Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bC7vK74a5a.exe

Overview

General Information

Sample name:bC7vK74a5a.exe
renamed because original name is a hash value
Original sample name:728c57cf9e4022a270356c0e2341e7f4.exe
Analysis ID:1538241
MD5:728c57cf9e4022a270356c0e2341e7f4
SHA1:4cf9c62cd6fc7bb9a025326831574e3444e6f93f
SHA256:f44f58459e9f4bb4af9159ec4aae9bb37e4cc8cae779d1a9ff3d755ba0bdaf53
Tags:64exetrojan
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • bC7vK74a5a.exe (PID: 5544 cmdline: "C:\Users\user\Desktop\bC7vK74a5a.exe" MD5: 728C57CF9E4022A270356C0E2341E7F4)
    • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1272 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6820 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1352 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6940 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1800 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7012 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5848 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2664 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5040 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 3400 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1364 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5424 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6036 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1420 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3940 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4444 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3552 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1364 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7012 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • WerFault.exe (PID: 1800 cmdline: C:\Windows\system32\WerFault.exe -pss -s 460 -p 5544 -ip 5544 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • cmd.exe (PID: 5576 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1016 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5324 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 1352 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5724 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6168 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2664 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5576 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5324 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6968 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6036 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6940 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5956 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6820 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 5576 cmdline: C:\Windows\system32\WerFault.exe -u -p 5544 -s 996 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: bC7vK74a5a.exeReversingLabs: Detection: 36%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
Source: bC7vK74a5a.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B9F3D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF6139B9F3D
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139D63F0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF6139D63F0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B9300 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6139B9300
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139BC1C0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF6139BC1C0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139BC220 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6139BC220
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B9230 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF6139B9230
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139BC210 CryptHashData,0_2_00007FF6139BC210
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139D5AD0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF6139D5AD0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DEF30 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6139DEF30
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DCE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF6139DCE40
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF61399F0E0
Source: bC7vK74a5a.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF6139C8B00
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: bC7vK74a5a.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Aim\x64\Release\EpicGames.pdb source: bC7vK74a5a.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF613991530 rand,rand,rand,SetConsoleTitleA,_invalid_parameter_noinfo_noreturn,GetConsoleWindow,GetWindowLongPtrA,SetWindowLongPtrA,SetLayeredWindowAttributes,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z,URLDownloadToFileA,system,system,Sleep,exit,URLDownloadToFileA,system,system,Sleep,exit,_invalid_parameter_noinfo_noreturn,0_2_00007FF613991530
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: bC7vK74a5a.exeString found in binary or memory: http://185.101.104.122/aimhvcibronkzops.exe
Source: bC7vK74a5a.exeString found in binary or memory: http://185.101.104.122/aimhvcibronkzops.exeC:
Source: bC7vK74a5a.exeString found in binary or memory: http://185.101.104.122/aimhvciforabronkz.exe
Source: bC7vK74a5a.exeString found in binary or memory: http://185.101.104.122/aimhvciforabronkz.exeC:
Source: Amcache.hve.37.drString found in binary or memory: http://upx.sf.net
Source: bC7vK74a5a.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: bC7vK74a5a.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ace
Source: bC7vK74a5a.exe, 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmp, bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/EL=6
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DCE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF6139DCE40
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139915300_2_00007FF613991530
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139AF5900_2_00007FF6139AF590
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A7CC00_2_00007FF6139A7CC0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A89800_2_00007FF6139A8980
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A69800_2_00007FF6139A6980
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B9F3D0_2_00007FF6139B9F3D
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139C95200_2_00007FF6139C9520
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B53E00_2_00007FF6139B53E0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A33300_2_00007FF6139A3330
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398D2500_2_00007FF61398D250
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139CD2200_2_00007FF6139CD220
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A98400_2_00007FF6139A9840
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B28900_2_00007FF6139B2890
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398973B0_2_00007FF61398973B
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139BC5D00_2_00007FF6139BC5D0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A06000_2_00007FF6139A0600
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398955D0_2_00007FF61398955D
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139D15B00_2_00007FF6139D15B0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139D05800_2_00007FF6139D0580
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B7CC00_2_00007FF6139B7CC0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398ABFD0_2_00007FF61398ABFD
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398EB700_2_00007FF61398EB70
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139D5AD00_2_00007FF6139D5AD0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139C49F00_2_00007FF6139C49F0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139989900_2_00007FF613998990
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139BA0050_2_00007FF6139BA005
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139810000_2_00007FF613981000
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B9FFC0_2_00007FF6139B9FFC
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DEEC00_2_00007FF6139DEEC0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DCE400_2_00007FF6139DCE40
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF61398DDE00_2_00007FF61398DDE0
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139A8DB0 appears 46 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139A5AF0 appears 323 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139AA2A0 appears 37 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF613993030 appears 49 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139AA330 appears 33 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139A0240 appears 70 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139E0236 appears 47 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139A8E80 appears 35 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139AA410 appears 34 times
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: String function: 00007FF6139A5970 appears 378 times
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 5544 -ip 5544
Source: classification engineClassification label: mal60.evad.winEXE@68/22@1/2
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF613992640 GetLastError,_errno,FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF613992640
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5544
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:1800:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\53f70cbc-026b-4400-b7d3-304e0b37b315Jump to behavior
Source: bC7vK74a5a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\bC7vK74a5a.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: bC7vK74a5a.exeReversingLabs: Detection: 36%
Source: bC7vK74a5a.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\bC7vK74a5a.exe "C:\Users\user\Desktop\bC7vK74a5a.exe"
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 5544 -ip 5544
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5544 -s 996
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: bC7vK74a5a.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: bC7vK74a5a.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: bC7vK74a5a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Aim\x64\Release\EpicGames.pdb source: bC7vK74a5a.exe
Source: bC7vK74a5a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: bC7vK74a5a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: bC7vK74a5a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: bC7vK74a5a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: bC7vK74a5a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A8660 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF6139A8660
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-47824
Source: C:\Users\user\Desktop\bC7vK74a5a.exeAPI coverage: 4.3 %
Source: Amcache.hve.37.drBinary or memory string: VMware
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.37.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.37.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.37.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.37.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.37.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.37.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.37.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.37.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.37.drBinary or memory string: vmci.sys
Source: Amcache.hve.37.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.37.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.37.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: VMware20,1
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.37.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.37.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.37.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.37.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.37.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.37.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139E00E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6139E00E8
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139E00E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6139E00E8
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A8660 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF6139A8660
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DF9F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6139DF9F4
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DFEF4 SetUnhandledExceptionFilter,0_2_00007FF6139DFEF4
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DFD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6139DFD4C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\bC7vK74a5a.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139DFF64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6139DFF64
Source: Amcache.hve.37.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139B4A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6139B4A60
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139CB4F1 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF6139CB4F1
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139CB750 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF6139CB750
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139A7630 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF6139A7630
Source: C:\Users\user\Desktop\bC7vK74a5a.exeCode function: 0_2_00007FF6139C49F0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF6139C49F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
11
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538241 Sample: bC7vK74a5a.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 60 38 keyauth.win 2->38 44 Multi AV Scanner detection for submitted file 2->44 46 Machine Learning detection for sample 2->46 48 AI detected suspicious sample 2->48 8 bC7vK74a5a.exe 1 2->8         started        signatures3 process4 dnsIp5 40 keyauth.win 104.26.0.5, 443, 49734 CLOUDFLARENETUS United States 8->40 42 127.0.0.1 unknown unknown 8->42 50 Excessive usage of taskkill to terminate processes 8->50 12 cmd.exe 1 8->12         started        15 cmd.exe 1 8->15         started        17 cmd.exe 1 8->17         started        19 17 other processes 8->19 signatures6 process7 file8 52 Excessive usage of taskkill to terminate processes 12->52 22 taskkill.exe 1 12->22         started        24 taskkill.exe 1 15->24         started        26 taskkill.exe 1 17->26         started        36 C:\ProgramData\Microsoft\...\Report.wer, Unicode 19->36 dropped 28 taskkill.exe 1 19->28         started        30 taskkill.exe 1 19->30         started        32 taskkill.exe 1 19->32         started        34 10 other processes 19->34 signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
bC7vK74a5a.exe37%ReversingLabsWin32.Trojan.Generic
bC7vK74a5a.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.37.drfalse
      • URL Reputation: safe
      unknown
      https://keyauth.win/api/1.2/EL=6bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://185.101.104.122/aimhvcibronkzops.exebC7vK74a5a.exefalse
          unknown
          https://keyauth.win/api/1.1/acebC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://185.101.104.122/aimhvciforabronkz.exeC:bC7vK74a5a.exefalse
              unknown
              http://185.101.104.122/aimhvciforabronkz.exebC7vK74a5a.exefalse
                unknown
                https://curl.haxx.se/docs/http-cookies.htmlbC7vK74a5a.exefalse
                • URL Reputation: safe
                unknown
                https://curl.haxx.se/docs/http-cookies.html#bC7vK74a5a.exefalse
                  unknown
                  https://keyauth.win/api/1.2/bC7vK74a5a.exe, 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmp, bC7vK74a5a.exe, 00000000.00000002.2249952326.000002E662A2C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.101.104.122/aimhvcibronkzops.exeC:bC7vK74a5a.exefalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.0.5
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1538241
                      Start date and time:2024-10-20 21:27:19 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 51s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:42
