                                          • Opcode Fuzzy Hash: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                          • Instruction Fuzzy Hash: F5318521A0DB8186EE56FF72A5502797B90EF49B90F0C5A35DE8E83795DF3CE0818348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 2fd35b2195533c0d331094ca4293c55f542b21112d758763103316afcab7a770
                                          • Instruction ID: ba1066a3b02f70cb5de0178e87633c5577f17f452444ccc686a5a352f34edbf9
                                          • Opcode Fuzzy Hash: 2fd35b2195533c0d331094ca4293c55f542b21112d758763103316afcab7a770
                                          • Instruction Fuzzy Hash: CA419162B0D78244EB12BBB194441F96BA1BB05FC8F4C4836DE0E9B756DF3CE5448348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%s%lx$Signature
                                          • API String ID: 2190258309-1406629954
                                          • Opcode ID: 9fc0538b7c30dbcaa3927dab1fb2c74c56b0476ae2a7839a957097e179856c7b
                                          • Instruction ID: 2a44a8c2a98468e39ec3ec44cd87b45cc1816c681ac628d0c19ae5c321557851
                                          • Opcode Fuzzy Hash: 9fc0538b7c30dbcaa3927dab1fb2c74c56b0476ae2a7839a957097e179856c7b
                                          • Instruction Fuzzy Hash: 5331A266B0C68646EE22BBB5A4442FA67A0FF45F84F5C0432DE4E87B56DE2DE044C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 635089f868349817a7395d826d5566bd80108ba5fabe08628d655c3201992dc9
                                          • Instruction ID: abc3fba540fafaf09ba7bd84d34300e7cbe8ab07aa7b86be1418659fc7c37e1c
                                          • Opcode Fuzzy Hash: 635089f868349817a7395d826d5566bd80108ba5fabe08628d655c3201992dc9
                                          • Instruction Fuzzy Hash: DA315E62A1D78244EB16BBF594401F96BA1BF05B88F4C4835DE0E8B796EF3CE5449348
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupcallocfree
                                          • String ID:
                                          • API String ID: 1236595397-0
                                          • Opcode ID: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                          • Instruction ID: ddf6922c905fef5c6489b00571ba1ecf67e693eb1b854ad8b02759a1f7b24a5c
                                          • Opcode Fuzzy Hash: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                          • Instruction Fuzzy Hash: BC318F32A0CB8982EB52AB74E4503BD67A0EB87B88F1C4030DE4C87799DF7ED5958704
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: c27b730ff3cde937318ceaca94d7d2e2050f88c6b36777fabcdc2f85280fb528
                                          • Instruction ID: 05c54b5971ef2dc4e44613a99add03286ad6cfe6a32d98a54a493519486f222c
                                          • Opcode Fuzzy Hash: c27b730ff3cde937318ceaca94d7d2e2050f88c6b36777fabcdc2f85280fb528
                                          • Instruction Fuzzy Hash: 37316F62E0D78244EB12BBB594441F92BA1BF06B88F4C1835DE0E9B756EF3CE5449348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: 228067bf5d3222deb49f6ad5301e89e894cbfdd00d5943fb9e2fc26564e16a64
                                          • Instruction ID: 2e4170f6b752e8a138523f7714eb39bfd5d73bcd076b5e44366681b913ba027b
                                          • Opcode Fuzzy Hash: 228067bf5d3222deb49f6ad5301e89e894cbfdd00d5943fb9e2fc26564e16a64
                                          • Instruction Fuzzy Hash: 07316F62A0D78244EF12BBB594441F92BA1BF06B88F4C0835DE0E9B756EF3CE5449348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: OS/400$SITE NAMEFMT 1
                                          • API String ID: 3061335427-2049154998
                                          • Opcode ID: 8c691ee043a9838d7f606555e5d370af31043bb70f99fac059963eb7e74f2456
                                          • Instruction ID: becb7a1e76960e93f4e48128688b6129c07189ec19080e2a48712a76214aca77
                                          • Opcode Fuzzy Hash: 8c691ee043a9838d7f606555e5d370af31043bb70f99fac059963eb7e74f2456
                                          • Instruction Fuzzy Hash: 00318222A0C6C285F772BBB5E4503B92790AB47754F484031CE8DE7789DE3CE586D718
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                          • Instruction ID: 18f3103a53ec56d414920caec019e687010c9e9c85eac8192afef13ce9f435cd
                                          • Opcode Fuzzy Hash: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                          • Instruction Fuzzy Hash: 15212936608A4186E660BF62E69026A67A0FF89B91F144031CF8E83B54CF3DE8A58744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _errno_strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 2151398962-2292467869
                                          • Opcode ID: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                          • Instruction ID: bdac4887d3ec58bd9474715522ad821f9cd9ebfacc491ecfc838fe1dfc5040f7
                                          • Opcode Fuzzy Hash: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                          • Instruction Fuzzy Hash: 29615661A0D79645FF72BB35A2443BB6BD0EF44754F084036EB8E82692DF2CE884C394
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3727083984-2292467869
                                          • Opcode ID: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                          • Instruction ID: be90b25293b3316e7a24ccea7ccae1d2c47aed30d78456145ded779c77935c9f
                                          • Opcode Fuzzy Hash: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                          • Instruction Fuzzy Hash: 41615461A0D79645FF72BB35A2443BB6BE4EF44754F094036EB8E82692DF2CE484C394
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                          • API String ID: 1865132094-1204028548
                                          • Opcode ID: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                          • Instruction ID: 914f3ef83091a8f1dadd87b25b319d6e6fe20ae373aace080fe7dbf355ab7ee0
                                          • Opcode Fuzzy Hash: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                          • Instruction Fuzzy Hash: F951A671A0C6C281FB65BA3492503FF3792EB62B54F480136DB5DC6685CF2CE850E799
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _errno_strdupstrcspnstrncmpstrspn
                                          • String ID: 0123456789abcdefABCDEF:.