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:bC7vK74a5a.exe
                      renamed because original name is a hash value
                      Original Sample Name:728c57cf9e4022a270356c0e2341e7f4.exe
                      Detection:MAL
                      Classification:mal60.evad.winEXE@68/22@1/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 42
                      • Number of non-executed functions: 226
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 52.168.117.173
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • VT rate limit hit for: bC7vK74a5a.exe
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.0.5J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winlvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSlvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0elvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                        • 104.26.0.5
                                        gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9982394840034947
                                        Encrypted:false
                                        SSDEEP:192:RUGhRB6xr0FsA+jnVm8zuiFRZ24lO8f0:3Rsx4FsA+jZzuiFRY4lO8f
                                        MD5:78F062BD38A87161B42B05EBB2E68C39
                                        SHA1:B9A9844BCCF145B4604E0D1689DA41A58E43899B
                                        SHA-256:6A75743722CCEC80297A732CC7AA97359A3EFA6D96D528635BDADD6D1E0B8D5F
                                        SHA-512:6D79EA439B755801551F0964597B49CC6D131C85BEF6BF6544E8142D77E0F76C279D2356E81FDF54BDC33D64EA9B23C4CA3670D4B64A138F69759B4703E2B7CF
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.6.1.1.1.3.4.5.3.5.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.6.1.1.1.9.5.4.7.2.1.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.d.6.d.6.1.4.-.7.d.b.d.-.4.c.8.2.-.b.5.d.8.-.5.0.5.1.d.f.a.7.e.b.d.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.8.b.b.0.3.c.-.e.a.b.9.-.4.8.6.3.-.9.7.4.0.-.b.1.b.9.1.5.4.3.7.e.b.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.b.C.7.v.K.7.4.a.5.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.a.8.-.0.0.0.1.-.0.0.1.4.-.7.5.c.d.-.e.0.3.9.2.6.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.b.3.5.d.2.7.3.a.6.d.b.b.c.1.5.a.7.2.7.d.3.4.9.4.f.6.9.9.2.a.8.0.0.0.0.f.f.f.f.!.0.0.0.0.4.c.f.9.c.6.2.c.d.6.f.c.7.b.b.9.a.0.2.5.3.2.6.8.3.1.5.7.4.e.3.4.4.4.e.6.f.9.3.f.!.b.C.7.v.K.7.4.a.5.a...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.6.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:28:31 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):105812
                                        Entropy (8bit):1.6107327880710214
                                        Encrypted:false
                                        SSDEEP:384:H7Ni/EFW0Zv20tqRuKb5gbkOJukt1RDR8pXURleGx:pLW0dBoRuKb50yURlD
                                        MD5:F6DD9BEE81B7334624290EAC573F2F62
                                        SHA1:DE8D162CEBFC912A1CB9408CAE96DD08367AECCF
                                        SHA-256:D1EC0869755EFFE81416363D2A1F249A4CE257872747600387C79A28C13DA337
                                        SHA-512:54ECCAC8412B47F3FE5788DA4DB1556BA9053C28F8A3C3D0D590CA28160A99B26982732DDC6AED66E2AE7EFE7FCB8F55D49FE7304296BD5F6D5D4EFD904F5EC5
                                        Malicious:false
                                        Preview:MDMP..a..... ........Y.g............$...............,............J..........T.......8...........T...........p'...u.......................!..............................................................................eJ......T"......Lw......................T............Y.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):10142
                                        Entropy (8bit):3.717381837756507
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJk3Jb6Y9aHQgmf55Ppr189bFpqh36x5bfHl3m:R6lXJc16YwHQgmf55gF0h36x5bf4
                                        MD5:18D5BF590236FDE7384705053BAED522
                                        SHA1:D3C2C2C0C2BB1726D5D6DFD0EA0CD6D73D6C0807
                                        SHA-256:25BCEAA028331A339AB064423ED43E5ED350CE5BFFFC6ABDF2808E4A2B69620E
                                        SHA-512:88C0E84956AFB55BC4EBFF6089ED0FCC0893454909C0C837D285D9F305B9A5200AA12B85EAA406D02BAEE5226EDBFC49CEB82945108EF782037B58244B7AF0DB
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.4.4.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4645
                                        Entropy (8bit):4.459171110618495
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zsjJg771I9wLWpW8VYWYm8M4JPaFsoyq851w0svd:uIjf9I7f67VqJIP0svd
                                        MD5:DDA218003531F2D50239AC2E5C9A502A
                                        SHA1:31281A0FE34019E08AD6201AEC23CB1803802BA8
                                        SHA-256:F1B5F3EA6805544A34ED1A80358B949F87F4B4A39A9ED986F92C259B9DC1C37C
                                        SHA-512:102817598519C21E86E426B893E45F6222CB23194886D91AF18B59CA04130B6EEC8DF40FD66A868AB524C886140470A64F8014B2C81438205DCFAF7D8625F8CF
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552151" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.465593169957847
                                        Encrypted:false
                                        SSDEEP:6144:JIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uN1dwBCswSbt:6XD94zWlLZMM6YFHP+t
                                        MD5:21E78882BDBB814DDCC27B8D9D9BDD57
                                        SHA1:4B9C887B22C31263C066E09702C3A32C2FB2E3F7
                                        SHA-256:477500D384ADCFFD845CCDC704C8F03974F88ACD4A5B028310BC12C6EC42FCBD
                                        SHA-512:B6AC995AE4F58830F78564527333E5739327D4649F18BF19E9328D18262F5546EE2230A29E905A83E3D03A3EF0287C29929D6523A6725160E4D971A72CCE0D19
                                        Malicious:false
                                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.-#?&#................................................................................................................................................................................................................................................................................................................................................4.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\cmd.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):44
                                        Entropy (8bit):4.003997527334849
                                        Encrypted:false
                                        SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                        MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                        SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                        SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                        SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                        Malicious:false
                                        Preview:The system cannot find the file specified...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):6.4232273237386295
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:bC7vK74a5a.exe
                                        File size:506'368 bytes
                                        MD5:728c57cf9e4022a270356c0e2341e7f4
                                        SHA1:4cf9c62cd6fc7bb9a025326831574e3444e6f93f
                                        SHA256:f44f58459e9f4bb4af9159ec4aae9bb37e4cc8cae779d1a9ff3d755ba0bdaf53
                                        SHA512:2a7ffd46a1c13c68ccb7cb1d60a5628bd7de63ae15e17c19c9bd48c2e53b635d0b2ea684c5dc878aef08a02a50662183b16ad031ac1be3ded3fe227985fcf7a2
                                        SSDEEP:6144:ty8K4ZP3rneV8giiDYviaN4TuNy+m4W70Lzxw2T942uHde9VWWYpQUCgTf1:tDxVtfkYvi3qNRWYLz2m+P4mwUC6f1
                                        TLSH:F3B46D56A7A907E9D1A7D03CC547C603E7B6B4991310DBDB43A0CA791F63BE12E3A720
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x14005f9d8
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x670FD9A3 [Wed Oct 16 15:20:03 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007F5EACC6A668h
                                        dec eax
                                        add esp, 28h
                                        jmp 00007F5EACC69F57h
                                        int3
                                        int3
                                        jmp 00007F5EACC6A918h
                                        int3
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov ebx, ecx
                                        xor ecx, ecx
                                        call dword ptr [0000178Bh]
                                        dec eax
                                        mov ecx, ebx
                                        call dword ptr [000016F2h]
                                        call dword ptr [00001774h]
                                        dec eax
                                        mov ecx, eax
                                        mov edx, C0000409h
                                        dec eax
                                        add esp, 20h
                                        pop ebx
                                        dec eax
                                        jmp dword ptr [00001770h]
                                        dec eax
                                        mov dword ptr [esp+08h], ecx
                                        dec eax
                                        sub esp, 38h
                                        mov ecx, 00000017h
                                        call dword ptr [00001764h]
                                        test eax, eax
                                        je 00007F5EACC6A0E9h
                                        mov ecx, 00000002h
                                        int 29h
                                        dec eax
                                        lea ecx, dword ptr [00018E12h]
                                        call 00007F5EACC6A2AEh
                                        dec eax
                                        mov eax, dword ptr [esp+38h]
                                        dec eax
                                        mov dword ptr [00018EF9h], eax
                                        dec eax
                                        lea eax, dword ptr [esp+38h]
                                        dec eax
                                        add eax, 08h
                                        dec eax
                                        mov dword ptr [00018E89h], eax
                                        dec eax
                                        mov eax, dword ptr [00018EE2h]
                                        dec eax
                                        mov dword ptr [00018D53h], eax
                                        dec eax
                                        mov eax, dword ptr [esp+40h]
                                        dec eax
                                        mov dword ptr [00018E57h], eax
                                        mov dword ptr [00018D2Dh], C0000409h
                                        mov dword ptr [00018D27h], 00000001h
                                        mov dword ptr [00000031h], 00000000h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffc00x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe800x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x5fda80x5fe0065e11f533488d43dfe674e81ef7a76d8False0.5327218464797914data6.336096840256917IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x610000x16b920x16c00abbe659a7e32925e36856497fc0d3d38False0.3798076923076923data5.578759151509369IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x780000xdf80x400227ce6cadd4904b7716198186655da5cFalse0.2138671875data2.4411408781631465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x790000x3f840x400050e902fb009b515c9924ff6238b5e51dFalse0.48175048828125data5.776998787420237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x7e0000x4e40x60039326fb49822ad82593e9e49b5e608b8False0.5123697916666666data4.849267575521713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                        USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                        ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                        SHELL32.dllShellExecuteA
                                        MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                        urlmon.dllURLDownloadToFileA
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                        WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                        VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                        api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                        api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                        api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                        api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                        api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 21:28:26.726006031 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:26.726090908 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:26.726156950 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:26.769273043 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:26.769318104 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.554739952 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.554912090 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:27.562243938 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:27.562249899 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.562741041 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.565602064 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:28:27.611402988 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.756122112 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.756182909 CEST44349734104.26.0.5192.168.2.4
                                        Oct 20, 2024 21:28:27.756501913 CEST49734443192.168.2.4104.26.0.5
                                        Oct 20, 2024 21:29:08.974483013 CEST49734443192.168.2.4104.26.0.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 21:28:26.711210012 CEST6479453192.168.2.41.1.1.1
                                        Oct 20, 2024 21:28:26.719362020 CEST53647941.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 20, 2024 21:28:26.711210012 CEST192.168.2.41.1.1.10xce8eStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 20, 2024 21:28:26.719362020 CEST1.1.1.1192.168.2.40xce8eNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 21:28:26.719362020 CEST1.1.1.1192.168.2.40xce8eNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 21:28:26.719362020 CEST1.1.1.1192.168.2.40xce8eNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449734104.26.0.54435544C:\Users\user\Desktop\bC7vK74a5a.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-20 19:28:27 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                        Host: keyauth.win
                                        Accept: */*
                                        Content-Length: 58
                                        Content-Type: application/x-www-form-urlencoded
                                        2024-10-20 19:28:27 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 31 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                        Data Ascii: type=init&ver=8.1&name=loader principal&ownerid=9WIvTVJa9m


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:15:28:22
                                        Start date:20/10/2024
                                        Path:C:\Users\user\Desktop\bC7vK74a5a.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\bC7vK74a5a.exe"
                                        Imagebase:0x7ff613980000
                                        File size:506'368 bytes
                                        MD5 hash:728C57CF9E4022A270356C0E2341E7F4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:15:28:22
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:15:28:23
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:15:28:23
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:4
                                        Start time:15:28:23
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:15:28:23
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:6
                                        Start time:15:28:24
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:15:28:24
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:8
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:10
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:12
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7699e0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:15:28:25
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:15:28:29
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff6f98b0000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:15:28:30
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:15:28:30
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:15:28:30
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:15:28:30
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff69ba80000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:15:28:30
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7d2a60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:36
                                        Start time:15:28:31
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -pss -s 460 -p 5544 -ip 5544
                                        Imagebase:0x7ff75a5d0000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:37
                                        Start time:15:28:31
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 5544 -s 996
                                        Imagebase:0x7ff75a5d0000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:4.2%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:23.9%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:92
                                          execution_graph 47432 7ff6139aebe0 47433 7ff6139aec2e 47432->47433 47466 7ff6139aef50 47433->47466 47437 7ff6139aedb5 47510 7ff6139df580 47437->47510 47440 7ff6139aece6 47442 7ff6139aecea 47440->47442 47443 7ff6139aed0b 47440->47443 47505 7ff6139b88b0 15 API calls 47442->47505 47444 7ff6139b7900 13 API calls 47443->47444 47448 7ff6139aed1d 47444->47448 47445 7ff6139aec67 47445->47437 47481 7ff6139b7900 47445->47481 47447 7ff6139aecff 47447->47443 47449 7ff6139aedfa 47447->47449 47450 7ff6139aed21 47448->47450 47456 7ff6139aed42 47448->47456 47451 7ff6139aee04 47449->47451 47506 7ff6139b88b0 15 API calls 47450->47506 47519 7ff6139ae160 27 API calls 47451->47519 47454 7ff6139aed36 47454->47449 47454->47456 47455 7ff6139aee26 47457 7ff6139aedae 47455->47457 47520 7ff6139b8680 free free free 47455->47520 47456->47437 47461 7ff6139aed73 47456->47461 47507 7ff6139d29b0 583 API calls 47456->47507 47457->47437 47460 7ff6139aed90 47460->47437 47462 7ff6139aedb0 47460->47462 47463 7ff6139aeda9 47460->47463 47461->47449 47461->47460 47509 7ff61399ae00 51 API calls 47462->47509 47508 7ff6139d2bb0 314 API calls 47463->47508 47467 7ff6139aef90 47466->47467 47468 7ff6139aefcb 47467->47468 47469 7ff6139aefb6 tolower 47467->47469 47521 7ff6139a8e80 47468->47521 47469->47468 47469->47469 47471 7ff6139aefe2 47473 7ff6139af028 tolower 47471->47473 47477 7ff6139af04c 47471->47477 47480 7ff6139af0c1 47471->47480 47472 7ff6139af086 _time64 47476 7ff6139af0a5 47472->47476 47472->47480 47474 7ff6139a8e80 13 API calls 47473->47474 47474->47477 47475 7ff6139df580 8 API calls 47478 7ff6139aec4b 47475->47478 47479 7ff6139a5af0 15 API calls 47476->47479 47476->47480 47477->47472 47477->47480 47478->47445 47495 7ff6139a5af0 47478->47495 47479->47480 47480->47475 47482 7ff6139b790c 47481->47482 47489 7ff6139b7936 47481->47489 47483 7ff6139b7911 _errno 47482->47483 47492 7ff6139b7927 47482->47492 47483->47440 47484 7ff6139b79f7 47484->47440 47485 7ff6139b7990 strchr 47485->47489 47486 7ff6139b7aa0 strchr 47488 7ff6139b7ac0 strchr 47486->47488 47486->47492 47487 7ff6139df580 8 API calls 47490 7ff6139b7c06 47487->47490 47488->47492 47489->47484 47489->47485 47490->47440 47491 7ff6139b7bb5 47494 7ff6139b7b4d 47491->47494 47525 7ff6139b7950 strchr 47491->47525 47492->47486 47492->47491 47492->47494 47494->47487 47496 7ff6139a5af9 47495->47496 47499 7ff6139a5c4e 47495->47499 47504 7ff6139a5bc9 47496->47504 47526 7ff6139a8f80 13 API calls 47496->47526 47498 7ff6139df580 8 API calls 47498->47499 47499->47445 47500 7ff6139a5bb1 47502 7ff6139a5bfe fwrite fwrite 47500->47502 47500->47504 47501 7ff6139a5b4c 47501->47500 47503 7ff6139a8e80 13 API calls 47501->47503 47502->47504 47503->47500 47504->47498 47505->47447 47506->47454 47507->47461 47508->47457 47509->47437 47511 7ff6139df589 47510->47511 47512 7ff6139aede2 47511->47512 47513 7ff6139dfa28 IsProcessorFeaturePresent 47511->47513 47514 7ff6139dfa40 47513->47514 47527 7ff6139dfc1c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47514->47527 47516 7ff6139dfa53 47528 7ff6139df9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47516->47528 47519->47455 47520->47457 47524 7ff6139a9840 13 API calls 47521->47524 47523 7ff6139a8eb3 47523->47471 47524->47523 47525->47494 47526->47501 47527->47516 47529 7ff6139b91e0 47532 7ff6139d2480 47529->47532 47533 7ff6139d248e 47532->47533 47539 7ff6139b91e9 47532->47539 47540 7ff6139a8800 47533->47540 47537 7ff6139d24ba 47538 7ff6139d24c6 GetProcAddressForCaller 47537->47538 47537->47539 47538->47539 47541 7ff6139a882d 47540->47541 47542 7ff6139a88df VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47541->47542 47545 7ff6139a8845 47541->47545 47543 7ff6139a8934 VerifyVersionInfoA 47542->47543 47544 7ff6139a8922 VerSetConditionMask 47542->47544 47543->47545 47544->47543 47546 7ff6139df580 8 API calls 47545->47546 47547 7ff6139a896b 47546->47547 47548 7ff6139a8660 GetModuleHandleA 47547->47548 47549 7ff6139a8682 47548->47549 47550 7ff6139a868a GetProcAddress strpbrk 47548->47550 47549->47537 47551 7ff6139a86ee 47550->47551 47552 7ff6139a86b7 47550->47552 47555 7ff6139a86f3 GetProcAddress 47551->47555 47556 7ff6139a8726 GetSystemDirectoryA 47551->47556 47553 7ff6139a86bf 47552->47553 47554 7ff6139a86d8 LoadLibraryA 47552->47554 47553->47537 47554->47537 47555->47556 47559 7ff6139a8708 LoadLibraryExA 47555->47559 47557 7ff6139a8740 malloc 47556->47557 47558 7ff6139a87e8 47556->47558 47561 7ff6139a876d GetSystemDirectoryA 47557->47561 47562 7ff6139a87da free 47557->47562 47558->47537 47559->47537 47561->47562 47563 7ff6139a877d 47561->47563 47562->47558 47564 7ff6139a87d1 LoadLibraryA 47563->47564 47565 7ff6139a87c6 47563->47565 47564->47565 47565->47562 47566 7ff61399b1a0 47567 7ff6139a8e80 13 API calls 47566->47567 47568 7ff61399b1df 47567->47568 47585 7ff6139b86d0 getaddrinfo 47568->47585 47571 7ff61399b1fb WSAGetLastError 47573 7ff61399b205 WSAGetLastError 47571->47573 47574 7ff61399b21a 47571->47574 47572 7ff61399b21d EnterCriticalSection 47575 7ff61399b248 47572->47575 47576 7ff61399b22c LeaveCriticalSection 47572->47576 47573->47572 47574->47572 47578 7ff61399b252 send 47575->47578 47579 7ff61399b276 LeaveCriticalSection 47575->47579 47603 7ff61399b130 7 API calls 47576->47603 47578->47579 47582 7ff61399b26d WSAGetLastError 47578->47582 47580 7ff61399b286 47579->47580 47583 7ff6139df580 8 API calls 47580->47583 47581 7ff61399b23d free 47581->47580 47582->47579 47584 7ff61399b295 47583->47584 47586 7ff61399b1f5 47585->47586 47589 7ff6139b8703 47585->47589 47586->47571 47586->47572 47587 7ff6139b8874 WSASetLastError 47587->47586 47588 7ff6139b87ee 47590 7ff6139b8831 freeaddrinfo 47588->47590 47591 7ff6139b8837 47588->47591 47589->47587 47589->47588 47592 7ff6139b8759 malloc 47589->47592 47590->47591 47593 7ff6139b886f 47591->47593 47594 7ff6139b883c 47591->47594 47595 7ff6139b8770 malloc 47592->47595 47596 7ff6139b881c 47592->47596 47593->47586 47593->47587 47594->47586 47597 7ff6139b8841 free free free 47594->47597 47598 7ff6139b87a7 memcpy 47595->47598 47599 7ff6139b880b free 47595->47599 47596->47588 47597->47586 47597->47597 47600 7ff6139b87bf _strdup 47598->47600 47602 7ff6139b87ce 47598->47602 47599->47588 47601 7ff6139b87f0 free free 47600->47601 47600->47602 47601->47588 47602->47589 47603->47581 47604 7ff6139ba005 47605 7ff6139ba009 47604->47605 47625 7ff6139ba0d7 47605->47625 47634 7ff6139ba090 strtol 47605->47634 47635 7ff6139ba0b2 strchr 47605->47635 47656 7ff6139ba137 47605->47656 47714 7ff6139b9430 strchr 47605->47714 47606 7ff6139ba595 calloc 47608 7ff6139ba638 47606->47608 47609 7ff6139ba5bc 47606->47609 47607 7ff6139ba0f6 strchr 47610 7ff6139ba10f strncmp 47607->47610 47633 7ff6139ba25b 47607->47633 47619 7ff6139ba694 CertFreeCertificateContext 47608->47619 47620 7ff6139ba69a 47608->47620 47795 7ff6139a5970 19 API calls 47609->47795 47612 7ff6139ba150 strncmp 47610->47612 47622 7ff6139ba12c 47610->47622 47613 7ff6139ba172 strncmp 47612->47613 47612->47622 47621 7ff6139ba194 strncmp 47613->47621 47613->47622 47614 7ff6139ba5cb 47623 7ff6139ba5d9 CertFreeCertificateContext 47614->47623 47708 7ff6139ba856 47614->47708 47615 7ff6139ba229 strchr 47624 7ff6139ba243 _strdup 47615->47624 47615->47633 47616 7ff6139ba36e fopen 47617 7ff6139ba61b 47616->47617 47618 7ff6139ba387 fseek 47616->47618 47797 7ff6139a5970 19 API calls 47617->47797 47627 7ff6139ba3b1 ftell 47618->47627 47628 7ff6139ba3bd 47618->47628 47619->47620 47629 7ff6139ba69e 47620->47629 47630 7ff6139ba703 47620->47630 47621->47622 47631 7ff6139ba1b3 strncmp 47621->47631 47622->47615 47623->47708 47632 7ff6139ba263 47624->47632 47624->47633 47625->47606 47625->47607 47627->47628 47636 7ff6139ba3ce fseek 47628->47636 47637 7ff6139ba5e9 fclose 47628->47637 47798 7ff613991d10 22 API calls 47629->47798 47643 7ff6139b7900 13 API calls 47630->47643 47631->47615 47640 7ff6139ba1ca strncmp 47631->47640 47632->47633 47648 7ff6139ba284 CertOpenStore 47632->47648 47633->47616 47633->47617 47634->47605 47634->47635 47635->47605 47635->47625 47636->47637 47642 7ff6139ba3eb malloc 47636->47642 47796 7ff6139a5970 19 API calls 47637->47796 47638 7ff6139df580 8 API calls 47644 7ff6139baa0c 47638->47644 47640->47622 47646 7ff6139ba1e9 strncmp 47640->47646 47642->47637 47649 7ff6139ba404 fread 47642->47649 47650 7ff6139ba71c 47643->47650 47645 7ff6139ba6b2 47799 7ff6139a5970 19 API calls 47645->47799 47646->47622 47652 7ff6139ba208 strncmp 47646->47652 47654 7ff6139ba2d7 free CryptStringToBinaryA 47648->47654 47655 7ff6139ba2a7 GetLastError 47648->47655 47649->47637 47657 7ff6139ba422 fclose 47649->47657 47658 7ff6139ba72f 47650->47658 47666 7ff6139b7900 13 API calls 47650->47666 47652->47622 47652->47633 47653 7ff6139ba608 free 47653->47708 47662 7ff6139ba561 CertCloseStore 47654->47662 47663 7ff6139ba322 CertFindCertificateInStore 47654->47663 47791 7ff6139a5970 19 API calls 47655->47791 47790 7ff6139a5970 19 API calls 47656->47790 47664 7ff6139ba44f malloc 47657->47664 47665 7ff6139ba43f 47657->47665 47667 7ff6139a5af0 15 API calls 47658->47667 47673 7ff6139ba742 47658->47673 47659 7ff6139ba6c4 free 47659->47708 47710 7ff6139ba146 47659->47710 47662->47708 47669 7ff6139ba354 47663->47669 47670 7ff6139ba57a CertCloseStore 47663->47670 47671 7ff6139ba469 MultiByteToWideChar 47664->47671 47672 7ff6139ba493 PFXImportCertStore free free 47664->47672 47665->47664 47666->47658 47667->47673 47668 7ff6139ba2c6 free 47668->47708 47669->47662 47670->47606 47671->47672 47679 7ff6139ba4c4 GetLastError 47672->47679 47680 7ff6139ba51a CertFindCertificateInStore 47672->47680 47676 7ff6139a5af0 15 API calls 47673->47676 47681 7ff6139ba78b 47673->47681 47674 7ff6139ba7ed calloc 47677 7ff6139ba860 47674->47677 47678 7ff6139ba847 47674->47678 47676->47681 47690 7ff6139ba8c9 free 47677->47690 47691 7ff6139ba96c 47677->47691 47677->47708 47800 7ff6139a5970 19 API calls 47678->47800 47685 7ff6139ba501 47679->47685 47686 7ff6139ba4d9 47679->47686 47682 7ff6139ba542 GetLastError 47680->47682 47683 7ff6139ba576 47680->47683 47681->47674 47794 7ff6139a5970 19 API calls 47682->47794 47683->47670 47793 7ff6139a5970 19 API calls 47685->47793 47792 7ff6139a5970 19 API calls 47686->47792 47692 7ff6139ba946 47690->47692 47693 7ff6139ba8fa 47690->47693 47711 7ff6139a6230 47691->47711 47805 7ff613991d10 22 API calls 47692->47805 47696 7ff6139ba920 47693->47696 47697 7ff6139ba902 47693->47697 47803 7ff613991d10 22 API calls 47696->47803 47801 7ff613991d10 22 API calls 47697->47801 47700 7ff6139ba950 47806 7ff6139a5970 19 API calls 47700->47806 47702 7ff6139ba92a 47804 7ff6139a5970 19 API calls 47702->47804 47704 7ff6139ba909 47802 7ff6139a5970 19 API calls 47704->47802 47705 7ff6139ba9e9 47807 7ff6139a5970 19 API calls 47705->47807 47708->47638 47710->47708 47808 7ff6139a5ed0 47711->47808 47715 7ff6139b9470 47714->47715 47716 7ff6139b9479 strncpy 47715->47716 47717 7ff6139b94ca strncpy 47715->47717 47721 7ff6139b94c5 47715->47721 47722 7ff6139b94c3 47716->47722 47723 7ff6139b9a6c 47716->47723 47719 7ff6139b94da strcmp 47717->47719 47720 7ff6139b94fd strcmp 47719->47720 47781 7ff6139b94f3 47719->47781 47724 7ff6139b951b strcmp 47720->47724 47720->47781 47721->47717 47722->47719 47852 7ff6139dfafc 47723->47852 47727 7ff6139b9539 strcmp 47724->47727 47724->47781 47729 7ff6139b9551 strcmp 47727->47729 47727->47781 47728 7ff6139df580 8 API calls 47730 7ff6139b9a5c 47728->47730 47731 7ff6139b9569 strcmp 47729->47731 47729->47781 47730->47605 47733 7ff6139b9587 strcmp 47731->47733 47731->47781 47737 7ff6139b95a5 strcmp 47733->47737 47733->47781 47740 7ff6139b95c3 strcmp 47737->47740 47737->47781 47743 7ff6139b95e1 strcmp 47740->47743 47740->47781 47745 7ff6139b95ff strcmp 47743->47745 47743->47781 47747 7ff6139b961d strcmp 47745->47747 47745->47781 47750 7ff6139b963b strcmp 47747->47750 47747->47781 47752 7ff6139b9659 strcmp 47750->47752 47750->47781 47755 7ff6139b9677 strcmp 47752->47755 47752->47781 47757 7ff6139b9695 strcmp 47755->47757 47755->47781 47758 7ff6139b96b3 strcmp 47757->47758 47757->47781 47759 7ff6139b96d1 strcmp 47758->47759 47758->47781 47760 7ff6139b96ef strcmp 47759->47760 47759->47781 47761 7ff6139b970d strcmp 47760->47761 47760->47781 47762 7ff6139b972b strcmp 47761->47762 47761->47781 47763 7ff6139b9749 strcmp 47762->47763 47762->47781 47764 7ff6139b9767 strcmp 47763->47764 47763->47781 47765 7ff6139b9785 strcmp 47764->47765 47764->47781 47766 7ff6139b97a3 strcmp 47765->47766 47765->47781 47767 7ff6139b97c1 strcmp 47766->47767 47766->47781 47768 7ff6139b97df strcmp 47767->47768 47767->47781 47769 7ff6139b97fd strcmp 47768->47769 47768->47781 47770 7ff6139b981b strcmp 47769->47770 47769->47781 47771 7ff6139b9839 strcmp 47770->47771 47770->47781 47772 7ff6139b9857 strcmp 47771->47772 47771->47781 47773 7ff6139b9875 strcmp 47772->47773 47772->47781 47774 7ff6139b9893 strcmp 47773->47774 47773->47781 47775 7ff6139b98b1 strcmp 47774->47775 47774->47781 47776 7ff6139b98cf strcmp 47775->47776 47775->47781 47777 7ff6139b98ed strcmp 47776->47777 47776->47781 47778 7ff6139b990b strcmp 47777->47778 47777->47781 47779 7ff6139b9929 strcmp 47778->47779 47778->47781 47780 7ff6139b9947 strcmp 47779->47780 47779->47781 47780->47781 47782 7ff6139b9965 strcmp 47780->47782 47781->47728 47782->47781 47783 7ff6139b9983 strcmp 47782->47783 47783->47781 47784 7ff6139b99a1 strcmp 47783->47784 47784->47781 47785 7ff6139b99bf strcmp 47784->47785 47785->47781 47786 7ff6139b99da strcmp 47785->47786 47786->47781 47787 7ff6139b99f5 strcmp 47786->47787 47787->47781 47788 7ff6139b9a10 strcmp 47787->47788 47788->47781 47789 7ff6139b9a2b strcmp 47788->47789 47789->47781 47790->47710 47791->47668 47792->47710 47793->47710 47794->47662 47795->47614 47796->47653 47797->47710 47798->47645 47799->47659 47800->47708 47801->47704 47802->47710 47803->47702 47804->47710 47805->47700 47806->47710 47807->47708 47809 7ff6139a5fd7 send 47808->47809 47810 7ff6139a5f3f 47808->47810 47811 7ff6139a5ff5 WSAGetLastError 47809->47811 47812 7ff6139a6004 47809->47812 47810->47809 47826 7ff6139b5fe0 47810->47826 47811->47812 47813 7ff6139a6010 47811->47813 47816 7ff6139df580 8 API calls 47812->47816 47850 