                                          • API String ID: 2191890455-446397347
                                          • Opcode ID: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                          • Instruction ID: dae62119fc5905a81990e6597b419445372045cbc5e23ea4f935e72f87a4ecc1
                                          • Opcode Fuzzy Hash: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                          • Instruction Fuzzy Hash: A041E412E0CAC955EB62BBB495103B93790EB07B94F4C9131EE8D876CADF2CE845C705
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: tolower$_time64
                                          • String ID: :%u$Hostname in DNS cache was stale, zapped
                                          • API String ID: 4068448496-2924501231
                                          • Opcode ID: bbf1937340bcc8fdbdd27b3c25f67e9248a7e582816edac00452e4dfd5f9c886
                                          • Instruction ID: 8f98e9a40b022c7751311e5e0e43e05e2bfcd6f6fd8d812d23b2a87ef0b61be5
                                          • Opcode Fuzzy Hash: bbf1937340bcc8fdbdd27b3c25f67e9248a7e582816edac00452e4dfd5f9c886
                                          • Instruction Fuzzy Hash: 8941C262A1C68295EB61FB35E5403BA67A0FB85B88F484231EE4D877D9DF3CE505C348
                                          APIs
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4341
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C4406
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF6482C445A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482C4461
                                            • Part of subcall function 00007FF64831F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6482C43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF64831F20A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID: https://keyauth.win/api/1.2/
                                          • API String ID: 1155477157-3933380396
                                          • Opcode ID: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                          • Instruction ID: fd88966a38752207f70cb712a8df38a83a3d520f3bdbd393b99a836bb678df78
                                          • Opcode Fuzzy Hash: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                          • Instruction Fuzzy Hash: 7331E522B0DA8544FE19FB75964427A1241AB44FF4F680630DE3D47BDADE7CE4828388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_close_openmalloc
                                          • String ID: Couldn't open file %s
                                          • API String ID: 3412525164-447283422
                                          • Opcode ID: f3f8fc9c30668e38bf7e1b4fc36f559d2a38759315c738994b48983c7e84d7f3
                                          • Instruction ID: ca997fa48c5b7f87a89085efc89e3d6fb8701272ee6e8f5a5c895e369d82b775
                                          • Opcode Fuzzy Hash: f3f8fc9c30668e38bf7e1b4fc36f559d2a38759315c738994b48983c7e84d7f3
                                          • Instruction Fuzzy Hash: 3F418161A0CB8581EB16BF75E40026AB7A1FB46B94F188131DA9D8769CEF7CE4418704
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnofreememcpyrecv
                                          • String ID: Recv failure: %s
                                          • API String ID: 267823591-4276829032
                                          • Opcode ID: 76a45e13e4a53d45da3cc6b1da66ccd2384b2d5048a0601096faee186a3d44d2
                                          • Instruction ID: 3b82a5e2b59132e862fb11d1161d4c5840961fda95061e4d8cae04e309b058be
                                          • Opcode Fuzzy Hash: 76a45e13e4a53d45da3cc6b1da66ccd2384b2d5048a0601096faee186a3d44d2
                                          • Instruction Fuzzy Hash: EB31BF72A19B4281EB11BF75EA413BA2360BB48FD8F984135DE1D87784DE3CD456C388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                          • API String ID: 3985033223-1703240927
                                          • Opcode ID: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                          • Instruction ID: 13ded1fa573093f3c68ae22c9971f7f124ca6d88b94f421e9a700639bb664680
                                          • Opcode Fuzzy Hash: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                          • Instruction Fuzzy Hash: 5A41B021E0DA4291EF12BF35A640379A760EF65FE4F495231CE2E87784EF2CD5818348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: isupper$_strdupfree
                                          • String ID: FALSE
                                          • API String ID: 3359907120-3701058176
                                          • Opcode ID: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                          • Instruction ID: 8e81fff4f015ca7e35232956047533a5cb8d509e46492c4218f178e30c92077d
                                          • Opcode Fuzzy Hash: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                          • Instruction Fuzzy Hash: 0131CF22E0C59645FB13FBB895443786F959B01FA8F8C0631CE9E81AD9CF2CA582C318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfreestrpbrk
                                          • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                          • API String ID: 1812939018-579818044
                                          • Opcode ID: 310991105be6317898f4caa6c789cae6c9633f0561393eaf4ed82575c1179860
                                          • Instruction ID: 4abf4fd8455c417c28e8c92c3ce71ddacb2572b32a2d187ce0c1553d75a98207
                                          • Opcode Fuzzy Hash: 310991105be6317898f4caa6c789cae6c9633f0561393eaf4ed82575c1179860
                                          • Instruction Fuzzy Hash: B031B062A1CB8181EB02FB75E4502B9A7A0FB8AB94F4C4231EA9E437D5DF7CD541C344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %s: %s$FALSE$TRUE
                                          • API String ID: 1865132094-3430445539
                                          • Opcode ID: 325b3fe2c30e5458511042f25abbcc62c3653c67faaa361f4360c8e5e1acd019
                                          • Instruction ID: c43ffd320bc15ae89c37987ddbc40185dfdb0bc8438287e8b736814055d78268
                                          • Opcode Fuzzy Hash: 325b3fe2c30e5458511042f25abbcc62c3653c67faaa361f4360c8e5e1acd019
                                          • Instruction Fuzzy Hash: 7C01C452A0C78281EA63BBB6A8443F56791BB05F94F8C0431CE4E83756CE3CD1858308