7ff613992500 27 API calls 47813->47850 47819 7ff6139a6057 47816->47819 47817 7ff6139a6022 47851 7ff6139a5970 19 API calls 47817->47851 47819->47705 47819->47708 47821 7ff6139a6034 47821->47812 47822 7ff6139a5f7c 47823 7ff6139a5fb0 recv 47822->47823 47824 7ff6139a5f84 malloc 47822->47824 47823->47809 47825 7ff6139a5fcd 47823->47825 47824->47823 47824->47825 47825->47809 47827 7ff6139b6027 47826->47827 47831 7ff6139b605b 47826->47831 47828 7ff6139b6031 47827->47828 47827->47831 47829 7ff6139b6038 WSASetLastError 47828->47829 47830 7ff6139b604b Sleep 47828->47830 47849 7ff6139b6054 47828->47849 47829->47849 47830->47849 47834 7ff6139b61a5 47831->47834 47835 7ff6139b61d3 select 47831->47835 47833 7ff6139df580 8 API calls 47836 7ff6139a5f73 47833->47836 47837 7ff6139b61aa 47834->47837 47838 7ff6139b61b3 WSASetLastError 47834->47838 47839 7ff6139b61c6 Sleep 47834->47839 47835->47837 47836->47809 47836->47822 47840 7ff6139b629c 47837->47840 47841 7ff6139b6272 __WSAFDIsSet __WSAFDIsSet 47837->47841 47837->47849 47838->47837 47839->47837 47842 7ff6139b62cb 47840->47842 47843 7ff6139b62a4 __WSAFDIsSet 47840->47843 47841->47840 47846 7ff6139b62d3 __WSAFDIsSet 47842->47846 47842->47849 47844 7ff6139b62b7 47843->47844 47845 7ff6139b62ba __WSAFDIsSet 47843->47845 47844->47845 47845->47842 47847 7ff6139b62e9 __WSAFDIsSet 47846->47847 47848 7ff6139b62e6 47846->47848 47847->47849 47848->47847 47849->47833 47850->47817 47851->47821 47985 7ff6139dfb10 IsProcessorFeaturePresent 47852->47985 47986 7ff6139dfb27 47985->47986 47991 7ff6139dfbac RtlCaptureContext RtlLookupFunctionEntry 47986->47991 47992 7ff6139dfb3b 47991->47992 47993 7ff6139dfbdc RtlVirtualUnwind 47991->47993 47994 7ff6139df9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47992->47994 47993->47992 48026 7ff613997df8 48027 7ff613997e11 48026->48027 48028 7ff613997e9f 48027->48028 48031 7ff613998074 48027->48031 48067 7ff6139ac510 48028->48067 48145 7ff6139957f0 17 API calls 48031->48145 48034 7ff613997f60 48035 7ff613998011 48034->48035 48040 7ff613997f68 48034->48040 48064 7ff61399727b 48035->48064 48144 7ff6139957f0 17 API calls 48035->48144 48036 7ff613997ec4 48036->48034 48038 7ff613997ece 48036->48038 48041 7ff613997ef5 48036->48041 48037 7ff6139984a0 17 API calls 48037->48064 48043 7ff613996d00 292 API calls 48038->48043 48040->48041 48044 7ff613997f7e 48040->48044 48045 7ff613997feb free 48040->48045 48046 7ff613996d00 292 API calls 48041->48046 48043->48064 48049 7ff613997f8b free 48044->48049 48044->48064 48045->48041 48050 7ff613997f13 48046->48050 48047 7ff613998322 48048 7ff613998313 48149 7ff6139a5970 19 API calls 48048->48149 48143 7ff6139abdd0 28 API calls 48049->48143 48142 7ff6139abdd0 28 API calls 48050->48142 48054 7ff613997fb3 free 48055 7ff613997fc9 48054->48055 48054->48064 48059 7ff613996d00 292 API calls 48055->48059 48058 7ff613997f44 free 48058->48064 48059->48064 48060 7ff6139a71f0 10 API calls 48060->48064 48061 7ff613997f22 48061->48058 48062 7ff6139a5970 19 API calls 48063 7ff61399731e 48062->48063 48063->48062 48063->48064 48064->48037 48064->48047 48064->48048 48064->48060 48064->48063 48106 7ff6139a5970 19 API calls 48064->48106 48107 7ff613996d00 48064->48107 48146 7ff6139a1430 90 API calls 48064->48146 48147 7ff613995a20 15 API calls 48064->48147 48148 7ff6139b51e0 22 API calls 48064->48148 48068 7ff6139ac561 48067->48068 48069 7ff6139ac5af 48068->48069 48070 7ff6139b5fe0 19 API calls 48068->48070 48071 7ff6139ac5b6 48069->48071 48072 7ff6139ac5cd 48069->48072 48070->48069 48183 7ff6139a5970 19 API calls 48071->48183 48073 7ff6139ac5f9 48072->48073 48150 7ff6139acc20 48072->48150 48075 7ff6139ac62e 48073->48075 48076 7ff6139ac616 48073->48076 48077 7ff613997eb3 48073->48077 48080 7ff6139ad7b0 2 API calls 48075->48080 48184 7ff6139ad370 90 API calls 48076->48184 48077->48036 48141 7ff6139ac810 24 API calls 48077->48141 48086 7ff6139ac638 48080->48086 48081 7ff6139ac626 48081->48075 48081->48077 48082 7ff6139ac6a8 48185 7ff6139b51e0 22 API calls 48082->48185 48084 7ff6139ac6b0 48084->48077 48186 7ff6139b6350 23 API calls 48084->48186 48086->48082 48088 7ff6139a5af0 15 API calls 48086->48088 48087 7ff6139ac6ce 48087->48077 48089 7ff6139ac6e2 48087->48089 48095 7ff6139ac762 48087->48095 48088->48082 48091 7ff6139a71f0 10 API calls 48089->48091 48090 7ff6139ac7c9 48191 7ff6139b51e0 22 API calls 48090->48191 48094 7ff6139ac6f1 48091->48094 48093 7ff6139ac7a0 48093->48090 48097 7ff6139ac7b3 48093->48097 48094->48077 48096 7ff6139ac6fa 48094->48096 48095->48090 48095->48093 48098 7ff6139ac787 48095->48098 48101 7ff6139ac731 48096->48101 48102 7ff6139ac74c 48096->48102 48190 7ff6139a5970 19 API calls 48097->48190 48189 7ff6139a5970 19 API calls 48098->48189 48187 7ff6139a5970 19 API calls 48101->48187 48188 7ff6139a5970 19 API calls 48102->48188 48103 7ff6139ac5c5 48103->48077 48106->48064 48108 7ff613996d3c 48107->48108 48117 7ff613996e12 48107->48117 48276 7ff61399af50 48108->48276 48110 7ff613996d47 free free 48114 7ff613996d77 48110->48114 48111 7ff6139df580 8 API calls 48112 7ff613996e47 48111->48112 48112->48064 48113 7ff613996db5 48294 7ff6139984a0 48113->48294 48114->48113 48304 7ff6139b4cc0 22 API calls 48114->48304 48117->48111 48118 7ff613996e7c 48298 7ff6139ae520 48118->48298 48119 7ff613996dcf 48119->48117 48119->48118 48305 7ff6139aeee0 free free free free 48119->48305 48123 7ff613996eab 48124 7ff613996eb0 free 48123->48124 48124->48124 48126 7ff613996ece 48124->48126 48125 7ff613996ffb 48309 7ff6139a1430 90 API calls 48125->48309 48126->48125 48127 7ff613996f37 48126->48127 48128 7ff6139a8e80 13 API calls 48127->48128 48130 7ff613996f96 48128->48130 48306 7ff61399e740 92 API calls 48130->48306 48131 7ff61399702d 48310 7ff6139a15b0 292 API calls 48131->48310 48134 7ff613996fb7 48135 7ff613996fe5 48134->48135 48136 7ff613996fbb 48134->48136 48308 7ff6139a15b0 292 API calls 48135->48308 48137 7ff6139a5af0 15 API calls 48136->48137 48139 7ff613996fd6 48137->48139 48307 7ff6139a15b0 292 API calls 48139->48307 48141->48036 48142->48061 48143->48054 48144->48064 48145->48064 48146->48064 48147->48064 48148->48064 48149->48047 48167 7ff6139acc70 48150->48167 48153 7ff6139ad1aa 48156 7ff6139a5af0 15 API calls 48153->48156 48177 7ff6139ad1c3 48153->48177 48154 7ff6139ad7b0 2 API calls 48154->48167 48156->48177 48157 7ff6139ad187 48157->48153 48159 7ff6139a5af0 15 API calls 48157->48159 48158 7ff6139acf00 48158->48167 48199 7ff6139a58b0 fwrite fwrite 48158->48199 48200 7ff6139a58b0 fwrite fwrite 48158->48200 48159->48153 48163 7ff6139a5af0 15 API calls 48163->48167 48164 7ff6139ad241 48165 7ff6139ad246 48164->48165 48166 7ff6139ad25d 48164->48166 48204 7ff6139a5970 19 API calls 48165->48204 48205 7ff6139a5970 19 API calls 48166->48205 48167->48153 48167->48154 48167->48157 48167->48158 48167->48163 48167->48164 48168 7ff6139ad1af 48167->48168 48176 7ff6139acedc 48167->48176 48167->48177 48180 7ff6139a5890 23 API calls 48167->48180 48192 7ff6139a5c60 48167->48192 48195 7ff6139b5090 48167->48195 48198 7ff6139b2890 192 API calls 48167->48198 48201 7ff6139d2590 23 API calls 48167->48201 48202 7ff6139bf0b0 23 API calls 48167->48202 48170 7ff6139ad1e3 48168->48170 48171 7ff6139ad1b7 48168->48171 48203 7ff6139a5970 19 API calls 48170->48203 48175 7ff6139a5af0 15 API calls 48171->48175 48172 7ff6139ad1ef 48172->48177 48175->48177 48178 7ff6139a5af0 15 API calls 48176->48178 48177->48073 48179 7ff6139ad208 48178->48179 48182 7ff6139a5af0 15 API calls 48179->48182 48180->48167 48182->48177 48183->48103 48184->48081 48185->48084 48186->48087 48187->48103 48188->48103 48189->48103 48190->48103 48191->48077 48206 7ff6139bb5c0 48192->48206 48196 7ff6139ad7b0 2 API calls 48195->48196 48197 7ff6139b50aa 48196->48197 48197->48167 48198->48167 48199->48158 48200->48167 48201->48167 48202->48167 48203->48172 48204->48172 48205->48172 48207 7ff6139bb63f 48206->48207 48208 7ff6139bb65e 48206->48208 48207->48208 48209 7ff6139bb645 48207->48209 48210 7ff6139bb665 48208->48210 48211 7ff6139bb682 48208->48211 48213 7ff6139a5af0 15 API calls 48209->48213 48214 7ff6139a5af0 15 API calls 48210->48214 48212 7ff6139bb688 48211->48212 48217 7ff6139bb6a1 48211->48217 48215 7ff6139a5af0 15 API calls 48212->48215 48219 7ff6139bb654 48213->48219 48214->48219 48215->48219 48216 7ff6139bb6d0 realloc 48220 7ff6139bb71e 48216->48220 48221 7ff6139bb6fd 48216->48221 48217->48216 48217->48220 48240 7ff6139bb799 48217->48240 48218 7ff6139bbaf6 48222 7ff6139bbbf5 memcpy memcpy 48218->48222 48227 7ff6139bbc3b 48218->48227 48219->48218 48226 7ff6139a8800 14 API calls 48219->48226 48224 7ff6139a5cf0 2 API calls 48220->48224 48252 7ff6139a5970 19 API calls 48221->48252 48222->48227 48225 7ff6139bb767 48224->48225 48233 7ff6139bb95e 48225->48233 48234 7ff6139bb78d 48225->48234 48225->48240 48229 7ff6139bbae6 48226->48229 48230 7ff6139df580 8 API calls 48227->48230 48228 7ff6139bb714 48228->48219 48229->48218 48235 7ff6139a5af0 15 API calls 48229->48235 48232 7ff6139a5cbb 48230->48232 48231 7ff6139a5af0 15 API calls 48231->48240 48232->48167 48237 7ff6139a5af0 15 API calls 48233->48237 48236 7ff6139a5af0 15 API calls 48234->48236 48235->48218 48236->48240 48237->48240 48238 7ff6139a5af0 15 API calls 48238->48219 48240->48219 48240->48231 48241 7ff6139bbb07 48240->48241 48242 7ff6139bb8a0 realloc 48240->48242 48244 7ff6139bba7e 48240->48244 48247 7ff6139bb8eb memcpy 48240->48247 48249 7ff6139bb93b memcpy 48240->48249 48253 7ff6139b9a80 48240->48253 48241->48244 48245 7ff6139bbb36 48241->48245 48242->48240 48243 7ff6139bbb66 48242->48243 48272 7ff6139a5970 19 API calls 48243->48272 48244->48219 48244->48238 48271 7ff613991d10 22 API calls 48245->48271 48247->48240 48249->48240 48250 7ff6139bbb4f 48251 7ff6139a5af0 15 API calls 48250->48251 48251->48219 48252->48228 48254 7ff6139b9ad4 48253->48254 48258 7ff6139b9ac9 48253->48258 48256 7ff6139a71f0 10 API calls 48254->48256 48266 7ff6139b9afb 48254->48266 48255 7ff6139b9bf2 48255->48258 48275 7ff6139bb1e0 67 API calls 48255->48275 48259 7ff6139b9ae7 48256->48259 48257 7ff6139a71f0 10 API calls 48257->48266 48258->48240 48261 7ff6139b9bdc 48259->48261 48263 7ff6139b9c70 74 API calls 48259->48263 48274 7ff6139a5970 19 API calls 48261->48274 48263->48266 48264 7ff6139b5fe0 19 API calls 48264->48266 48265 7ff6139baa50 303 API calls 48265->48266 48266->48255 48266->48257 48266->48258 48266->48261 48266->48264 48266->48265 48267 7ff6139b9bbd WSAGetLastError 48266->48267 48269 7ff6139b9bac 48266->48269 48273 7ff6139a5970 19 API calls 48267->48273 48269->48258 48269->48261 48270 7ff6139b9bd5 48270->48258 48271->48250 48272->48228 48273->48270 48274->48270 48275->48258 48277 7ff61399af65 48276->48277 48278 7ff61399af77 48276->48278 48277->48278 48279 7ff61399af6b 48277->48279 48281 7ff61399b114 free 48278->48281 48282 7ff61399b088 EnterCriticalSection LeaveCriticalSection 48278->48282 48311 7ff6139b8da0 WaitForSingleObjectEx CloseHandle 48279->48311 48281->48110 48284 7ff61399b0c1 CloseHandle 48282->48284 48285 7ff61399b0cb 48282->48285 48283 7ff61399af70 48283->48278 48286 7ff61399b0ec 48284->48286 48287 7ff61399b0d1 48285->48287 48288 7ff61399b0d9 48285->48288 48289 7ff61399b101 closesocket 48286->48289 48314 7ff613995b00 free 48286->48314 48312 7ff6139b8da0 WaitForSingleObjectEx CloseHandle 48287->48312 48313 7ff61399b130 7 API calls 48288->48313 48289->48281 48293 7ff61399b0e2 free 48293->48286 48295 7ff6139984f0 48294->48295 48296 7ff6139984b7 48294->48296 48295->48119 48315 7ff6139957f0 17 API calls 48296->48315 48299 7ff6139ae59a 48298->48299 48303 7ff6139ae541 48298->48303 48300 7ff6139df580 8 API calls 48299->48300 48302 7ff613996e8b free 48300->48302 48301 7ff6139ae563 _time64 48301->48299 48302->48123 48302->48126 48303->48299 48303->48301 48304->48113 48305->48118 48306->48134 48309->48131 48311->48283 48312->48288 48313->48293 48314->48289 48315->48295 48316 7ff6139df85c 48317 7ff6139df875 48316->48317 48318 7ff6139df9b3 48317->48318 48319 7ff6139df87d 48317->48319 48402 7ff6139dfd4c 9 API calls 48318->48402 48321 7ff6139df9bd 48319->48321 48326 7ff6139df89b __scrt_release_startup_lock 48319->48326 48403 7ff6139dfd4c 9 API calls 48321->48403 48323 7ff6139df9c8 48325 7ff6139df9d0 _exit 48323->48325 48324 7ff6139df8c0 48326->48324 48327 7ff6139df946 _get_initial_narrow_environment __p___argv __p___argc 48326->48327 48330 7ff6139df93e _register_thread_local_exe_atexit_callback 48326->48330 48336 7ff613991530 rand 48327->48336 48330->48327 48337 7ff613991583 48336->48337 48337->48337 48404 7ff613990580 48337->48404 48339 7ff613991595 rand 48340 7ff6139915c0 48339->48340 48341 7ff613991633 SetConsoleTitleA 48339->48341 48344 7ff6139915c2 rand 48340->48344 48350 7ff61399162f 48340->48350 48508 7ff613990680 7 API calls Concurrency::cancel_current_task 48340->48508 48342 7ff613991651 48341->48342 48343 7ff613991685 8 API calls 48341->48343 48345 7ff613991680 48342->48345 48348 7ff613991679 _invalid_parameter_noinfo_noreturn 48342->48348 48423 7ff613982aa0 48343->48423 48344->48340 48345->48343 48348->48345 48350->48341 48402->48321 48403->48323 48405 7ff613990671 48404->48405 48406 7ff6139905a6 48404->48406 48531 7ff613981a90 ?_Xlength_error@std@@YAXPEBD 48405->48531 48407 7ff6139905b4 memcpy 48406->48407 48408 7ff6139905cc 48406->48408 48407->48339 48410 7ff613990676 48408->48410 48411 7ff613990634 48408->48411 48414 7ff6139905dd 48408->48414 48532 7ff6139819f0 __std_exception_copy Concurrency::cancel_current_task 48410->48532 48415 7ff613990643 48411->48415 48416 7ff613990639 48411->48416 48529 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48414->48529 48420 7ff613990645 memcpy 48415->48420 48530 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48416->48530 48417 7ff6139905f3 48421 7ff6139905f8 48417->48421 48422 7ff61399062d _invalid_parameter_noinfo_noreturn 48417->48422 48418 7ff61399067c 48420->48339 48421->48420 48422->48411 48533 7ff613982840 48423->48533 48425 7ff613982aea 48426 7ff6139830a8 48425->48426 48546 7ff613983160 48425->48546 48613 7ff613983120 7 API calls 48426->48613 48428 7ff613983104 Sleep exit 48430 7ff613983118 48428->48430 48614 7ff6139819f0 __std_exception_copy Concurrency::cancel_current_task 48430->48614 48431 7ff613982b6f 48558 7ff613983c30 48431->48558 48434 7ff61398311d 48435 7ff613982b7c 48565 7ff6139832d0 48435->48565 48437 7ff613982bac 48438 7ff613983c30 10 API calls 48437->48438 48439 7ff613982bb8 48438->48439 48573 7ff6139833d0 48439->48573 48441 7ff613982beb 48442 7ff613983c30 10 API calls 48441->48442 48443 7ff613982bf8 48442->48443 48444 7ff613982c4f 48443->48444 48447 7ff613982c48 _invalid_parameter_noinfo_noreturn 48443->48447 48445 7ff613982c9f 48444->48445 48449 7ff613982c98 _invalid_parameter_noinfo_noreturn 48444->48449 48446 7ff613982cde 48445->48446 48450 7ff613982cd7 _invalid_parameter_noinfo_noreturn 48445->48450 48448 7ff613982d2c 48446->48448 48453 7ff613982d25 _invalid_parameter_noinfo_noreturn 48446->48453 48447->48444 48451 7ff613982d6b 48448->48451 48454 7ff613982d64 _invalid_parameter_noinfo_noreturn 48448->48454 48449->48445 48450->48446 48451->48430 48452 7ff613982db9 48451->48452 48455 7ff613982e1f 48451->48455 48457 7ff613982dfa 48451->48457 48581 7ff613983550 48452->48581 48453->48448 48454->48451 48458 7ff613982e2b 48455->48458 48459 7ff613982e24 48455->48459 48597 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48457->48597 48460 7ff613982e2e memcpy 48458->48460 48598 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48459->48598 48460->48452 48464 7ff613982840 6 API calls 48467 7ff613982e60 48464->48467 48465 7ff613982e02 48466 7ff613982e0a 48465->48466 48468 7ff613982e18 _invalid_parameter_noinfo_noreturn 48465->48468 48466->48460 48599 7ff613984bd0 118 API calls 48467->48599 48468->48455 48470 7ff613982e75 48600 7ff6139848c0 19 API calls 48470->48600 48472 7ff613982e86 48473 7ff613982fa3 48472->48473 48508->48340 48529->48417 48530->48421 48532->48418 48534 7ff613982890 48533->48534 48534->48534 48535 7ff6139828a0 system 48534->48535 48536 7ff613982900 48535->48536 48536->48536 48537 7ff613982910 system 48536->48537 48538 7ff613982960 48537->48538 48538->48538 48539 7ff613982970 system 48538->48539 48540 7ff6139829b0 48539->48540 48540->48540 48541 7ff6139829c0 system 48540->48541 48542 7ff613982a00 48541->48542 48542->48542 48543 7ff613982a10 system 48542->48543 48544 7ff613982a70 48543->48544 48544->48544 48545 7ff613982a80 system 48544->48545 48545->48425 48547 7ff61398317e 48546->48547 48548 7ff6139831c8 48547->48548 48642 7ff613984310 7 API calls Concurrency::cancel_current_task 48547->48642 48550 7ff613983227 48548->48550 48643 7ff613984310 7 API calls Concurrency::cancel_current_task 48548->48643 48615 7ff613985dd0 48550->48615 48554 7ff613983276 48555 7ff6139832b7 48554->48555 48557 7ff6139832b0 _invalid_parameter_noinfo_noreturn 48554->48557 48555->48431 48556 7ff61398326f _invalid_parameter_noinfo_noreturn 48556->48554 48557->48555 48559 7ff613983c4d 48558->48559 48560 7ff613983ca8 48559->48560 48561 7ff613983c63 memcpy 48559->48561 48648 7ff613984eb0 9 API calls Concurrency::cancel_current_task 48560->48648 48561->48435 48564 7ff613983cbb 48564->48435 48567 7ff6139832ee 48565->48567 48568 7ff613983338 48567->48568 48655 7ff613984310 7 API calls Concurrency::cancel_current_task 48567->48655 48649 7ff613986dd0 48568->48649 48570 7ff613983354 48571 7ff6139833b7 48570->48571 48572 7ff6139833b0 _invalid_parameter_noinfo_noreturn 48570->48572 48571->48437 48572->48571 48574 7ff6139833ee 48573->48574 48575 7ff613983438 48574->48575 48657 7ff613984310 7 API calls Concurrency::cancel_current_task 48574->48657 48577 7ff613986dd0 12 API calls 48575->48577 48578 7ff613983454 48577->48578 48579 7ff6139834b7 48578->48579 48580 7ff6139834b0 _invalid_parameter_noinfo_noreturn 48578->48580 48579->48441 48580->48579 48582 7ff613982840 6 API calls 48581->48582 48583 7ff61398358c 48582->48583 48658 7ff613991ad0 48583->48658 48585 7ff613983591 48586 7ff61398359d 48585->48586 48592 7ff613983632 48585->48592 48687 7ff613984310 7 API calls Concurrency::cancel_current_task 48586->48687 48588 7ff6139835c1 48590 7ff61398378a _invalid_parameter_noinfo_noreturn 48588->48590 48596 7ff6139835f4 48588->48596 48589 7ff6139df580 8 API calls 48591 7ff613982e5a 48589->48591 48591->48464 48666 7ff613991b90 48592->48666 48594 7ff61398370e 48594->48588 48595 7ff613983719 MessageBoxA 48594->48595 48595->48588 48596->48589 48597->48465 48598->48466 48599->48470 48600->48472 48613->48428 48614->48434 48616 7ff613985e1a 48615->48616 48617 7ff613985e6f 48615->48617 48616->48617 48628 7ff613985e1f memcpy 48616->48628 48618 7ff613985e77 memcpy 48617->48618 48624 7ff613985ecb 48617->48624 48620 7ff613985eb4 memcpy 48618->48620 48621 7ff613985eb1 48618->48621 48619 7ff613985fb1 48647 7ff613981a90 ?_Xlength_error@std@@YAXPEBD 48619->48647 48622 7ff61398323a 48620->48622 48621->48620 48622->48554 48622->48556 48624->48619 48625 7ff613985f49 48624->48625 48629 7ff613985fac 48624->48629 48630 7ff613985f27 48624->48630 48631 7ff613985f56 memcpy 48625->48631 48632 7ff613985f4e 48625->48632 48628->48622 48646 7ff6139819f0 __std_exception_copy Concurrency::cancel_current_task 48629->48646 48644 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48630->48644 48637 7ff613985f83 memcpy 48631->48637 48638 7ff613985f80 48631->48638 48645 7ff6139df1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 48632->48645 48637->48622 48638->48637 48639 7ff613985f2f 48640 7ff613985f34 48639->48640 48641 7ff613985f42 _invalid_parameter_noinfo_noreturn 48639->48641 48640->48631 48641->48625 48642->48548 48643->48550 48644->48639 48645->48640 48646->48619 48648->48564 48650 7ff613986e95 48649->48650 48654 7ff613986e00 memcpy memcpy memcpy 48649->48654 48656 7ff61398c600 9 API calls Concurrency::cancel_current_task 48650->48656 48652 7ff613986eaa 48652->48570 48654->48570 48655->48568 48656->48652 48657->48575 48659 7ff613991add calloc 48658->48659 48665 7ff613991b40 48658->48665 48661 7ff613991b32 48659->48661 48663 7ff613991b6c 48661->48663 48688 7ff6139a8980 48661->48688 48662 7ff613991b61 48662->48585 48663->48585 48665->48663 48719 7ff6139a18b0 calloc 48665->48719 48667 7ff613991b9f 48666->48667 48668 7ff613991ba9 48666->48668 48667->48594 48669 7ff613991bc2 48668->48669 48670 7ff613991bda 48668->48670 48792 7ff6139a5970 19 API calls 48669->48792 48674 7ff613991bf6 48670->48674 48744 7ff613995bc0 calloc 48670->48744 48672 7ff613991bce 48672->48594 48675 7ff613991bfe 48674->48675 48772 7ff613996470 48674->48772 48675->48594 48677 7ff613991c52 48678 7ff613991c58 48677->48678 48684 7ff613991c83 48677->48684 48793 7ff613996620 292 API calls 48678->48793 48680 7ff613991c60 48680->48594 48681 7ff613991cd8 48794 7ff613996930 292 API calls 48681->48794 48684->48681 48779 7ff613996900 48684->48779 48782 7ff6139967f0 48684->48782 48685 7ff613991cf8 48685->48594 48687->48588 48689 7ff6139a899e WSAStartup 48688->48689 48690 7ff6139a89e6 48688->48690 48692 7ff6139a89b2 48689->48692 48693 7ff6139a89c9 48689->48693 48691 7ff6139d2480 26 API calls 48690->48691 48696 7ff6139a89eb 48691->48696 48692->48690 48694 7ff6139a89c3 WSACleanup 48692->48694 48695 7ff6139df580 8 API calls 48693->48695 48694->48693 48697 7ff6139a89de 48695->48697 48698 7ff6139a8caf 48696->48698 48699 7ff6139a89f3 GetModuleHandleA 48696->48699 48697->48665 48700 7ff6139df580 8 API calls 48698->48700 48701 7ff6139a8a2e GetProcAddress strpbrk 48699->48701 48702 7ff6139a8a22 48699->48702 48703 7ff6139a8cbf 48700->48703 48705 7ff6139a8a65 48701->48705 48706 7ff6139a8a8b 48701->48706 48704 7ff6139a8bb3 7 API calls 48702->48704 48703->48665 48704->48698 48709 7ff6139a8a7d LoadLibraryA 48705->48709 48711 7ff6139a8a6d 48705->48711 48707 7ff6139a8a90 GetProcAddress 48706->48707 48708 7ff6139a8aba GetSystemDirectoryA 48706->48708 48707->48708 48710 7ff6139a8aa5 LoadLibraryExA 48707->48710 48708->48711 48712 7ff6139a8ad7 malloc 48708->48712 48709->48711 48710->48711 48711->48704 48713 7ff6139a8b8e GetProcAddress 48711->48713 48714 7ff6139a8b69 free 48712->48714 48715 7ff6139a8aec GetSystemDirectoryA 48712->48715 48713->48704 48714->48711 48715->48714 48716 7ff6139a8afc 48715->48716 48717 7ff6139a8b60 LoadLibraryA 48716->48717 48718 7ff6139a8b56 48716->48718 48717->48718 48718->48714 48720 7ff6139a18e5 48719->48720 48721 7ff6139a18d6 48719->48721 48739 7ff61399add0 calloc 48720->48739 48721->48662 48723 7ff6139a1908 48724 7ff6139a190e free 48723->48724 48725 7ff6139a191c malloc 48723->48725 48726 7ff6139a1c44 48724->48726 48727 7ff6139a1937 malloc 48725->48727 48728 7ff6139a1c08 48725->48728 48726->48662 48727->48728 48729 7ff6139a1952 __acrt_iob_func __acrt_iob_func __acrt_iob_func 48727->48729 48730 7ff6139a1c14 free free 48728->48730 48740 7ff61399bd80 memset 48729->48740 48743 7ff6139a1610 free free free 48730->48743 48733 7ff6139a1a72 48741 7ff61399f850 free realloc GetEnvironmentVariableA realloc free 48733->48741 48736 7ff6139a1b36 48742 7ff6139a56f0 free free free free free 48736->48742 48738 7ff6139a1bea 48738->48726 48739->48723 48740->48733 48741->48736 48742->48738 48745 7ff613995bfb 48744->48745 48746 7ff613995beb 48744->48746 48795 7ff6139aeaf0 48745->48795 48746->48674 48749 7ff613995d17 48840 7ff6139addd0 free 48749->48840 48752 7ff613995d23 48841 7ff6139addd0 free 48752->48841 48753 7ff613995c42 48753->48749 48803 7ff61399e580 48753->48803 48773 7ff6139964b8 48772->48773 48774 7ff613996489 48772->48774 48773->48677 48774->48773 48890 7ff6139957f0 17 API calls 48774->48890 48776 7ff61399658d 48891 7ff6139962c0 10 API calls 48776->48891 48778 7ff6139965eb 48778->48677 48892 7ff613995dc0 48779->48892 48783 7ff6139ad7b0 2 API calls 48782->48783 48785 7ff613996817 48783->48785 48784 7ff613996873 48785->48784 48790 7ff613996838 48785->48790 48942 7ff613997220 48785->48942 48790->48684 48792->48672 48793->48680 48794->48685 48796 7ff6139ade40 malloc 48795->48796 48797 7ff613995c12 48796->48797 48797->48749 48798 7ff6139ade40 48797->48798 48799 7ff6139adef6 48798->48799 48800 7ff6139ade57 48798->48800 48799->48753 48800->48799 48801 7ff6139ade77 malloc 48800->48801 48802 7ff6139adea6 48801->48802 48802->48753 48840->48752 48890->48776 48891->48778 48899 7ff613995e21 48892->48899 48905 7ff613996239 48892->48905 48893 7ff613995e36 48899->48893 48899->48905 48916 7ff6139983c0 48899->48916 48964 7ff61399777b 48965 7ff61399778e 48964->48965 48966 7ff613997847 48965->48966 48969 7ff613997796 48965->48969 48987 7ff6139ab6d0 48965->48987 48968 7ff6139977d3 48966->48968 48966->48969 48971 7ff613996d00 292 API calls 48968->48971 48984 7ff61399727b 48969->48984 49026 7ff6139ab580 free 48969->49026 48971->48984 48972 7ff6139977cd 48972->48966 48972->48968 48972->48969 49007 7ff6139b12d0 48972->49007 48973 7ff6139984a0 17 API calls 48973->48984 48975 7ff613998322 48976 7ff613998313 49030 7ff6139a5970 19 API calls 48976->49030 48980 7ff6139a71f0 10 API calls 48980->48984 48981 7ff6139a5970 19 API calls 48982 7ff61399731e 48981->48982 48982->48981 48982->48984 48984->48973 48984->48975 48984->48976 48984->48980 48984->48982 48985 7ff613996d00 292 API calls 48984->48985 49025 7ff6139a5970 19 API calls 48984->49025 49027 7ff6139a1430 90 API calls 48984->49027 49028 7ff613995a20 15 API calls 48984->49028 49029 7ff6139b51e0 22 API calls 48984->49029 48985->48984 48988 7ff6139ab704 48987->48988 48989 7ff6139ab71f 48987->48989 48988->48989 49031 7ff61399fb70 48988->49031 48991 7ff6139ab761 memset 48989->48991 48993 7ff6139ab725 48989->48993 48995 7ff6139ab793 48991->48995 48992 7ff6139df580 8 API calls 48994 7ff6139ab8c5 48992->48994 48993->48992 48994->48972 48996 7ff6139ab7ee calloc 48995->48996 48997 7ff6139ab866 48995->48997 48998 7ff6139ab806 48996->48998 48999 7ff6139ab81c 48996->48999 49045 7ff6139aaa80 453 API calls 48997->49045 48998->48993 49001 7ff6139a5af0 15 API calls 48999->49001 49003 7ff6139ab82b 49001->49003 49002 7ff6139ab876 49004 7ff6139a5af0 15 API calls 49002->49004 49005 7ff6139ab891 49002->49005 49003->48997 49004->49005 49005->48993 49006 7ff6139ab89b free 49005->49006 49006->48993 49008 7ff6139b12fc 49007->49008 49009 7ff6139ab6d0 456 API calls 49008->49009 49013 7ff6139b1306 49009->49013 49010 7ff6139b1436 49011 7ff6139df580 8 API calls 49010->49011 49012 7ff6139b1462 49011->49012 49012->48966 49013->49010 49014 7ff6139b141c 49013->49014 49015 7ff6139b1357 49013->49015 49014->49010 49016 7ff61399fb70 304 API calls 49014->49016 49017 7ff6139a8e80 13 API calls 49015->49017 49016->49010 49018 7ff6139b13c8 calloc 49017->49018 49019 7ff6139b13e0 49018->49019 49020 7ff6139b13e7 49018->49020 49019->49010 49069 7ff6139b1960 49020->49069 49022 7ff6139b13f6 49022->49010 49079 7ff6139b1710 49022->49079 49025->48984 49026->48984 49027->48984 49028->48984 49029->48984 49030->48975 49032 7ff61399fb97 49031->49032 49035 7ff61399fb9e 49031->49035 49064 7ff6139a0550 memset 49032->49064 49034 7ff61399fbcd 49042 7ff6139b9430 304 API calls 49034->49042 49043 7ff6139b9a80 304 API calls 49034->49043 49046 7ff6139b8df0 49034->49046 49035->49034 49036 7ff61399fbc4 49035->49036 49038 7ff61399fc07 49035->49038 49065 7ff6139a5970 19 API calls 49036->49065 49038->48989 49039 7ff61399fbf2 49039->49038 49041 7ff6139b5090 2 API calls 49039->49041 49040 7ff61399fc17 49040->49038 49041->49038 49042->49039 49043->49039 49045->49002 49047 7ff6139b9a80 49046->49047 49048 7ff6139a71f0 10 API calls 49047->49048 49060 7ff6139b9afb 49047->49060 49063 7ff6139b9ac9 49047->49063 49051 7ff6139b9ae7 49048->49051 49049 7ff6139a71f0 10 API calls 49049->49060 49050 7ff6139b9bf2 49050->49063 49068 7ff6139bb1e0 67 API calls 49050->49068 49053 7ff6139b9bdc 49051->49053 49055 7ff6139b9c70 74 API calls 49051->49055 49067 7ff6139a5970 19 API calls 49053->49067 49055->49060 49056 7ff6139b9bd5 49056->49063 49057 7ff6139b5fe0 19 API calls 49057->49060 49058 7ff6139baa50 303 API calls 49058->49060 49059 7ff6139b9bbd WSAGetLastError 49066 7ff6139a5970 19 API calls 49059->49066 49060->49049 49060->49050 49060->49053 49060->49057 49060->49058 49060->49059 49062 7ff6139b9bac 49060->49062 49060->49063 49062->49053 49062->49063 49063->49039 49064->49035 49065->49040 49066->49056 49067->49056 49068->49063 49099 7ff6139a8ef0 15 API calls 49069->49099 49071 7ff6139b1989 49072 7ff6139b1991 49071->49072 49073 7ff6139b19ca 49071->49073 49100 7ff6139b15a0 7 API calls 49072->49100 49074 7ff6139b19e9 49073->49074 49076 7ff6139b19d7 free free 49073->49076 49074->49022 49076->49074 49078 7ff6139b19b5 free 49078->49022 49080 7ff6139b1772 49079->49080 49081 7ff6139b17da 49080->49081 49082 7ff6139b1784 49080->49082 49102 7ff6139a61c0 49081->49102 49101 7ff6139ac080 malloc 49082->49101 49084 7ff6139b1799 49086 7ff6139b17a0 49084->49086 49087 7ff6139b17bf memcpy 49084->49087 49089 7ff6139b17a5 free free 49086->49089 49090 7ff6139b17b7 49086->49090 49087->49081 49089->49090 49091 7ff6139b1418 49090->49091 49091->49010 49091->49014 49092 7ff6139b1929 free free 49092->49091 49093 7ff6139b183c 49105 7ff6139a58b0 fwrite fwrite 49093->49105 49094 7ff6139b186e 49094->49091 49094->49092 49096 7ff6139b184d 49097 7ff6139b1866 49096->49097 49106 7ff6139a58b0 fwrite fwrite 49096->49106 49097->49094 49099->49071 49100->49078 49101->49084 49107 7ff6139bbc90 49102->49107 49105->49096 49106->49097 49108 7ff6139bbce2 49107->49108 49109 7ff6139bbd09 malloc 49107->49109 49108->49109 49111 7ff6139bbcfc 49108->49111 49110 7ff6139bbd49 49109->49110 49109->49111 49112 7ff6139bbd69 memcpy 49110->49112 49113 7ff6139df580 8 API calls 49111->49113 49121 7ff6139bbdec 49112->49121 49114 7ff6139a61f0 49113->49114 49114->49093 49114->49094 49115 7ff6139bbef9 free 49115->49111 49116 7ff6139a71f0 10 API calls 49116->49121 49117 7ff6139bbec1 49128 7ff6139a5970 19 API calls 49117->49128 49119 7ff6139b5fe0 19 API calls 49119->49121 49120 7ff6139bbed3 49120->49115 49121->49115 49121->49116 49121->49117 49121->49119 49122 7ff6139bbe9b WSAGetLastError 49121->49122 49124 7ff6139a6230 48 API calls 49121->49124 49126 7ff6139bbe8d 49121->49126 49127 7ff6139a5970 19 API calls 49122->49127 49124->49121 49125 7ff6139bbeb3 49125->49126 49126->49115 49127->49125 49128->49120 49129 7ff61399743c 49130 7ff6139b5090 2 API calls 49129->49130 49131 7ff613997449 49130->49131 49132 7ff613997465 49131->49132 49187 7ff6139957f0 17 API calls 49131->49187 49133 7ff613997481 49132->49133 49188 7ff6139957f0 17 API calls 49132->49188 49156 7ff6139a1190 free free 49133->49156 49137 7ff613997491 49138 7ff6139a5af0 15 API calls 49137->49138 49141 7ff6139974e7 49137->49141 49153 7ff61399727b 49137->49153 49139 7ff6139974db 49138->49139 49140 7ff6139984a0 17 API calls 49139->49140 49140->49141 49141->49153 49189 7ff6139ab580 free 49141->49189 49142 7ff6139984a0 17 API calls 49142->49153 49145 7ff613998322 49146 7ff613998313 49193 7ff6139a5970 19 API calls 49146->49193 49150 7ff6139a71f0 10 API calls 49150->49153 49151 7ff61399731e 49152 7ff6139a5970 19 API calls 49151->49152 49151->49153 49152->49151 49153->49142 49153->49145 49153->49146 49153->49150 49153->49151 49155 7ff613996d00 292 API calls 49153->49155 49186 7ff6139a5970 19 API calls 49153->49186 49190 7ff6139a1430 90 API calls 49153->49190 49191 7ff613995a20 15 API calls 49153->49191 49192 7ff6139b51e0 22 API calls 49153->49192 49155->49153 49157 7ff6139a0f70 292 API calls 49156->49157 49158 7ff6139a11ea 49157->49158 49159 7ff6139a0f70 292 API calls 49158->49159 49160 7ff6139a11f6 memset 49159->49160 49194 7ff6139a2920 49160->49194 49164 7ff6139b5090 2 API calls 49166 7ff6139a125f 49164->49166 49165 7ff6139a123d 49165->49137 49166->49165 49167 7ff6139a12b2 49166->49167 49168 7ff6139a128b free 49166->49168 49169 7ff6139ad7b0 2 API calls 49167->49169 49172 7ff6139a12be 49167->49172 49284 7ff6139a8db0 15 API calls 49168->49284 49171 7ff6139a1300 49169->49171 49173 7ff6139a1314 49171->49173 49174 7ff6139a133d 49171->49174 49172->49165 49285 7ff6139a1430 90 API calls 49172->49285 49286 7ff6139a6780 49173->49286 49176 7ff6139b5090 2 API calls 49174->49176 49177 7ff6139a134a 49176->49177 49181 7ff6139a136d 49177->49181 49182 7ff6139b5090 2 API calls 49177->49182 49179 7ff6139a13f7 49180 7ff6139ad7b0 2 API calls 49179->49180 49180->49165 49297 7ff6139a7300 49181->49297 49182->49181 49185 7ff6139a5af0 15 API calls 49185->49179 49186->49153 49187->49132 49188->49133 49189->49153 49190->49153 49191->49153 49192->49153 49193->49145 49195 7ff6139a2965 49194->49195 49283 7ff6139a2989 49195->49283 49327 7ff6139a2120 calloc 49195->49327 49197 7ff6139a299b 49197->49283 49342 7ff6139a4590 49197->49342 49198 7ff6139df580 8 API calls 49199 7ff6139a1225 49198->49199 49199->49164 49199->49165 49199->49172 49202 7ff6139a29d2 _strdup 49203 7ff6139a29e4 