                                          APIs
                                            • Part of subcall function 00007FF648314290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142B6
                                            • Part of subcall function 00007FF648314290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142D7
                                            • Part of subcall function 00007FF648314290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142F2
                                            • Part of subcall function 00007FF648314290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF648314300
                                            • Part of subcall function 00007FF648314290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF648314312
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6483143B6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: HTTP$NTLM
                                          • API String ID: 2190258309-4188377180
                                          • Opcode ID: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                          • Instruction ID: 145a49bcfc75ac220576675e0525535c4d610e33443cceb19babff03be8f5db9
                                          • Opcode Fuzzy Hash: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                          • Instruction Fuzzy Hash: 9D616A3260DB8682EB61AF65E4406AE77A5FB88B84F184435DE8D83B68DF3CD454CB44
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                          • API String ID: 1294909896-1891748601
                                          • Opcode ID: 466439d91d0d7739ce5d2f9dc11d5886e8c0a76dfe12478b16c418ff8186dc87
                                          • Instruction ID: 8958a7ceadf42d1a82ecec6d90da4c27830803345a0bf9e2ab688197a69fa7f4
                                          • Opcode Fuzzy Hash: 466439d91d0d7739ce5d2f9dc11d5886e8c0a76dfe12478b16c418ff8186dc87
                                          • Instruction Fuzzy Hash: A351B762A0D68241EA66FBB491503FE6791FF43364F480235DBAD876C6DF7CE8818349
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3401966785-3412697401
                                          • Opcode ID: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                          • Instruction ID: fc16a4297f894178b0f624c931f018ce78607586010d0589eddeb923312192a2
                                          • Opcode Fuzzy Hash: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                          • Instruction Fuzzy Hash: 0C414562A0D69241FB0BA67589143782B92EB45FE8F484631CE6EC77C9CD6CD0958358
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: %s: %s
                                          • API String ID: 3401966785-1451338302
                                          • Opcode ID: 3c73917e9a3ff9f287237219b96bb395f56d01fc929189d139cfd492ab4b7b15
                                          • Instruction ID: df63dd3e09e1f03dd8c1510b27c46689337448d55c684f52e5960122e537a32d
                                          • Opcode Fuzzy Hash: 3c73917e9a3ff9f287237219b96bb395f56d01fc929189d139cfd492ab4b7b15
                                          • Instruction Fuzzy Hash: F041AC11A0D2D146FA2BBAB655183B55B81EB41FE4F4C4636CF6F87BC9CD2CD0859308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                          • API String ID: 1294909896-619256714
                                          • Opcode ID: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                          • Instruction ID: 81ae60aaa7571924bc70e3d6ca8f295cedee12a6ca09ad98f0561d66cec9cbbf
                                          • Opcode Fuzzy Hash: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                          • Instruction Fuzzy Hash: B751E462A0D6D245EB62BBB495041F97FA5FB05B80F4C8432DA8D87B59CF3CE546C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _errnofreememcpy
                                          • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                          • API String ID: 738009125-4268564757
                                          • Opcode ID: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                          • Instruction ID: 1fdd5c25d1cc58ce0d947b6f8fb0525c22976ede6bf45173172de95016226f30
                                          • Opcode Fuzzy Hash: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                          • Instruction Fuzzy Hash: 1A51D066A0CBC282EA65FF75D6402FAA391FB55B94F440036DB8D87A85DF7CE001D388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                          • API String ID: 1294909896-2752585153
                                          • Opcode ID: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                          • Instruction ID: c120468562fae97eb0dfa58a35668b480a321f7dd430d044bfc353ed5db23681
                                          • Opcode Fuzzy Hash: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                          • Instruction Fuzzy Hash: A531A562A0D7C285EB22BBB194401F9AB51FB05F84F8C5431CA4D9B65ADF3CE545C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: 3f3671f86eae8f62d8e3edd40d962123579afd74f946693b7929a666f81304e6
                                          • Instruction ID: 14e18ddb0aee76cfbc49b8dad3013eac5f3652ed26e8e21d608f2ce54d6b0800
                                          • Opcode Fuzzy Hash: 3f3671f86eae8f62d8e3edd40d962123579afd74f946693b7929a666f81304e6
                                          • Instruction Fuzzy Hash: A021B162B0CAC286EA11AB76E8442EA77A0FB49BD4F0C0532DE5D87795DF3CD145C708
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Failure sending QUIT command: %s$QUIT
                                          • API String ID: 1294909896-1162443993
                                          • Opcode ID: 9e2898ffa19f01991377d6d59213df6619a0cd1843f01d6f143049391753621f
                                          • Instruction ID: ee5ebe3d9ebe34e722c054cd7bebca0cbf9cea3ee9d73c61fff23bd8403f324f
                                          • Opcode Fuzzy Hash: 9e2898ffa19f01991377d6d59213df6619a0cd1843f01d6f143049391753621f
                                          • Instruction Fuzzy Hash: 37316B32A0C78281EB52FFB195802BA37A4FB46B88F5C4131DA4D87659CF3CE455C359
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$calloc$memcpy
                                          • String ID:
                                          • API String ID: 3478730034-0