49202->49203 49202->49283 49204 7ff6139a2a02 49203->49204 49205 7ff6139a29f0 _strdup 49203->49205 49392 7ff6139a3330 49204->49392 49205->49204 49205->49283 49209 7ff6139a8e80 13 API calls 49210 7ff6139a2a75 49209->49210 49210->49283 49451 7ff6139a3b80 49210->49451 49211 7ff6139a2ac7 49212 7ff6139a2b22 49211->49212 49213 7ff6139a2b0c _strdup 49211->49213 49211->49283 49214 7ff6139a2b45 49212->49214 49215 7ff6139a2b2c _strdup 49212->49215 49213->49212 49213->49283 49467 7ff6139a3ff0 49214->49467 49215->49214 49215->49283 49220 7ff6139a2b92 49222 7ff6139a2bb4 49220->49222 49223 7ff6139a16c0 38 API calls 49220->49223 49220->49283 49221 7ff6139a16c0 38 API calls 49221->49220 49224 7ff6139a16c0 38 API calls 49222->49224 49225 7ff6139a2bd6 49222->49225 49222->49283 49223->49222 49224->49225 49226 7ff6139a2d6f 49225->49226 49229 7ff6139a2cd4 49225->49229 49225->49283 49489 7ff61399eea0 49226->49489 49228 7ff6139a2f0a 49230 7ff61399eea0 8 API calls 49228->49230 49228->49283 49231 7ff6139a2d5f 49229->49231 49232 7ff6139a2cf4 49229->49232 49233 7ff6139a2f21 49230->49233 49234 7ff6139a1790 2 API calls 49231->49234 49570 7ff61399dde0 17 API calls 49232->49570 49233->49283 49513 7ff6139a4a50 49233->49513 49234->49283 49236 7ff6139a2d0a 49239 7ff6139a54c0 17 API calls 49236->49239 49236->49283 49247 7ff6139a2d1c 49239->49247 49240 7ff6139a3014 49282 7ff6139a30c1 49240->49282 49574 7ff61399e380 13 API calls 49240->49574 49242 7ff6139a2d22 49242->49283 49243 7ff6139a2f79 49243->49240 49244 7ff6139a2f81 49243->49244 49573 7ff6139a5170 34 API calls 49244->49573 49245 7ff6139a5af0 15 API calls 49250 7ff6139a30d0 49245->49250 49247->49242 49571 7ff6139ac9a0 17 API calls 49247->49571 49577 7ff6139a25b0 44 API calls 49250->49577 49251 7ff6139a2f91 free free 49253 7ff6139a2fb8 49251->49253 49256 7ff6139a5af0 15 API calls 49253->49256 49254 7ff6139a3066 49261 7ff6139a30ab 49254->49261 49575 7ff61399e130 QueryPerformanceCounter GetTickCount 49254->49575 49260 7ff6139a300f 49256->49260 49257 7ff6139a314c 49580 7ff61399dde0 17 API calls 49257->49580 49259 7ff6139a308d 49265 7ff6139a30a0 49259->49265 49266 7ff6139a30ad 49259->49266 49533 7ff6139a1790 49260->49533 49261->49257 49578 7ff61399e200 QueryPerformanceCounter GetTickCount 49261->49578 49264 7ff6139a31cb 49537 7ff6139a54c0 49264->49537 49576 7ff6139a1430 90 API calls 49265->49576 49267 7ff6139a5af0 15 API calls 49266->49267 49267->49282 49268 7ff6139a3135 49272 7ff6139a3141 49268->49272 49273 7ff6139a331b 49268->49273 49270 7ff6139a315b 49275 7ff6139a5af0 15 API calls 49270->49275 49279 7ff6139a3181 49270->49279 49270->49283 49579 7ff6139a1430 90 API calls 49272->49579 49278 7ff6139a5af0 15 API calls 49273->49278 49274 7ff6139a31d3 49274->49283 49546 7ff6139a4ef0 49274->49546 49275->49279 49276 7ff6139a5af0 15 API calls 49280 7ff6139a31af 49276->49280 49278->49282 49279->49260 49279->49276 49280->49260 49282->49245 49283->49198 49284->49167 49285->49165 49287 7ff6139ad7b0 2 API calls 49286->49287 49288 7ff6139a67a3 49287->49288 49289 7ff6139a681b 49288->49289 49296 7ff6139a6834 49288->49296 49699 7ff6139a5970 19 API calls 49289->49699 49291 7ff6139a682a 49292 7ff6139a132a 49291->49292 49292->49172 49292->49179 49293 7ff6139a693d 49293->49292 49700 7ff6139957f0 17 API calls 49293->49700 49296->49293 49634 7ff6139a7cc0 49296->49634 49298 7ff6139a7533 49297->49298 49299 7ff6139a7337 49297->49299 49300 7ff6139df580 8 API calls 49298->49300 49299->49298 49301 7ff6139a7351 getpeername 49299->49301 49302 7ff6139a1387 49300->49302 49303 7ff6139a7376 WSAGetLastError 49301->49303 49304 7ff6139a73ad getsockname 49301->49304 49302->49179 49302->49185 49729 7ff613992500 27 API calls 49303->49729 49305 7ff6139a7400 WSAGetLastError 49304->49305 49306 7ff6139a7437 49304->49306 49731 7ff613992500 27 API calls 49305->49731 49733 7ff6139a6530 19 API calls 49306->49733 49308 7ff6139a7393 49730 7ff6139a5970 19 API calls 49308->49730 49312 7ff6139a741d 49732 7ff6139a5970 19 API calls 49312->49732 49313 7ff6139a7459 49315 7ff6139a749d 49313->49315 49316 7ff6139a745d _errno _errno 49313->49316 49736 7ff6139a6530 19 API calls 49315->49736 49734 7ff613992500 27 API calls 49316->49734 49319 7ff6139a74ef 49319->49298 49321 7ff6139a74f3 _errno _errno 49319->49321 49320 7ff6139a7483 49735 7ff6139a5970 19 API calls 49320->49735 49737 7ff613992500 27 API calls 49321->49737 49323 7ff6139a73a8 49323->49298 49325 7ff6139a7519 49738 7ff6139a5970 19 API calls 49325->49738 49328 7ff6139a2150 calloc 49327->49328 49329 7ff6139a2145 49327->49329 49330 7ff6139a23c1 free 49328->49330 49331 7ff6139a217a 49328->49331 49329->49197 49330->49197 49332 7ff6139ad7b0 2 API calls 49331->49332 49333 7ff6139a2211 49332->49333 49334 7ff6139ad7b0 2 API calls 49333->49334 49335 7ff6139a2225 49334->49335 49336 7ff6139a2387 _strdup 49335->49336 49337 7ff6139a23fd 49335->49337 49336->49337 49339 7ff6139a2399 49336->49339 49338 7ff6139ad7b0 2 API calls 49337->49338 49340 7ff6139a243d 49338->49340 49341 7ff6139a23a7 free free 49339->49341 49340->49197 49341->49330 49581 7ff6139a5570 8 API calls 49342->49581 49345 7ff6139a45b0 49584 7ff6139ce540 23 API calls 49345->49584 49346 7ff6139a45b7 49585 7ff6139ce500 calloc 49346->49585 49349 7ff6139a45b5 49350 7ff6139a45bc 49349->49350 49354 7ff6139a4632 49350->49354 49383 7ff6139a29bc 49350->49383 49586 7ff6139ce170 tolower 49350->49586 49353 7ff6139a45ff 49353->49354 49356 7ff6139a4618 49353->49356 49357 7ff6139a460b free 49353->49357 49364 7ff6139a46f5 49354->49364 49354->49383 49588 7ff6139ce680 8 API calls 49354->49588 49355 7ff6139a471e 49358 7ff6139a475c 49355->49358 49366 7ff6139a4794 49355->49366 49355->49383 49587 7ff6139a8db0 15 API calls 49356->49587 49357->49356 49590 7ff6139a5970 19 API calls 49358->49590 49362 7ff6139a46dc 49362->49364 49365 7ff6139a46e8 free 49362->49365 49362->49383 49363 7ff6139a476e 49363->49383 49589 7ff6139ce680 8 API calls 49364->49589 49365->49364 49591 7ff6139ce680 8 API calls 49366->49591 49368 7ff6139a47bb 49369 7ff6139a47c5 _strdup 49368->49369 49370 7ff6139a47e2 49368->49370 49369->49370 49369->49383 49370->49383 49592 7ff6139ce680 8 API calls 49370->49592 49372 7ff6139a4805 49373 7ff6139a480f _strdup 49372->49373 49374 7ff6139a4828 49372->49374 49373->49374 49373->49383 49374->49383 49593 7ff6139ce680 8 API calls 49374->49593 49376 7ff6139a4848 49377 7ff6139a4852 _strdup 49376->49377 49378 7ff6139a48dd 49376->49378 49377->49378 49377->49383 49378->49383 49594 7ff6139ce680 8 API calls 49378->49594 49380 7ff6139a48f8 49380->49383 49595 7ff6139ce680 8 API calls 49380->49595 49382 7ff6139a492d 49382->49383 49596 7ff6139ce680 8 API calls 49382->49596 49383->49202 49383->49203 49383->49283 49385 7ff6139a4971 49386 7ff6139a4991 strtoul 49385->49386 49387 7ff6139a4975 49385->49387 49386->49387 49387->49383 49597 7ff6139ce680 8 API calls 49387->49597 49389 7ff6139a4a0d _strdup 49389->49383 49390 7ff6139a49d0 49390->49389 49390->49390 49598 7ff6139a5640 20 API calls 49390->49598 49393 7ff6139a344d 49392->49393 49394 7ff6139a337d memset memset 49392->49394 49395 7ff6139a3480 49393->49395 49396 7ff6139a3459 _strdup 49393->49396 49397 7ff6139a33b0 strncpy 49394->49397 49398 7ff6139a33c8 49394->49398 49400 7ff6139a349f 49395->49400 49401 7ff6139a348c _strdup 49395->49401 49396->49395 49399 7ff6139a3467 49396->49399 49397->49398 49402 7ff6139a33ef 49398->49402 49403 7ff6139a33d4 strncpy 49398->49403 49607 7ff6139a5970 19 API calls 49399->49607 49430 7ff6139a34fe 49400->49430 49608 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49400->49608 49401->49399 49401->49400 49605 7ff6139bc080 malloc strtoul free 49402->49605 49403->49402 49406 7ff6139a340f 49410 7ff6139a343c 49406->49410 49606 7ff6139bc080 malloc strtoul free 49406->49606 49407 7ff6139a3476 49411 7ff6139a39a7 free free 49407->49411 49409 7ff6139a34c0 49412 7ff6139a34dc 49409->49412 49609 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49409->49609 49410->49393 49410->49411 49415 7ff6139df580 8 API calls 49411->49415 49417 7ff6139a5af0 15 API calls 49412->49417 49412->49430 49414 7ff6139a3761 free 49419 7ff6139a379e 49414->49419 49420 7ff6139a3771 49414->49420 49418 7ff6139a2a17 49415->49418 49417->49430 49418->49209 49418->49210 49418->49283 49422 7ff6139a37c8 49419->49422 49426 7ff6139a37b8 free 49419->49426 49420->49419 49421 7ff6139a3792 free 49420->49421 49421->49419 49427 7ff6139a37cd 49422->49427 49614 7ff6139a4240 47 API calls 49422->49614 49423 7ff6139a36a9 49610 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49423->49610 49424 7ff6139a3656 49424->49414 49424->49423 49428 7ff6139a3690 tolower 49424->49428 49425 7ff6139a37e4 free free free 49433 7ff6139a37d7 49425->49433 49426->49422 49427->49433 49447 7ff6139a3881 49427->49447 49615 7ff6139a4240 47 API calls 49427->49615 49428->49423 49428->49428 49430->49424 49430->49425 49430->49430 49435 7ff6139a356e strchr 49430->49435 49450 7ff6139a3587 49430->49450 49433->49411 49434 7ff6139a382f free 49434->49427 49434->49433 49435->49424 49435->49450 49436 7ff6139a3863 free 49436->49433 49436->49447 49438 7ff6139a5af0 15 API calls 49440 7ff6139a375c 49438->49440 49439 7ff6139a3728 49446 7ff6139a373f 49439->49446 49613 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49439->49613 49440->49414 49441 7ff6139a35b0 strchr 49441->49450 49442 7ff6139a36d0 49448 7ff6139a370c 49442->49448 49611 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49442->49611 49445 7ff6139a35e0 strchr 49445->49450 49446->49438 49446->49440 49447->49433 49449 7ff6139a38f7 free 49447->49449 49448->49446 49612 7ff6139bbf40 realloc GetEnvironmentVariableA realloc free 49448->49612 49449->49433 49450->49424 49450->49425 49450->49441 49450->49445 49452 7ff6139a3bb1 49451->49452 49453 7ff6139a3be4 49451->49453 49452->49453 49456 7ff6139a3bd0 49452->49456 49457 7ff6139a3bc4 free 49452->49457 49454 7ff6139a3c1b 49453->49454 49455 7ff6139a3bf9 free _strdup 49453->49455 49458 7ff6139a3c2f free _strdup 49454->49458 49459 7ff6139a3c51 49454->49459 49455->49454 49465 7ff6139a3d18 49455->49465 49456->49453 49461 7ff6139a3bd8 free 49456->49461 49457->49456 49458->49459 49458->49465 49460 7ff6139a3c65 free _strdup 49459->49460 49462 7ff6139a3c8f 49459->49462 49460->49462 49460->49465 49461->49453 49462->49465 49616 7ff6139d0430 36 API calls 49462->49616 49464 7ff6139a3cfe 49464->49465 49466 7ff6139a5af0 15 API calls 49464->49466 49465->49211 49466->49465 49469 7ff6139a4020 49467->49469 49470 7ff6139a40f8 strchr 49469->49470 49472 7ff6139a2b57 49469->49472 49474 7ff6139a419a free 49469->49474 49475 7ff6139a40c7 free 49469->49475 49476 7ff6139a5af0 15 API calls 49469->49476 49617 7ff6139a8db0 15 API calls 49469->49617 49618 7ff6139a3df0 22 API calls 49469->49618 49470->49469 49473 7ff6139a410d strtol 49470->49473 49472->49283 49477 7ff6139a16c0 49472->49477 49473->49469 49474->49469 49475->49469 49475->49474 49476->49469 49480 7ff6139a16f5 49477->49480 49484 7ff6139a170f 49477->49484 49478 7ff6139df580 8 API calls 49479 7ff6139a1721 49478->49479 49479->49220 49479->49221 49479->49283 49480->49484 49619 7ff6139d0380 18 API calls 49480->49619 49482 7ff6139a1748 49483 7ff6139a175b GetLastError 49482->49483 49482->49484 49620 7ff613992640 21 API calls 49483->49620 49484->49478 49486 7ff6139a1773 49621 7ff6139a5970 19 API calls 49486->49621 49488 7ff6139a1789 49488->49484 49490 7ff61399ef05 49489->49490 49491 7ff61399eee6 _strdup 49489->49491 49493 7ff61399ef31 49490->49493 49494 7ff61399ef12 _strdup 49490->49494 49491->49490 49492 7ff61399eef5 49491->49492 49492->49228 49496 7ff61399ef3e _strdup 49493->49496 49497 7ff61399ef5d 49493->49497 49494->49493 49495 7ff61399ef21 49494->49495 49495->49228 49496->49497 49498 7ff61399ef4d 49496->49498 49499 7ff61399ef89 49497->49499 49500 7ff61399ef6a _strdup 49497->49500 49498->49228 49502 7ff61399efb5 49499->49502 49503 7ff61399ef96 _strdup 49499->49503 49500->49499 49501 7ff61399ef79 49500->49501 49501->49228 49505 7ff61399efe1 49502->49505 49506 7ff61399efc2 _strdup 49502->49506 49503->49502 49504 7ff61399efa5 49503->49504 49504->49228 49508 7ff61399efee _strdup 49505->49508 49509 7ff61399f00d 49505->49509 49506->49505 49507 7ff61399efd1 49506->49507 49507->49228 49508->49509 49510 7ff61399effd 49508->49510 49511 7ff61399f01a _strdup 49509->49511 49512 7ff61399f029 49509->49512 49510->49228 49511->49512 49512->49228 49514 7ff6139ad7b0 2 API calls 49513->49514 49515 7ff6139a4a63 49514->49515 49517 7ff6139ae520 9 API calls 49515->49517 49518 7ff6139a2f37 49515->49518 49524 7ff6139a4b37 49515->49524 49622 7ff6139aeee0 free free free free 49515->49622 49623 7ff6139d0d10 8 API calls 49515->49623 49624 7ff6139d0920 7 API calls 49515->49624 49517->49515 49518->49240 49572 7ff6139a0600 15 API calls 49518->49572 49521 7ff6139a5af0 15 API calls 49521->49524 49523 7ff6139a65d0 closesocket free 49523->49524 49524->49521 49524->49523 49525 7ff6139a4bd6 30 API calls 49524->49525 49625 7ff61399ac00 16 API calls 49524->49625 49626 7ff6139a28a0 free free 49525->49626 49527 7ff6139a4e36 49528 7ff6139a4e44 free 49527->49528 49627 7ff61399f050 8 API calls 49528->49627 49530 7ff6139a4e64 49628 7ff61399f050 8 API calls 49530->49628 49532 7ff6139a4e70 free free free 49532->49515 49534 7ff6139a179e 49533->49534 49535 7ff6139ad7b0 2 API calls 49534->49535 49536 7ff6139a1808 49535->49536 49536->49264 49538 7ff6139a54dc 49537->49538 49539 7ff6139a54e5 49538->49539 49540 7ff6139a54fe free 49538->49540 49541 7ff6139a5512 49538->49541 49539->49274 49540->49541 49542 7ff6139a5525 _strdup 49541->49542 49543 7ff6139a5517 49541->49543 49544 7ff6139a5523 49542->49544 49629 7ff6139a8db0 15 API calls 49543->49629 49544->49274 49547 7ff6139a71f0 10 API calls 49546->49547 49548 7ff6139a4f15 49547->49548 49549 7ff6139a4f20 49548->49549 49550 7ff6139a4f37 calloc 49548->49550 49551 7ff6139a4fdc 49548->49551 49549->49283 49552 7ff6139a4f57 49550->49552 49558 7ff6139a4f4f 49550->49558 49553 7ff6139a4fe8 _strdup 49551->49553 49554 7ff6139a509d _strdup 49551->49554 49630 7ff6139b8b90 6 API calls 49552->49630 49556 7ff6139a50ca 49553->49556 49565 7ff6139a5035 49553->49565 49554->49556 49560 7ff6139a50e0 49554->49560 49556->49283 49558->49549 49559 7ff6139a4f70 49559->49558 49560->49549 49564 7ff6139a5119 49560->49564 49565->49549 49568 7ff6139a506e 49565->49568 49570->49236 49571->49231 49572->49243 49573->49251 49574->49254 49575->49259 49576->49261 49577->49283 49578->49268 49579->49257 49580->49270 49599 7ff6139ce510 49581->49599 49584->49349 49586->49353 49587->49354 49588->49362 49589->49355 49590->49363 49591->49368 49592->49372 49593->49376 49594->49380 49595->49382 49596->49385 49597->49390 49598->49389 49600 7ff6139ce515 49599->49600 49601 7ff6139a45a4 49599->49601 49604 7ff6139cf4f0 12 API calls 49600->49604 49601->49345 49601->49346 49605->49406 49606->49410 49607->49407 49608->49409 49609->49412 49610->49442 49611->49448 49612->49439 49613->49446 49614->49434 49615->49436 49616->49464 49617->49469 49618->49469 49619->49482 49620->49486 49621->49488 49622->49515 49625->49524 49626->49527 49627->49530 49628->49532 49629->49544 49630->49559 49635 7ff6139a7d2f memcpy 49634->49635 49637 7ff6139a7d98 socket 49635->49637 49639 7ff6139a7d6b 49635->49639 49637->49639 49638 7ff6139df580 8 API calls 49641 7ff6139a826b 49638->49641 49642 7ff6139a7dd7 49639->49642 49692 7ff6139a80f4 49639->49692 49721 7ff6139b4c90 ioctlsocket 49639->49721 49641->49296 49643 7ff6139a81fa _errno _errno _errno 49642->49643 49701 7ff6139d11c0 49642->49701 49726 7ff613992500 27 API calls 49643->49726 49646 7ff6139a7e24 49646->49643 49648 7ff6139a7e2d htons 49646->49648 49647 7ff6139a822b 49727 7ff6139a5970 19 API calls 49647->49727 49650 7ff6139a5af0 15 API calls 49648->49650 49652 7ff6139a7e4e 49650->49652 49651 7ff6139a8240 49653 7ff6139a65d0 2 API calls 49651->49653 49654 7ff6139a7e6f setsockopt 49652->49654 49655 7ff6139a7ec9 49652->49655 49687 7ff6139a80d5 49653->49687 49654->49655 49656 7ff6139a7e9d WSAGetLastError 49654->49656 49657 7ff6139a8800 14 API calls 49655->49657 49661 7ff6139a7f01 49655->49661 49722 7ff613992500 27 API calls 49656->49722 49657->49661 49658 7ff6139a7f22 getsockopt 49662 7ff6139a7f53 setsockopt 49658->49662 49663 7ff6139a7f49 49658->49663 49659 7ff6139a7f05 49666 7ff6139a7f8a setsockopt 49659->49666 49672 7ff6139a7fc9 49659->49672 49661->49658 49661->49659 49662->49659 49663->49659 49663->49662 49664 7ff6139a7eb7 49667 7ff6139a5af0 15 API calls 49664->49667 49665 7ff6139a8097 49668 7ff6139a80a8 49665->49668 49671 7ff6139a80fe 49665->49671 49669 7ff6139a7fb7 49666->49669 49675 7ff6139a7fce 49666->49675 49667->49655 49723 7ff6139a7630 645 API calls 49668->49723 49670 7ff6139a5af0 15 API calls 49669->49670 49670->49672 49720 7ff6139b4c90 ioctlsocket 49671->49720 49672->49665 49688 7ff6139a80e9 49672->49688 49674 7ff6139a810b 49677 7ff6139ad7b0 2 API calls 49674->49677 49678 7ff6139a7ffc WSAIoctl 49675->49678 49680 7ff6139a8115 49677->49680 49678->49672 49681 7ff6139a8044 WSAGetLastError 49678->49681 49679 7ff6139a80c4 49679->49671 49682 7ff6139a80ca 49679->49682 49683 7ff6139a813f 49680->49683 49724 7ff6139957f0 17 API calls 49680->49724 49684 7ff6139a5af0 15 API calls 49681->49684 49685 7ff6139a65d0 2 API calls 49682->49685 49690 7ff6139a815f connect 49683->49690 49691 7ff6139a8188 WSAGetLastError 49683->49691 49683->49692 49684->49672 49685->49687 49687->49692 49689 7ff6139a65d0 2 API calls 49688->49689 49689->49692 49690->49691 49690->49692 49691->49692 49693 7ff6139a8195 49691->49693 49692->49638 49693->49692 49725 7ff613992500 27 API calls 49693->49725 49695 7ff6139a81b1 49696 7ff6139a5af0 15 API calls 49695->49696 49697 7ff6139a81c7 49696->49697 49698 7ff6139a65d0 2 API calls 49697->49698 49698->49692 49699->49291 49700->49292 49702 7ff6139d11cf 49701->49702 49703 7ff6139d11f9 49701->49703 49704 7ff6139d11d4 _errno 49702->49704 49712 7ff6139d11e7 49702->49712 49705 7ff6139a8e80 13 API calls 49703->49705 49704->49646 49706 7ff6139d1268 49705->49706 49707 7ff6139d12b4 _errno 49706->49707 49708 7ff6139d1287 49706->49708 49707->49708 49709 7ff6139df580 8 API calls 49708->49709 49710 7ff6139d12cf 49709->49710 49710->49646 49711 7ff6139a8e80 13 API calls 49711->49712 49712->49711 49713 7ff6139d155a 49712->49713 49715 7ff6139d14e0 49712->49715 49728 7ff6139d1210 14 API calls 49713->49728 49716 7ff6139d1573 _errno 49715->49716 49717 7ff6139d1509 49715->49717 49716->49717 49718 7ff6139df580 8 API calls 49717->49718 49719 7ff6139d1547 49718->49719 49719->49646 49720->49674 49721->49642 49722->49664 49723->49679 49724->49683 49725->49695 49726->49647 49727->49651 49728->49715 49729->49308 49730->49323 49731->49312 49732->49323 49733->49313 49734->49320 49735->49323 49736->49319 49737->49325 49738->49323 49739 7ff6139b1490 49740 7ff61399fb70 304 API calls 49739->49740 49741 7ff6139b14a7 49740->49741 49742 7ff6139c20b0 49743 7ff6139c2140 49742->49743 49744 7ff6139c20d9 49742->49744 49745 7ff6139ab6d0 456 API calls 49743->49745 49746 7ff6139c2100 49744->49746 49747 7ff6139c20ea 49744->49747 49750 7ff6139c214d 49745->49750 49777 7ff6139a6980 49746->49777 49816 7ff6139ab5d0 454 API calls 49747->49816 49760 7ff6139c21b1 49750->49760 49762 7ff6139c222a 49750->49762 49818 7ff6139daa80 35 API calls 49750->49818 49751 7ff6139c20f5 49753 7ff6139c2111 49753->49762 49817 7ff6139c2d30 65 API calls 49753->49817 49754 7ff6139c22de 49826 7ff6139ac9a0 17 API calls 49754->49826 49755 7ff6139c21e2 49757 7ff6139c223e 49755->49757 49758 7ff6139c21ee 49755->49758 49773 7ff6139c2247 49757->49773 49822 7ff6139dcb10 _errno strtoll _errno 49757->49822 49819 7ff6139c2a40 320 API calls 49758->49819 49760->49754 49760->49755 49760->49762 49764 7ff6139c21f8 49764->49762 49820 7ff6139c2590 26 API calls 49764->49820 49765 7ff6139c2135 49770 7ff6139c2263 49771 7ff6139c2289 49770->49771 49770->49773 49776 7ff6139c229e 49770->49776 49823 7ff6139c2dd0 72 API calls 49771->49823 49772 7ff6139c2213 49772->49762 49821 7ff6139c2980 32 API calls 49772->49821 49773->49776 49824 7ff6139c2dd0 72 API calls 49773->49824 49776->49762 49825 7ff6139daa80 35 API calls 49776->49825 49778 7ff6139a69d8 49777->49778 49792 7ff6139a69cf 49777->49792 49779 7ff6139ad7b0 2 API calls 49778->49779 49782 7ff6139a69f2 49779->49782 49780 7ff6139df580 8 API calls 49781 7ff6139a6f05 49780->49781 49781->49743 49781->49753 49783 7ff6139a6a82 49782->49783 49784 7ff6139a6a69 49782->49784 49786 7ff6139a6a8c 49783->49786 49798 7ff6139a6ab9 49783->49798 49848 7ff6139a5970 19 API calls 49784->49848 49788 7ff6139a7b50 660 API calls 49786->49788 49787 7ff6139a6a78 49787->49792 49789 7ff6139a6a9a 49788->49789 49789->49792 49793 7ff6139a7c60 51 API calls 49789->49793 49790 7ff6139b5fe0 19 API calls 49790->49798 49791 7ff6139a6d95 49791->49792 49850 7ff6139a8280 665 API calls 49791->49850 49792->49780 49793->49792 49794 7ff6139a6d04 SleepEx getsockopt 49796 7ff6139a6d4c WSAGetLastError 49794->49796 49794->49798 49796->49798 49797 7ff6139a6ca6 SleepEx getsockopt 49797->49798 49799 7ff6139a6cee WSAGetLastError 49797->49799 49798->49790 49798->49791 49798->49794 49798->49797 49800 7ff6139a5af0 15 API calls 49798->49800 49801 7ff6139a6dd3 49798->49801 49802 7ff6139a6bb7 WSASetLastError 49798->49802 49814 7ff6139a8280 665 API calls 49798->49814 49849 7ff613992500 27 API calls 49798->49849 49799->49798 49800->49798 49804 7ff6139a6e2b 49801->49804 49807 7ff6139a65d0 2 API calls 49801->49807 49802->49798 49803 7ff6139a6dae 49803->49792 49805 7ff6139a6dc7 49803->49805 49827 7ff6139a7b50 49804->49827 49851 7ff613992500 27 API calls 49805->49851 49807->49804 49809 7ff6139a6ea7 49852 7ff6139a5970 19 API calls 49809->49852 49810 7ff6139a6e49 49810->49792 49840 7ff6139a7c60 49810->49840 49813 7ff6139a6ec5 49813->49792 49814->49798 49816->49751 49817->49765 49818->49760 49819->49764 49820->49772 49821->49762 49822->49770 49823->49776 49824->49776 49825->49762 49826->49762 49828 7ff6139a7c55 49827->49828 49829 7ff6139a7b67 49827->49829 49828->49810 49830 7ff6139a7c37 49829->49830 49832 7ff6139a7c0a 49829->49832 49835 7ff6139a7bec 49829->49835 49855 7ff6139b6440 632 API calls 49830->49855 49854 7ff6139b6a90 659 API calls 49832->49854 49834 7ff6139a7c50 49834->49810 49835->49832 49837 7ff6139a7bf1 49835->49837 49836 7ff6139a7c32 49836->49810 49853 7ff6139a5970 19 API calls 49837->49853 49839 7ff6139a7c00 49839->49810 49841 7ff6139a7c80 49840->49841 49842 7ff6139a7c8d 49840->49842 49843 7ff6139b5090 2 API calls 49841->49843 49844 7ff6139a7300 47 API calls 49842->49844 49843->49842 49845 7ff6139a7c9d 49844->49845 49856 7ff6139a20a0 15 API calls 49845->49856 49847 7ff6139a7ca5 49847->49792 49848->49787 49849->49798 49850->49803 49851->49809 49852->49813 49853->49839 49854->49836 49855->49834 49856->49847 49857 7ff613997570 49858 7ff613997581 49857->49858 49885 7ff6139ae420 49858->49885 49860 7ff6139975b5 49861 7ff6139975e7 49860->49861 49862 7ff6139a5af0 15 API calls 49860->49862 49913 7ff6139aee70 314 API calls 49861->49913 49864 7ff6139975e1 49862->49864 49864->49861 49866 7ff6139975f7 49864->49866 49865 7ff6139975f4 49865->49866 49889 7ff613998520 49866->49889 49871 7ff6139984a0 17 API calls 49882 7ff61399727b 49871->49882 49874 7ff613998322 49875 7ff613998313 49917 7ff6139a5970 19 API calls 49875->49917 49879 7ff6139a71f0 10 API calls 49879->49882 49880 7ff6139a5970 19 API calls 49881 7ff61399731e 49880->49881 49881->49880 49881->49882 49882->49871 49882->49874 49882->49875 49882->49879 49882->49881 49884 7ff613996d00 292 API calls 49882->49884 49911 7ff6139a5970 19 API calls 49882->49911 49914 7ff6139a1430 90 API calls 49882->49914 49915 7ff613995a20 15 API calls 49882->49915 49916 7ff6139b51e0 22 API calls 49882->49916 49884->49882 49886 7ff6139ae44a 49885->49886 49887 7ff6139aef50 18 API calls 49886->49887 49888 7ff6139ae469 49887->49888 49888->49860 49898 7ff613998586 49889->49898 49890 7ff613998908 memcpy memcpy 49894 7ff6139987f0 49890->49894 49891 7ff6139df580 8 API calls 49892 7ff613997602 49891->49892 49892->49882 49905 7ff6139aeb40 49892->49905 49893 7ff6139986ce calloc 49893->49894 49899 7ff6139986e8 49893->49899 49894->49891 49895 7ff613998904 49895->49890 49896 7ff6139ade40 malloc 49896->49899 49897 7ff6139987e7 free 49897->49894 49898->49893 49898->49899 49901 7ff6139987fa 49898->49901 49899->49894 49899->49896 49899->49897 49899->49898 49900 7ff6139adb00 malloc memcpy 49899->49900 49902 7ff6139987df 49899->49902 49900->49899 49901->49890 49901->49895 49919 7ff6139addd0 free 49901->49919 49918 7ff6139addd0 free 49902->49918 49906 7ff6139aeb59 49905->49906 49920 7ff6139a1e90 49906->49920 49908 7ff6139aeb70 49909 7ff61399750c 49908->49909 49944 7ff6139a1430 90 API calls 49908->49944 49909->49882 49912 7ff6139ab580 free 49909->49912 49911->49882 49912->49882 49913->49865 49914->49882 49915->49882 49916->49882 49917->49874 49918->49897 49919->49901 49921 7ff6139b5090 2 API calls 49920->49921 49922 7ff6139a1eb5 49921->49922 49923 7ff6139a1ec5 49922->49923 49924 7ff6139a1eee free 49922->49924 49925 7ff6139a1f19 49922->49925 49923->49908 49945 7ff6139a8db0 15 API calls 49924->49945 49927 7ff6139ad7b0 2 API calls 49925->49927 49929 7ff6139a1f25 49925->49929 49928 7ff6139a1f4f 49927->49928 49930 7ff6139a1f91 49928->49930 49931 7ff6139a1f63 49928->49931 49929->49908 49932 7ff6139b5090 2 API calls 49930->49932 49933 7ff6139a6780 665 API calls 49931->49933 49934 7ff6139a1f9e 49932->49934 49935 7ff6139a1f79 49933->49935 49938 7ff6139a1fc1 49934->49938 49939 7ff6139b5090 2 API calls 49934->49939 49936 7ff6139a1f81 49935->49936 49937 7ff6139ad7b0 2 API calls 49935->49937 49936->49908 49940 7ff6139a2054 49937->49940 49941 7ff6139a7300 47 API calls 49938->49941 49939->49938 49940->49908 49942 7ff6139a1fda 49941->49942 49942->49935 49943 7ff6139a5af0 15 API calls 49942->49943 49943->49935 49944->49909 49945->49925 49946 7ff61399ac10 49947 7ff61399ac54 49946->49947 49948 7ff61399ac64 49946->49948 49949 7ff6139ae0f0 3 API calls 49947->49949 49950 7ff6139ad7b0 2 API calls 49948->49950 49949->49948 49951 7ff61399aca6 49950->49951 49957 7ff61399b2b0 calloc 49951->49957 49954 7ff61399acce 49991 7ff6139a5970 19 API calls 49954->49991 49955 7ff61399acc5 49958 7ff61399b43e _errno 49957->49958 49959 7ff61399b301 malloc 49957->49959 49981 7ff61399acc1 49958->49981 49960 7ff61399b38c InitializeCriticalSectionEx 49959->49960 49967 7ff61399b3b7 49959->49967 49963 7ff6139b4a60 29 API calls 49960->49963 49961 7ff61399b3e0 free 49964 7ff61399b3f3 49961->49964 49965 7ff61399b3f8 49961->49965 49962 7ff61399b3d0 DeleteCriticalSection free 49962->49961 49966 7ff61399b3af 49963->49966 49993 7ff6139b8680 free free free 49964->49993 49970 7ff61399b402 closesocket 49965->49970 49971 7ff61399b408 free 49965->49971 49966->49967 49968 7ff61399b466 _strdup 49966->49968 49967->49961 49967->49962 49968->49967 49972 7ff61399b480 free _strdup 49968->49972 49970->49971 49971->49958 49973 7ff61399b4ce 49972->49973 49974 7ff61399b4a2 49972->49974 49975 7ff61399b551 free 49973->49975 49976 7ff61399b4da EnterCriticalSection LeaveCriticalSection 49973->49976 49992 7ff6139b8d50 _beginthreadex 49974->49992 49975->49958 49978 7ff61399b515 49976->49978 49979 7ff61399b504 CloseHandle 49976->49979 49984 7ff61399b522 49978->49984 49985 7ff61399b51a 49978->49985 49983 7ff61399b538 49979->49983 49980 7ff61399b4b6 49980->49981 49982 7ff61399b4be _errno 49980->49982 49981->49954 49981->49955 49982->49973 49988 7ff61399b548 closesocket 49983->49988 49996 7ff613995b00 free 49983->49996 49995 7ff61399b130 7 API calls 49984->49995 49994 7ff6139b8da0 WaitForSingleObjectEx CloseHandle 49985->49994 49988->49975 49989 7ff61399b52b free 49989->49983 49991->49955 49992->49980 49993->49965 49994->49984 49995->49989 49996->49988 49997 7ff6139980b5 49998 7ff6139980c4 49997->49998 50002 7ff6139980e3 49997->50002 49999 7ff6139980d5 49998->49999 50000 7ff6139984a0 17 API calls 49998->50000 50001 7ff613996d00 292 API calls 49999->50001 50000->49999 50001->50002 50015 7ff61399727b 50002->50015 50018 7ff613995a20 15 API calls 50002->50018 50004 7ff6139984a0 17 API calls 50004->50015 50006 7ff613998322 50007 7ff613998313 50022 7ff6139a5970 19 API calls 50007->50022 50011 7ff6139a71f0 10 API calls 50011->50015 50012 7ff6139a5970 19 API calls 50013 7ff61399731e 50012->50013 50013->50012 50013->50015 50015->50004 50015->50006 50015->50007 50015->50011 50015->50013 50016 7ff613996d00 292 API calls 50015->50016 50017 7ff6139a5970 19 API calls 50015->50017 50019 7ff6139a1430 90 API calls 50015->50019 50020 7ff613995a20 15 API calls 50015->50020 50021 7ff6139b51e0 22 API calls 50015->50021 50016->50015 50017->50015 50018->50015 50019->50015 50020->50015 50021->50015 50022->50006 50023 7ff61399792b 50024 7ff613997941 50023->50024 50025 7ff613997972 50023->50025 50060 7ff6139af590 50024->50060 50026 7ff613997a1a 50025->50026 50031 7ff613997970 50025->50031 50028 7ff613997a34 50026->50028 50033 7ff613997ad4 50026->50033 50307 7ff6139ac810 24 API calls 50028->50307 50029 7ff61399795a 50034 7ff6139b5090 2 API calls 50029->50034 50032 7ff613996d00 292 API calls 50031->50032 50037 7ff61399727b 50031->50037 50032->50037 50035 7ff613996d00 292 API calls 50033->50035 50033->50037 50034->50031 50035->50037 50036 7ff613997a41 50038 7ff613996d00 292 API calls 50036->50038 50041 7ff613998322 50037->50041 50042 7ff613998313 50037->50042 50045 7ff6139984a0 17 API calls 50037->50045 50052 7ff6139a71f0 10 API calls 50037->50052 50056 7ff61399731e 50037->50056 50058 7ff613996d00 292 API calls 50037->50058 50306 7ff6139a5970 19 API calls 50037->50306 50309 7ff6139a1430 90 API calls 50037->50309 50310 7ff613995a20 15 API calls 50037->50310 50311 7ff6139b51e0 22 API calls 50037->50311 50040 7ff613997a61 50038->50040 50043 7ff613997ac6 free 50040->50043 50044 7ff613997a6a 50040->50044 50312 7ff6139a5970 19 API calls 50042->50312 50043->50037 50046 7ff613997a81 50044->50046 50048 7ff613997a73 free 50044->50048 50045->50037 50308 7ff6139abdd0 28 API calls 50046->50308 50048->50037 50052->50037 50053 7ff613997ab7 free 50053->50037 50054 7ff613997a92 50054->50053 50055 7ff6139a5970 19 API calls 50055->50056 50056->50037 50056->50055 50058->50037 50061 7ff6139af628 50060->50061 50062 7ff6139af661 free _strdup 50061->50062 50065 7ff6139af68b 50061->50065 50258 7ff6139af63e 50061->50258 50062->50065 50062->50258 50063 7ff6139df580 8 API calls 50064 7ff61399794b 50063->50064 50064->50025 50064->50029 50066 7ff6139af741 free 50065->50066 50067 7ff6139af755 50065->50067 50066->50067 50068 7ff6139af774 50067->50068 50323 7ff6139a8db0 15 API calls 50067->50323 50070 7ff6139af7bf free 50068->50070 50071 7ff6139af81d 50068->50071 50068->50258 50073 7ff6139af7d2 free 50070->50073 50080 7ff6139af881 50071->50080 50324 7ff6139b4480 386 API calls 50071->50324 50081 7ff6139af923 50073->50081 50082 7ff6139af94a 50073->50082 50075 7ff6139af869 50078 7ff6139af870 free 50075->50078 50075->50080 50077 7ff6139af8be free 50077->50073 50077->50258 50078->50258 50080->50077 50325 7ff6139b4480 386 API calls 50080->50325 50081->50082 50326 7ff6139a8db0 15 API calls 50081->50326 50084 7ff6139afa06 free 50082->50084 50086 7ff6139af9ce free 50082->50086 50082->50258 50085 7ff6139af9f5 50084->50085 50088 7ff6139afa3d 50085->50088 50093 7ff6139afa26 50085->50093 50085->50258 50327 7ff6139a8db0 15 API calls 50086->50327 50328 7ff61399bc00 6 API calls 50088->50328 50090 7ff6139afa49 50329 7ff6139d3f20 59 API calls 50090->50329 50092 7ff6139afa62 50092->50093 50092->50258 50093->50093 50121 7ff6139afa2b 50093->50121 50330 7ff61399cb70 free free 50093->50330 50094 7ff6139afcac free 50105 7ff6139afccf 50094->50105 50096 7ff6139afb38 50098 7ff6139afb7f strchr 50096->50098 50114 7ff6139afb51 50096->50114 50097 7ff6139afad0 50331 7ff61399be00 26 API calls 50097->50331 50099 7ff6139afb94 strchr 50098->50099 50098->50114 50103 7ff6139afba7 strchr 50099->50103 50099->50114 50100 7ff6139afdd7 50110 7ff6139afe00 50100->50110 50112 7ff6139afe3b 50100->50112 50101 7ff6139afc8c 50333 7ff6139a5970 19 API calls 50101->50333 50103->50114 50104 7ff6139afd05 50334 7ff6139b2090 strchr strchr strchr malloc memcpy 50104->50334 50105->50100 50105->50104 50106 7ff6139afc05 50106->50101 50106->50114 50108 7ff6139afae5 50332 7ff61399cb70 free free 50108->50332 50336 7ff6139a8db0 15 API calls 50110->50336 50337 7ff6139a8db0 15 API calls 50112->50337 50114->50094 50115 7ff6139afd0d 50117 7ff6139afd20 free 50115->50117 50118 7ff6139afd2b 50115->50118 50115->50258 50119 7ff6139afd7f 50117->50119 50120 7ff6139afd56 50118->50120 50125 7ff6139afd40 memcpy 50118->50125 50124 7ff6139afda3 50119->50124 50335 7ff6139a8db0 15 API calls 50119->50335 50123 7ff6139afd5b strchr 50120->50123 50121->50096 50121->50106 50121->50258 50122 7ff6139afe39 50122->50124 