                                          • Opcode ID: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                          • Instruction ID: a42f8549e98dde76f298fb84d823da18317754d69ed9d857a8035804d134d796
                                          • Opcode Fuzzy Hash: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                          • Instruction Fuzzy Hash: D621A1B1A0D78286E715BF21991022AA7A1FB58B90F484235DF9D97794DF3CD440E744
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupmalloc
                                          • String ID:
                                          • API String ID: 4236146995-0
                                          • Opcode ID: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                          • Instruction ID: 77847084de68f6ad72b046a4cc6293ca77e09c09e55c77eaf7a31f51eb4c1585
                                          • Opcode Fuzzy Hash: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                          • Instruction Fuzzy Hash: 79217472B1AB8581EB86EB75D4543A823D1EB46B94F0C0134DE0D8BB48EF3DD991C728
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3056473165-2389359183
                                          • Opcode ID: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                          • Instruction ID: 86d5e37156f57e22f164c1a69b84e807447f14154a6dc2f35f0570d3550885e2
                                          • Opcode Fuzzy Hash: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                          • Instruction Fuzzy Hash: D421D091A0D38241EE26BBB285042F56B92AF19FD4F4C4931CD1E8BBDADF3CA5448308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: b3f9ac1a51e1cb56c8a081f84247a427091f42702f2d27fe41e35f81361af7e0
                                          • Instruction ID: 867a8217f66a9b70b78159c6be22cf5c5eb2b08e04319dd61037d23b2ccfd4bc
                                          • Opcode Fuzzy Hash: b3f9ac1a51e1cb56c8a081f84247a427091f42702f2d27fe41e35f81361af7e0
                                          • Instruction Fuzzy Hash: 8421A166A0CA8692EA52FBB5E4442FA67A0FF85B84F480432DE4E87756DF3CD041C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: bc5e897e2579d7dd63d7d746884e3d6efa0bb8b49bbbd3ec929c441a6fa49155
                                          • Instruction ID: 868324e0c634d17aacaf7033003531d073785bec57efaa975686c0840cb5b606
                                          • Opcode Fuzzy Hash: bc5e897e2579d7dd63d7d746884e3d6efa0bb8b49bbbd3ec929c441a6fa49155
                                          • Instruction Fuzzy Hash: B7219266A0CA8292EA51FBB5E4442EA77A0FF85B84F480432DE4D87715DF3CD445C748
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: 655b0211d0849ab725f3121ffe595c78da798e7ae1bc27a02535ae4aa2ae173d
                                          • Instruction ID: 6f03d90d22914e8d369857f7d0085edddead757983c255a68a9de80a6e8c1767
                                          • Opcode Fuzzy Hash: 655b0211d0849ab725f3121ffe595c78da798e7ae1bc27a02535ae4aa2ae173d
                                          • Instruction Fuzzy Hash: 77219262A0CA8292EA51FBB5E4442EA67A0FF85B84F480432DE4E87715DF3CD445C748
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                          • Instruction ID: 822937addf0598773ca914e0ef924c9ea9b9f4658300d845d705c8ee21c2dd9d
                                          • Opcode Fuzzy Hash: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                          • Instruction Fuzzy Hash: 2E112876A08A4186E760BF62E65026A77A0FF89B91F144131DF8E83B44CF3DE4A58748
                                          APIs
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6482D2579), ref: 00007FF6482D2EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strncpy
                                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                          • API String ID: 3301158039-3625861382
                                          • Opcode ID: f68edcbc337550e6e0110a99c69435a7bbb63833a9b97754134fee37ae0c7940
                                          • Instruction ID: ea3913e8421c800417ceac3de161ca411566f7d7ff6bcc9a68130e06c85cb7fc
                                          • Opcode Fuzzy Hash: f68edcbc337550e6e0110a99c69435a7bbb63833a9b97754134fee37ae0c7940
                                          • Instruction Fuzzy Hash: BB11E962E0C64281FA59F778E6542BA1AE0DF05780FCC6131C61E876D5CE6CF5D0A288
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: FALSE$TRUE
                                          • API String ID: 1865132094-1412513891
                                          • Opcode ID: 2989acc13cbc0029e913620442beb60a4be3815a991f995df501513d7eb905cf
                                          • Instruction ID: 1aa53cf0b914c3b80c096fbc2978018f70885e15c3b9d7a378cce7a977c516a4
                                          • Opcode Fuzzy Hash: 2989acc13cbc0029e913620442beb60a4be3815a991f995df501513d7eb905cf
                                          • Instruction Fuzzy Hash: 3B41B0A2B0D25684FF17BAB594143BC2B96AB04F99F8C4D32CE5DC63C8DE3CA4448318
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _time64$ErrorLast
                                          • String ID: TFTP response timeout
                                          • API String ID: 3339832089-3820788777
                                          • Opcode ID: 10473459a6f06ee798478f4de3f92d5a919a90df5b71999465cf698376751473
                                          • Instruction ID: 3be4bf0cd4be05c19eb46e3bff7e7d54c40e48b78e8af2f0eb56ce9d15a26c85
                                          • Opcode Fuzzy Hash: 10473459a6f06ee798478f4de3f92d5a919a90df5b71999465cf698376751473
                                          • Instruction Fuzzy Hash: D841903260CA4286EB61BFB5D5006AA2790EB86BA4F584231DE2DC77C9DF3CD4418744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: %s%lx
                                          • API String ID: 573759493-530121141
                                          • Opcode ID: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                          • Instruction ID: 58a49b1c4bef87f21777fcba9989f8b20f72071c26f1d5fd6cf2a48942e6a6c5
                                          • Opcode Fuzzy Hash: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                          • Instruction Fuzzy Hash: C931F221E0D5A645FB13FBB895443BC6F919B11F88F9C4931CA8EC2A9ACF2DE541C308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: fwrite
                                          • String ID: ...$...
                                          • API String ID: 3559309478-2253869979
                                          • Opcode ID: f5d4120396a53f35d6a0aa358773e0a09f2099a20ff6d950d28a1d81d0b1d9cf
                                          • Instruction ID: 6441beb9d4cd0a9254713a643d09fa091b9dde3fe466ce6b506dbe31e347b1aa
                                          • Opcode Fuzzy Hash: f5d4120396a53f35d6a0aa358773e0a09f2099a20ff6d950d28a1d81d0b1d9cf
                                          • Instruction Fuzzy Hash: BA31E262A1CA8681EB60FB31E6043FA6391FB84B84F444131DA5D83794CF3DE545C7C8
                                          APIs
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482F3B69), ref: 00007FF6482F41BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: realloc
                                          • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                          • API String ID: 471065373-1365219457
                                          • Opcode ID: 7ed45b1ac631cbcc0d59fa2633569d3d6a32ded3c26f3460a93e82a47c38fae9
                                          • Instruction ID: 22c169be3580c67a64f62f8e5dc40763594a1349a3ffb9d35c3a959843d87be2
                                          • Opcode Fuzzy Hash: 7ed45b1ac631cbcc0d59fa2633569d3d6a32ded3c26f3460a93e82a47c38fae9
                                          • Instruction Fuzzy Hash: 72217F32B08A8586EB04EB26E5402AE6761FB49FC4F484032EF4D47B59DF3CD4A2C784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                          • Instruction ID: 0b7d703b7c41e05aab9623928260278cbae22ab73aa1eba32080599660b06a70
                                          • Opcode Fuzzy Hash: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                          • Instruction Fuzzy Hash: 91212C2260DF8685EAA5BF25E6403AA77E0EF44B94F984131CE9D83794EF3CD4548788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s$LIST "%s" *
                                          • API String ID: 0-1744359683
                                          • Opcode ID: 95d0198f69160efcdf6ba9fdb2b660f0347d07b19df1605e49ce1a338d018f18
                                          • Instruction ID: 6a0a87e8ad6404b7bcbddc53c23e764c86af558873aaa1e11aae0f3abafcca39
                                          • Opcode Fuzzy Hash: 95d0198f69160efcdf6ba9fdb2b660f0347d07b19df1605e49ce1a338d018f18
                                          • Instruction Fuzzy Hash: 15119D21E0C64281EA55BB65E5405BA6361EF58BC4F480132EE0D87755DF3CE941D788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                          • Instruction ID: 016d477e142c196aa9953cbc36e63a35331e1acbc3ac7c5572cdb4f0cf14b76f
                                          • Opcode Fuzzy Hash: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                          • Instruction Fuzzy Hash: 6F114F2260DF8585EAA5BF24E6403AA77E0EF447A4F584131CF9C83794EF3CD4548788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: SENT$Sending data failed (%d)
                                          • API String ID: 1802528911-3459338696
                                          • Opcode ID: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                          • Instruction ID: 838654b6b786c9d6cf44daa3b745fc1c4d67880c9f8b8f429465d83324dd447b
                                          • Opcode Fuzzy Hash: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                          • Instruction Fuzzy Hash: AE01F132708B82C1DB11ABBAE8004A97B60FB89FC4B5D5171CB4D83715DE3CE941C788
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3985033223-2389359183
                                          • Opcode ID: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                          • Instruction ID: ef76a864f678c3b5f5bf2d4f9f820294496bdf86cf27af78a1ad2ce76518a607
                                          • Opcode Fuzzy Hash: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                          • Instruction Fuzzy Hash: 9501A292E0D3C241FB16BBB195441F92B92BF06F84F8C4831DA0E8A756DF3CA544835D
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strchr$mallocmemcpy
                                          • String ID:
                                          • API String ID: 320687583-0
                                          • Opcode ID: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                          • Instruction ID: 4de26bbb3c1bcd5a70867a2924ddcc5183c362f470b7692201bbaebe6ccc7179
                                          • Opcode Fuzzy Hash: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                          • Instruction Fuzzy Hash: 8621041160D69241EE56B73253202BAA6D3DF66BC4F4C8034EF8D8B7C6EF1CE406D248
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142B6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142D7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF6483142F2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF648314300
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF648310D25), ref: 00007FF648314312
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                          • Instruction ID: 264df51d21284f99c050e2d0c13083ac8a225eaaa5a1293a3d941bff82b82889
                                          • Opcode Fuzzy Hash: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                          • Instruction Fuzzy Hash: 0C119236608B4182DB05BFB5E99013C73A5FF88F88B184125CE4E87B68CF38D895C344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 1294909896-910067264
                                          • Opcode ID: 2314223a42b02a56667362992ea725fa1a111eb4508a0bdd26f329100ff1f141
                                          • Instruction ID: d8e2f01af0a7194594ea6419a317915e67255a1a262767883a99cc2ef50e637e
                                          • Opcode Fuzzy Hash: 2314223a42b02a56667362992ea725fa1a111eb4508a0bdd26f329100ff1f141
                                          • Instruction Fuzzy Hash: 1351D4B1F0D69644EB13BBB5A5442B96FA5EB05B88F884032CE8D8275CCF3CE445C348
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                          • API String ID: 1294909896-2632828617
                                          • Opcode ID: b6ca05796940405e3fa667ad57ad962b43d171910b5195631f7c3f8b4d476eaa
                                          • Instruction ID: 62e2920feca007fc56ce1a1965fc838d0a7974c30cdd915600987ec8fe9b85e8
                                          • Opcode Fuzzy Hash: b6ca05796940405e3fa667ad57ad962b43d171910b5195631f7c3f8b4d476eaa
                                          • Instruction Fuzzy Hash: D741D261A1C69285EA62BBB5A5042B9BBA2FB45F90F4C4031DE8D83B55CF3CE546D30C
                                          APIs
                                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6482CD198), ref: 00007FF6482CD5AE
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6482CD198), ref: 00007FF6482CD5DC
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6482CD198), ref: 00007FF6482CD645
                                            • Part of subcall function 00007FF64831F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6482C43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6482C1B49), ref: 00007FF64831F20A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6482CD652
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                          • String ID:
                                          • API String ID: 2942768764-0
                                          • Opcode ID: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                          • Instruction ID: 7899e7e98471e58faa00bfa71cc2ba81ae1ba6fce8799a23b70e74db4c8f1ccb
                                          • Opcode Fuzzy Hash: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                          • Instruction Fuzzy Hash: D141A07270AA4585EA14FF75D2442BE6361BB48BE4F688A31DB2D837C6DF2CE051D348
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF6482FE220,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF64831ACC3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64831AD4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: 1a2af4c6437707a263c2e04b6871f1d6755b0c65e1c6e58b2568f2a7d7757bd0
                                          • Instruction ID: bfd23a47a209ae4c0507b7346c183e2ba9d4684c466b7ad4a7e28227c2c45878
                                          • Opcode Fuzzy Hash: 1a2af4c6437707a263c2e04b6871f1d6755b0c65e1c6e58b2568f2a7d7757bd0
                                          • Instruction Fuzzy Hash: 08418332A0CB4582E651EB36F5501AAB7A1FB45B90F084234DF8E87BA5DF3CE4958748
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                          • Instruction ID: be9d4711cd5576323ae7649958f1d85a3f68be2fb5fcb33a837c21f7b6ff61f1
                                          • Opcode Fuzzy Hash: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                          • Instruction Fuzzy Hash: 5831022270DB8594EE14BF76A6042BA6351AB04BE0F980734DF6D477CACF7CE0918388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                          • API String ID: 1294909896-918878739
                                          • Opcode ID: cf2825dc601f22ed468ee35b6bb29dedeb88632c42a2c12affe150d9ed24460d
                                          • Instruction ID: 75c8ec98e7c759f40f088969f1fb293713867aca462d0cc76738e034e9e0889f
                                          • Opcode Fuzzy Hash: cf2825dc601f22ed468ee35b6bb29dedeb88632c42a2c12affe150d9ed24460d
                                          • Instruction Fuzzy Hash: 9531C262B0DB8584EB13ABB5D5402A97B62FB45B98F8C8432CE4D87789CF3CE555C348
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF648306204
                                            • Part of subcall function 00007FF6482E5AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6482E5C15
                                            • Part of subcall function 00007FF6482E5AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6482E5C30
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: fwrite$free
                                          • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                          • API String ID: 3468156532-1133524294
                                          • Opcode ID: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                          • Instruction ID: 8799540fa7f20a8f8b19c83182c302ea79c1d72c1be26212c1a60947d4b2107c
                                          • Opcode Fuzzy Hash: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                          • Instruction Fuzzy Hash: 27414F36A0CB82C5E711FFB9D4541AD23A0EB46B85F494036DE4E9B39DEE3CD4458344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                          • API String ID: 1294909896-1153420294
                                          • Opcode ID: 5bf4d807dab3c4c4c80c6444e0c9514796da9ea9dd13b643f44312d4cc7cdbe3
                                          • Instruction ID: dcb3e6ce05757920ea50d8906f583cd6704976ab776a4b9ee6d1964c7447a48c
                                          • Opcode Fuzzy Hash: 5bf4d807dab3c4c4c80c6444e0c9514796da9ea9dd13b643f44312d4cc7cdbe3
                                          • Instruction Fuzzy Hash: C431B462A0CB8284E762BBB1E4446E97B91FB45B84F984431CE4D87746CF7CE545D30C
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3056473165-3412697401
                                          • Opcode ID: 1937b63237afc5f6f21e48b4429b9b86981b2e9b08ff3c4b24e74200198c31d2
                                          • Instruction ID: d621ac668b88409df7ea4d0a50eb2b36f21bbd9943a9bec40099d4c7b7f41a6e
                                          • Opcode Fuzzy Hash: 1937b63237afc5f6f21e48b4429b9b86981b2e9b08ff3c4b24e74200198c31d2
                                          • Instruction Fuzzy Hash: 7821AE66B0D74644EF07BABA9A043786B52AB44FE8F884532CD1E877D9DE7CE4818344
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482E0292
                                          • memcpy.VCRUNTIME140 ref: 00007FF6482E02CD
                                            • Part of subcall function 00007FF6482D5620: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482D5635
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482E0302
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5757
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5763
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: %s:
                                          • API String ID: 901724546-64597662
                                          • Opcode ID: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                          • Instruction ID: 8ca97689e2a99ff14541b0daef3942241ca97a7796df4a63064bd52ff9289d3e
                                          • Opcode Fuzzy Hash: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                          • Instruction Fuzzy Hash: C921A626A0CA8591DB01FF22EA401BB77A4FB54BE4F484132EE9D47795DF3CD4468388
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: %s: %s
                                          • API String ID: 3056473165-1451338302
                                          • Opcode ID: 6fde202d0c3394d4d3b152cbdee7f1931a83e8931206ff3ebd1cffdcec02409d
                                          • Instruction ID: 15f1f9a6278828177032120214aa9cf3ace3e7f7f5e4229bfc60e8f7897ef02a
                                          • Opcode Fuzzy Hash: 6fde202d0c3394d4d3b152cbdee7f1931a83e8931206ff3ebd1cffdcec02409d
                                          • Instruction Fuzzy Hash: BB21D151B0C78241EA67BBA6A9043B69691BB85FE4F4C4532CE1D87B89DE3CE4858308
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$%s%lx$Start Date
                                          • API String ID: 1294909896-3519493645
                                          • Opcode ID: a1b6b3256ead3aeb3d1a1e51bff87909139f67e609f50f31950d91eaa5aa90a4
                                          • Instruction ID: 8e34e2aa9321bdbb4a7e8c92cd580aeef0281b519e66557f16606fa79f7f9a63
                                          • Opcode Fuzzy Hash: a1b6b3256ead3aeb3d1a1e51bff87909139f67e609f50f31950d91eaa5aa90a4
                                          • Instruction Fuzzy Hash: 9B21C552B1D2C245EE22BBB595442F92B92AB06F84F8C5831DA0E8B786DF3DE144834C
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6482E8FA8), ref: 00007FF6482E90F5
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6482E8FA8), ref: 00007FF6482E910F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                          • Instruction ID: f4c80256eee94fedc1c891c9638f246e9dd44bf40498ee01fffc88e7614621d6
                                          • Opcode Fuzzy Hash: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                          • Instruction Fuzzy Hash: 3921C632A0D56246EB22BB31D5503BE7B94AB45F48F494132CB59C22C5DE1CE604C7D8
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF648313E99,00000000,?,?,00007FF648313456), ref: 00007FF648313159
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF648313E99,00000000,?,?,00007FF648313456), ref: 00007FF648313190
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF648313E99,00000000,?,?,00007FF648313456), ref: 00007FF6483131A2
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF648313E99,00000000,?,?,00007FF648313456), ref: 00007FF6483131CA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpyrealloc
                                          • String ID:
                                          • API String ID: 3881842442-0
                                          • Opcode ID: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                          • Instruction ID: 3be2dfef3bfdbc11d6e08265a985696e9b515fccab3715b5b056b44ad9d85ce9
                                          • Opcode Fuzzy Hash: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                          • Instruction Fuzzy Hash: D0215E26609B8182DB45EF66E490229A7A0FB48FC8B488431DE9E47759DF3CD895C704
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strstr$calloc
                                          • String ID: ;type=
                                          • API String ID: 3224321581-3507045495
                                          • Opcode ID: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                          • Instruction ID: 6bfd808e34cf39d79e9a0ebd4c03196fc470eb30d95a8647fde280c8ffd9567c
                                          • Opcode Fuzzy Hash: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                          • Instruction Fuzzy Hash: E221C431A0C68281EB16EB74E4503A877A0FB5A784F0C4131DB9E8B7CADF2CE4918344
                                          APIs
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBF68
                                          • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBF8E
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBFAF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6482E04B9,?,?,?,?,00007FF6482DF85B), ref: 00007FF6482FBFC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: realloc$EnvironmentVariablefree
                                          • String ID:
                                          • API String ID: 2828309815-0
                                          • Opcode ID: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                          • Instruction ID: 6905ab9b5868c5c21b2685c265e09d36aecbd13c8bdb60ee732ef4574abf428f
                                          • Opcode Fuzzy Hash: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                          • Instruction Fuzzy Hash: 96118A25B0D74242EA65BB72664023BA192FF58BC0F184535EE8D83BC4DE3CE4409B88
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$freemalloc
                                          • String ID:
                                          • API String ID: 2605342592-0
                                          • Opcode ID: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                          • Instruction ID: 7e81f8a75d775e20a2fb2642b88c77183595ca4a1c709c6e7e189d6c34defecb
                                          • Opcode Fuzzy Hash: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                          • Instruction Fuzzy Hash: 0D115E31B0DB4186EB11AFA2B90012D7BA0FB88FD0B484438DF8987B14DF3CE9018784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Proxy-Connection: Keep-Alive
                                          • API String ID: 1294909896-2835282938
                                          • Opcode ID: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                          • Instruction ID: e9ad69323c9e3bd7b32d1737b1cb7547d079288ac392d917c310f32179eb5f78
                                          • Opcode Fuzzy Hash: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                          • Instruction Fuzzy Hash: 4D018462B0964182FA167B65B9503BA6291EF94BF0F484230DFAD477D4DF3C9889D384
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$CriticalDeleteSectionclosesocket
                                          • String ID:
                                          • API String ID: 3086658127-0
                                          • Opcode ID: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                          • Instruction ID: 3d5d4695b84957bc967bd5eb7d9ecd321068970f2eb6cd10785cf98d260b9dae
                                          • Opcode Fuzzy Hash: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                          • Instruction Fuzzy Hash: D7017112D1CB8283EB45FF71C9601782360FFE9F28B056325EE6D411A5AF68E5D48244
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                          • Instruction ID: 2a1c2b6036e7f890c7d820f2ed282e04f33679c86809762d23d76ab637787994
                                          • Opcode Fuzzy Hash: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                          • Instruction Fuzzy Hash: 1CF0A721B1D55341EB127B76D8547BA2B98AF5ABC4F0D5136C91EC63D4CE1CE704C398
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                          • Instruction ID: c5ec2457a9b277177f38f1543fc67375978d4fdb6bd25e92d2c1661ab177a21e
                                          • Opcode Fuzzy Hash: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                          • Instruction Fuzzy Hash: E2F0A721B1D55341EB127B76D8547BA2B98AF5ABC4F0D5136C90EC63D4CE1CE704C398
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6482E6576), ref: 00007FF6483111D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _errno
                                          • String ID: %lx
                                          • API String ID: 2918714741-1448181948
                                          • Opcode ID: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                          • Instruction ID: 6431243e6595704f9c7fee209cdb5a32403635065ac66cac53c5f5516951415a
                                          • Opcode Fuzzy Hash: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                          • Instruction Fuzzy Hash: 6A814C22A1C1D585EB6AAA7594502BE7FE0FB85F90F1C5235EA9EC26C2DE3CDC41C704
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6482FC8C3), ref: 00007FF6482FCFB2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6482FC8C3), ref: 00007FF6482FD003
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupmalloc
                                          • String ID: (){ %*]
                                          • API String ID: 3515966317-731572209
                                          • Opcode ID: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                          • Instruction ID: 4645aa2af10a8336787ff68855bf2ead96c46dc43a8e11a2f4955bfd9498cab6
                                          • Opcode Fuzzy Hash: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                          • Instruction Fuzzy Hash: 7A316C1190D7AA54FF227B3452403766BC39F76B54F984236DB8E833C1CE2DA809E794
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: mallocrealloc
                                          • String ID:
                                          • API String ID: 948496778-3916222277
                                          • Opcode ID: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                          • Instruction ID: e77e672abe3d4bc12e404c66b92df1fec8ef0e473a30b12f12d64173207bf0eb
                                          • Opcode Fuzzy Hash: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                          • Instruction Fuzzy Hash: 20118172609B8182DB55AF35F25027973A0FB18FD4F484535DA9E97B98EF38D890C384
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: getsockoptsetsockopt
                                          • String ID: @
                                          • API String ID: 194641219-2726393805
                                          • Opcode ID: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                          • Instruction ID: 2c51882bd8c487df44478516de20e5432dd91350ca9e4d00b9e8d7b9a86de243
                                          • Opcode Fuzzy Hash: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                          • Instruction Fuzzy Hash: 94116071A0C2828AE720FF70E40067AB7A0FB90744F580030DB4887A94DFBDE589CB48
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %I64d-
                                          • API String ID: 1865132094-19666937
                                          • Opcode ID: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                          • Instruction ID: 20a8c095c3dede39218efa3002bf015f35ebfd822b18c0089bd76e71e5fefbaa
                                          • Opcode Fuzzy Hash: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                          • Instruction Fuzzy Hash: 1111E172A1EA82C1EB15BB7895453FA23A2FB54B49F1C4035C90C8E265DE2C94968368
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: TRUE
                                          • API String ID: 1865132094-3412697401
                                          • Opcode ID: ad9779da957951eca70e867832938f9a96f8dab6fd6b606cbe80922ad7a3ef30
                                          • Instruction ID: 351d4735b6a7b5ed7d1e6a886e73bd3382b3bd0640b5e434c9fed07b3dd65af8
                                          • Opcode Fuzzy Hash: ad9779da957951eca70e867832938f9a96f8dab6fd6b606cbe80922ad7a3ef30
                                          • Instruction Fuzzy Hash: 56019666A0D65544EF03BBB5E5002782B62AB04FA8F884832CE4E86798DE3CD4858314
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482D87EA
                                          • memcpy.VCRUNTIME140 ref: 00007FF6482D891C
                                          • memcpy.VCRUNTIME140 ref: 00007FF6482D8938
                                            • Part of subcall function 00007FF6482EDDD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482D66F3,?,?,00000000,00007FF6482E0FC2,?,?,00000000,00007FF6482E15F5), ref: 00007FF6482EDE0C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: freememcpy
                                          • String ID:
                                          • API String ID: 3223336191-0
                                          • Opcode ID: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                          • Instruction ID: d813378d57fd056348b2adcd900d7133793f1c69ed44202f6bdca0a37a69458a
                                          • Opcode Fuzzy Hash: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                          • Instruction Fuzzy Hash: A0C16C36B08A068AEB14AB75D5007AE37B1FB44BA8F444635CE2D977D8DF38E406D784
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: %s: %s
                                          • API String ID: 3985033223-1451338302
                                          • Opcode ID: 6fd051ae12b54f2a92270519f6d97962798999720b261752d85002a3e6645c6b
                                          • Instruction ID: 473a0e81bbe3dbfc1a6a2c938a969899c2e6842a40229434ebb2c4f5dfdf1655
                                          • Opcode Fuzzy Hash: 6fd051ae12b54f2a92270519f6d97962798999720b261752d85002a3e6645c6b
                                          • Instruction Fuzzy Hash: 46F0AF51A0C68281EA63B7B2A8447F55790BB45FD4F8C0432CE4E8775A8F3CD58A930C
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6483103A8), ref: 00007FF64831D2A1
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6483103A8), ref: 00007FF64831D2B4
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6483103A8), ref: 00007FF64831D2DB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6483103A8), ref: 00007FF64831D2E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$freemalloc
                                          • String ID:
                                          • API String ID: 2605342592-0
                                          • Opcode ID: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                          • Instruction ID: 91eaba739294058091f6db5c51ad04e0fe41472b7ed56ac44460498c8dbbabd8
                                          • Opcode Fuzzy Hash: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                          • Instruction Fuzzy Hash: 0C112131B0C75282EB21ABAAF45002AB7A0EF89B94B5C4535DB9D87B58DE3CE5418744
                                          APIs
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5757
                                            • Part of subcall function 00007FF6482D5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482DFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6482D1B61), ref: 00007FF6482D5763
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DBC36
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DBC46
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6482DBC54
                                          • memset.VCRUNTIME140 ref: 00007FF6482DBC8F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID:
                                          • API String ID: 2717317152-0
                                          • Opcode ID: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                          • Instruction ID: 2f1c9fa661204da00dd350ac74d343a859a1d787a13c9ce63446c30b5873023f
                                          • Opcode Fuzzy Hash: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                          • Instruction Fuzzy Hash: 7C211A32E18B81A3E708EB32DB902A96360FB99740F559225EB9C43A11DF74F1F5C340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                          • Instruction ID: 75dee168e69de7bd58b9491209dc36058f6b3e0fe0aa02642fcd3b34124767b0
                                          • Opcode Fuzzy Hash: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                          • Instruction Fuzzy Hash: 9E11F876A0DA4182EB55BFB5E89023C77A5FF94F84F184032CA4E82768CE3CD895C344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                          • Instruction ID: 8eba3051129b6b757f50c24ca5257a8b5f1e21fa24c6e9041dbb1934743ca3ff
                                          • Opcode Fuzzy Hash: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                          • Instruction Fuzzy Hash: 8A112536608B80C6D741EF65E58026873A4F784F84F084036DE8E97728CF38E8A9C344
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E8405,?,?,00000000,00007FF6482E10C1,?,?,00000000,00007FF6482E15F5), ref: 00007FF6483121F0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E8405,?,?,00000000,00007FF6482E10C1,?,?,00000000,00007FF6482E15F5), ref: 00007FF648312216
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E8405,?,?,00000000,00007FF6482E10C1,?,?,00000000,00007FF6482E15F5), ref: 00007FF648312224
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6482E8405,?,?,00000000,00007FF6482E10C1,?,?,00000000,00007FF6482E15F5), ref: 00007FF648312232
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1822581234.00007FF6482C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6482C0000, based on PE: true
                                          • Associated: 00000000.00000002.1822570142.00007FF6482C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822613384.00007FF648321000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822629250.00007FF648338000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1822641543.00007FF648339000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff6482c0000_G9e272AEyo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                          • Instruction ID: 8317499d64cd1904a63b1ca7f7cefdd619b745fc10bbf3fc8a52830a857c0bbf
                                          • Opcode Fuzzy Hash: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                          • Instruction Fuzzy Hash: EAF07476608B0192DB05AF76E99402873B4FB98F987194121CE9E87B68CF3CD8A5C344