50137 7ff6139b005f 50122->50137 50122->50258 50126 7ff6139afd68 50123->50126 50127 7ff6139afd6b free 50123->50127 50124->50122 50130 7ff6139afc9b 50124->50130 50338 7ff6139ce540 23 API calls 50124->50338 50125->50123 50126->50127 50127->50119 50130->50258 50131 7ff6139b00fa 50134 7ff6139b02f0 calloc 50131->50134 50131->50258 50132 7ff6139b0052 50136 7ff6139ce510 13 API calls 50132->50136 50133 7ff6139b009e 50133->50131 50141 7ff6139b00da free 50133->50141 50144 7ff6139b022e 50133->50144 50138 7ff6139b031f 50134->50138 50134->50258 50135 7ff6139b0158 50341 7ff6139a5970 19 API calls 50135->50341 50136->50130 50137->50133 50137->50135 50146 7ff6139b0171 50137->50146 50164 7ff6139b01cf 50137->50164 50142 7ff6139b1960 25 API calls 50138->50142 50140 7ff6139afeb7 50140->50132 50140->50258 50339 7ff6139ce680 8 API calls 50140->50339 50340 7ff6139a8db0 15 API calls 50141->50340 50145 7ff6139b0333 50142->50145 50144->50131 50148 7ff6139b0252 free 50144->50148 50149 7ff6139b03a0 50145->50149 50158 7ff6139b0367 50145->50158 50145->50258 50154 7ff6139b0212 50146->50154 50146->50164 50151 7ff6139b027d 50148->50151 50156 7ff6139b0270 50148->50156 50152 7ff6139b03ce 50149->50152 50153 7ff6139b03a5 50149->50153 50150 7ff6139aff62 50150->50132 50155 7ff6139aff6a 50150->50155 50151->50156 50157 7ff6139b0290 50151->50157 50347 7ff6139b15a0 7 API calls 50152->50347 50161 7ff6139b1960 25 API calls 50153->50161 50343 7ff6139a5970 19 API calls 50154->50343 50162 7ff6139ce510 13 API calls 50155->50162 50345 7ff6139a8db0 15 API calls 50156->50345 50344 7ff6139a8db0 15 API calls 50157->50344 50158->50158 50165 7ff6139b037f 50158->50165 50179 7ff6139b03cc 50161->50179 50173 7ff6139aff72 50162->50173 50164->50133 50167 7ff6139b01f9 50164->50167 50346 7ff6139b15a0 7 API calls 50165->50346 50342 7ff6139a5970 19 API calls 50167->50342 50171 7ff6139b0388 free 50171->50179 50172 7ff6139b03eb 50176 7ff6139b1960 25 API calls 50172->50176 50172->50179 50172->50258 50173->50137 50174 7ff6139b002f 50173->50174 50175 7ff6139aff9a strstr 50173->50175 50174->50137 50177 7ff6139affb2 50175->50177 50176->50179 50177->50174 50178 7ff6139a8e80 13 API calls 50177->50178 50178->50174 50180 7ff6139b1960 25 API calls 50179->50180 50179->50258 50181 7ff6139b05e0 free free free 50180->50181 50183 7ff6139b061e 50181->50183 50181->50258 50182 7ff6139b07db 50184 7ff6139b0921 50182->50184 50182->50258 50351 7ff6139b7c70 _gmtime64 50182->50351 50183->50182 50186 7ff6139b0681 50183->50186 50191 7ff6139b0765 50183->50191 50183->50258 50313 7ff6139b1a00 50184->50313 50185 7ff6139b07b0 50185->50182 50189 7ff6139b07c4 50185->50189 50185->50258 50348 7ff613999a20 62 API calls 50186->50348 50350 7ff6139b15a0 7 API calls 50189->50350 50190 7ff6139b080d 50195 7ff6139b0813 50190->50195 50209 7ff6139b0829 50190->50209 50191->50185 50192 7ff6139b0784 50191->50192 50196 7ff6139b1960 25 API calls 50191->50196 50197 7ff6139b1960 25 API calls 50192->50197 50192->50258 50352 7ff6139a5970 19 API calls 50195->50352 50196->50192 50197->50185 50198 7ff6139b07d8 50198->50182 50200 7ff6139b092f 50201 7ff6139b0960 50200->50201 50207 7ff6139b0d4c 50200->50207 50200->50258 50203 7ff6139b0cf3 50201->50203 50205 7ff6139b0970 50201->50205 50206 7ff6139b0a57 50201->50206 50202 7ff6139b0756 50202->50191 50362 7ff6139b15a0 7 API calls 50203->50362 50205->50203 50228 7ff6139b097a 50205->50228 50208 7ff6139b0a60 50206->50208 50223 7ff6139b0ad1 50206->50223 50214 7ff6139b1960 25 API calls 50207->50214 50217 7ff6139b0da5 50207->50217 50212 7ff6139b1960 25 API calls 50208->50212 50209->50184 50215 7ff6139a8e80 13 API calls 50209->50215 50209->50258 50210 7ff6139b0d09 50221 7ff6139b1710 62 API calls 50210->50221 50210->50258 50211 7ff6139b074e 50349 7ff613999990 9 API calls 50211->50349 50219 7ff6139b0a70 50212->50219 50214->50217 50225 7ff6139b08f5 50215->50225 50216 7ff6139b0b64 50241 7ff6139b0c41 50216->50241 50256 7ff6139b0b7f 50216->50256 50218 7ff6139b0dd1 50217->50218 50226 7ff6139b1960 25 API calls 50217->50226 50217->50258 50242 7ff6139b0ec1 50218->50242 50218->50258 50270 7ff6139b0df4 50218->50270 50234 7ff6139b1710 62 API calls 50219->50234 50219->50258 50220 7ff6139b1960 25 API calls 50229 7ff6139b06c8 50220->50229 50227 7ff6139b0d2c 50221->50227 50222 7ff6139b09cb 50224 7ff6139b09ef 50222->50224 50222->50258 50354 7ff6139b3f90 28 API calls 50222->50354 50231 7ff6139b1960 25 API calls 50223->50231 50240 7ff6139b0b20 50223->50240 50355 7ff6139b15a0 7 API calls 50224->50355 50353 7ff6139b15a0 7 API calls 50225->50353 50226->50218 50235 7ff6139b0aaf 50227->50235 50236 7ff6139b0d36 50227->50236 50228->50222 50237 7ff6139b1960 25 API calls 50228->50237 50229->50202 50229->50211 50229->50220 50231->50240 50233 7ff6139b1960 25 API calls 50233->50240 50243 7ff6139b0a93 50234->50243 50358 7ff6139ac9a0 17 API calls 50235->50358 50363 7ff6139a5970 19 API calls 50236->50363 50237->50222 50238 7ff6139b09e7 50238->50224 50238->50258 50240->50216 50240->50233 50240->50258 50272 7ff6139b0c25 50241->50272 50359 7ff6139b3f90 28 API calls 50241->50359 50280 7ff6139b0e6c 50242->50280 50364 7ff6139b3f90 28 API calls 50242->50364 50243->50235 50247 7ff6139b0a99 50243->50247 50357 7ff6139a5970 19 API calls 50247->50357 50250 7ff6139b0917 50250->50184 50250->50258 50253 7ff6139b0a05 50253->50258 50259 7ff6139b1710 62 API calls 50253->50259 50254 7ff6139b1081 50372 7ff6139b15a0 7 API calls 50254->50372 50255 7ff6139b0ef7 50264 7ff6139b0f11 50255->50264 50275 7ff6139b0fe8 50255->50275 50260 7ff6139b0bbf strchr 50256->50260 50256->50272 50257 7ff6139b0ac8 50257->50258 50374 7ff6139b51e0 22 API calls 50257->50374 50258->50063 50263 7ff6139b0a33 50259->50263 50265 7ff6139b0bd4 strchr 50260->50265 50279 7ff6139b0bf4 50260->50279 50261 7ff6139b0e37 strchr 50266 7ff6139b0e4c strchr 50261->50266 50261->50280 50267 7ff6139b0a4f 50263->50267 50268 7ff6139b0a39 50263->50268 50269 7ff6139b0f1e 50264->50269 50264->50275 50271 7ff6139b0be7 strchr 50265->50271 50265->50279 50273 7ff6139b0e5f strchr 50266->50273 50266->50280 50373 7ff6139ac9a0 17 API calls 50267->50373 50356 7ff6139a5970 19 API calls 50268->50356 50365 7ff6139b15a0 7 API calls 50269->50365 50270->50261 50270->50280 50271->50279 50360 7ff6139b15a0 7 API calls 50272->50360 50273->50280 50275->50258 50288 7ff6139b0f58 50275->50288 50370 7ff6139b15a0 7 API calls 50275->50370 50276 7ff6139b0c80 50276->50258 50284 7ff6139b1710 62 API calls 50276->50284 50279->50258 50279->50272 50280->50254 50280->50255 50280->50258 50282 7ff6139b1155 50282->50258 50289 7ff6139a5af0 15 API calls 50282->50289 50287 7ff6139b0cd3 50284->50287 50285 7ff6139b0f34 50285->50258 50292 7ff6139b0f45 50285->50292 50293 7ff6139b0f5d 50285->50293 50286 7ff6139b1043 50290 7ff6139b1710 62 API calls 50286->50290 50287->50267 50291 7ff6139b0cdd 50287->50291 50288->50258 50288->50286 50289->50258 50294 7ff6139b1061 50290->50294 50361 7ff6139a5970 19 API calls 50291->50361 50366 7ff6139b15a0 7 API calls 50292->50366 50297 7ff6139b0fa4 50293->50297 50300 7ff6139b1960 25 API calls 50293->50300 50294->50267 50299 7ff6139b106b 50294->50299 50297->50288 50369 7ff6139b15a0 7 API calls 50297->50369 50371 7ff6139a5970 19 API calls 50299->50371 50302 7ff6139b0f75 50300->50302 50302->50288 50367 7ff6139b15a0 7 API calls 50302->50367 50304 7ff6139b0f8c 50304->50297 50368 7ff6139b15a0 7 API calls 50304->50368 50306->50037 50307->50036 50308->50054 50309->50037 50310->50037 50311->50037 50312->50041 50321 7ff6139b1a2b 50313->50321 50314 7ff6139b1ab0 strchr 50316 7ff6139b1ac9 strchr 50314->50316 50314->50321 50315 7ff6139b1d0a 50315->50200 50316->50321 50317 7ff6139b1b18 _strdup 50318 7ff6139b1d29 50317->50318 50317->50321 50318->50315 50319 7ff6139b1d33 free free 50318->50319 50319->50315 50320 7ff6139b1ce4 free 50320->50321 50321->50314 50321->50315 50321->50317 50321->50320 50322 7ff6139b1960 25 API calls 50321->50322 50322->50321 50323->50068 50324->50075 50325->50077 50326->50082 50327->50085 50328->50090 50329->50092 50330->50097 50331->50108 50332->50121 50333->50130 50334->50115 50335->50124 50336->50122 50337->50122 50338->50140 50339->50150 50340->50131 50341->50130 50342->50130 50343->50130 50344->50131 50345->50131 50346->50171 50347->50172 50348->50229 50349->50202 50350->50198 50351->50190 50352->50130 50353->50250 50354->50238 50355->50253 50356->50258 50357->50130 50358->50257 50359->50279 50360->50276 50361->50130 50362->50210 50363->50130 50364->50280 50365->50285 50366->50288 50367->50304 50368->50297 50369->50288 50370->50288 50371->50130 50372->50275 50373->50257 50374->50282
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup$callocmemcpystrstr
                                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                          • API String ID: 2045874074-4264080130
                                          • Opcode ID: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                          • Instruction ID: d13517ff76f44a756270f6fd321e2f4c6b0657c11df82530ec67454abbc2fe4f
                                          • Opcode Fuzzy Hash: 47623950a0bbe64e698ed1ebe928e22b03c269fb12d880581cf83119aadb09f5
                                          • Instruction Fuzzy Hash: E7038F21E08F8285FB548B2598426B927A0BB45FA8F444935CE5FAB79BFF3CE455C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupstrncmpstrtol
                                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                          • API String ID: 707411602-3372543188
                                          • Opcode ID: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                          • Instruction ID: 8df4e40ec42edae116220959796813c648b5a4594ddf235fec7364e0ea3dd26e
                                          • Opcode Fuzzy Hash: d89aac1099c6e6052993711684499b2b5f7c8b83f93c3e0272dea94e26d5bd3d
                                          • Instruction Fuzzy Hash: FB42B121A08F4285FB148B16E852AB927A4FF45FA5F408935CA5FAB796FF3CE544C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 870 7ff613991530-7ff61399157c rand 871 7ff613991583-7ff61399158a 870->871 871->871 872 7ff61399158c-7ff6139915be call 7ff613990580 rand 871->872 875 7ff6139915c0 872->875 876 7ff613991633-7ff61399164f SetConsoleTitleA 872->876 879 7ff6139915c2-7ff6139915f7 rand 875->879 877 7ff613991651-7ff613991662 876->877 878 7ff613991685-7ff613991700 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff613982aa0 876->878 880 7ff613991680 call 7ff6139df22c 877->880 881 7ff613991664-7ff613991677 877->881 889 7ff613991705-7ff613991907 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 GetStdHandle SetConsoleTextAttribute call 7ff613991a70 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 878->889 883 7ff613991619-7ff613991624 call 7ff613990680 879->883 884 7ff6139915f9-7ff613991617 879->884 880->878 881->880 887 7ff613991679-7ff61399167f _invalid_parameter_noinfo_noreturn 881->887 885 7ff613991629-7ff61399162d 883->885 884->885 885->879 890 7ff61399162f 885->890 887->880 923 7ff613991982-7ff613991985 889->923 924 7ff613991909-7ff613991981 call 7ff613983d30 * 2 call 7ff613983b10 * 2 URLDownloadToFileA system * 2 Sleep exit 889->924 890->876 925 7ff613991a00-7ff613991a08 923->925 926 7ff613991987-7ff6139919ff call 7ff613983d30 * 2 call 7ff613983b10 * 2 URLDownloadToFileA system * 2 Sleep exit 923->926 924->923 928 7ff613991a3e-7ff613991a60 call 7ff6139df580 925->928 929 7ff613991a0a-7ff613991a1b 925->929 926->925 933 7ff613991a39 call 7ff6139df22c 929->933 934 7ff613991a1d-7ff613991a30 929->934 933->928 934->933 938 7ff613991a32-7ff613991a38 _invalid_parameter_noinfo_noreturn 934->938 938->933
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                          • String ID: Iniciar Valorant Aim (HVCI DESLIGADO): $ Iniciar Valorant Aim (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SeiebingsHosDialog.exe$C:\Windows\System32\SerceubetisHostDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/aimhvcibronkzops.exe$http://185.101.104.122/aimhvciforabronkz.exe$start C:\Windows\System32\SeiebingsHosDialog.exe$start C:\Windows\System32\SerceubetisHostDialog.exe
                                          • API String ID: 2233566951-1582246269
                                          • Opcode ID: 9b615ab752b1db17b677d3e1e2d8fecd8b19d909079fd881a550ae344e632734
                                          • Instruction ID: 8178462e3247dde861513908240b863dadb9e471238b6747a8ba24590657e36b
                                          • Opcode Fuzzy Hash: 9b615ab752b1db17b677d3e1e2d8fecd8b19d909079fd881a550ae344e632734
                                          • Instruction Fuzzy Hash: F7E133A1E08E4386EB009B62E8565FC2365BF85FA4F444A35D51FE66F6FE2CD589C300

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 951 7ff6139a8980-7ff6139a899c 952 7ff6139a899e-7ff6139a89b0 WSAStartup 951->952 953 7ff6139a89e6-7ff6139a89ed call 7ff6139d2480 951->953 955 7ff6139a89b2-7ff6139a89b9 952->955 956 7ff6139a89c9-7ff6139a89e5 call 7ff6139df580 952->956 962 7ff6139a8caf-7ff6139a8cc6 call 7ff6139df580 953->962 963 7ff6139a89f3-7ff6139a8a20 GetModuleHandleA 953->963 957 7ff6139a89c3 WSACleanup 955->957 958 7ff6139a89bb-7ff6139a89c1 955->958 957->956 958->953 958->957 965 7ff6139a8a2e-7ff6139a8a63 GetProcAddress strpbrk 963->965 966 7ff6139a8a22-7ff6139a8a29 963->966 969 7ff6139a8a65-7ff6139a8a6b 965->969 970 7ff6139a8a8b-7ff6139a8a8e 965->970 968 7ff6139a8bb3-7ff6139a8ca7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 966->968 968->962 973 7ff6139a8a7d-7ff6139a8a86 LoadLibraryA 969->973 974 7ff6139a8a6d-7ff6139a8a78 969->974 971 7ff6139a8a90-7ff6139a8aa3 GetProcAddress 970->971 972 7ff6139a8aba-7ff6139a8ad1 GetSystemDirectoryA 970->972 971->972 976 7ff6139a8aa5-7ff6139a8ab5 LoadLibraryExA 971->976 977 7ff6139a8b72 972->977 978 7ff6139a8ad7-7ff6139a8aea malloc 972->978 975 7ff6139a8b7a-7ff6139a8b8c 973->975 974->975 975->968 979 7ff6139a8b8e-7ff6139a8bac GetProcAddress 975->979 976->975 977->975 980 7ff6139a8b69-7ff6139a8b6c free 978->980 981 7ff6139a8aec-7ff6139a8afa GetSystemDirectoryA 978->981 979->968 980->977 981->980 983 7ff6139a8afc-7ff6139a8b06 981->983 984 7ff6139a8b10-7ff6139a8b19 983->984 984->984 985 7ff6139a8b1b-7ff6139a8b20 984->985 986 7ff6139a8b24-7ff6139a8b2b 985->986 986->986 987 7ff6139a8b2d-7ff6139a8b36 986->987 988 7ff6139a8b40-7ff6139a8b4c 987->988 988->988 989 7ff6139a8b4e-7ff6139a8b54 988->989 990 7ff6139a8b60 LoadLibraryA 989->990 991 7ff6139a8b56-7ff6139a8b5e 989->991 992 7ff6139a8b66 990->992 991->992 992->980
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                          • API String ID: 2612373469-2794540096
                                          • Opcode ID: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                          • Instruction ID: 99e7e6cb76bf6f1df694dd7ac05f9d2f2f2ff9289157e38bdb26c4a43d5cc5f1
                                          • Opcode Fuzzy Hash: 372a1b11eae873ffce80445b4ce260fa558d07d99fefe9c51babf47caa90135e
                                          • Instruction Fuzzy Hash: 56918365E0DF8285E7608B11E4063BA7B91FF88FA4F444A35D94F9A766FF3CE4458600

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1248 7ff6139a7cc0-7ff6139a7d2d 1249 7ff6139a7d2f 1248->1249 1250 7ff6139a7d32-7ff6139a7d42 1248->1250 1249->1250 1251 7ff6139a7d51-7ff6139a7d69 memcpy 1250->1251 1252 7ff6139a7d44-7ff6139a7d4c 1250->1252 1253 7ff6139a7d98-7ff6139a7dab socket 1251->1253 1254 7ff6139a7d6b-7ff6139a7d96 call 7ff613996290 * 2 1251->1254 1252->1251 1256 7ff6139a7dae-7ff6139a7dba 1253->1256 1254->1256 1258 7ff6139a824f 1256->1258 1259 7ff6139a7dc0-7ff6139a7dc8 1256->1259 1260 7ff6139a8254-7ff6139a827d call 7ff6139df580 1258->1260 1261 7ff6139a7dd7-7ff6139a7de0 1259->1261 1262 7ff6139a7dca-7ff6139a7dd2 call 7ff6139b4c90 1259->1262 1266 7ff6139a7df0-7ff6139a7df9 1261->1266 1267 7ff6139a7de2-7ff6139a7ded 1261->1267 1262->1261 1270 7ff6139a7dfb-7ff6139a7dfe 1266->1270 1271 7ff6139a7e0c-7ff6139a7e10 1266->1271 1267->1266 1272 7ff6139a7e04-7ff6139a7e0a 1270->1272 1273 7ff6139a81fa-7ff6139a824d _errno * 3 call 7ff613992500 call 7ff6139a5970 call 7ff6139a65d0 1270->1273 1274 7ff6139a7e15-7ff6139a7e27 call 7ff6139d11c0 1271->1274 1272->1274 1273->1260 1274->1273 1280 7ff6139a7e2d-7ff6139a7e55 htons call 7ff6139a5af0 1274->1280 1287 7ff6139a7e57-7ff6139a7e5a 1280->1287 1288 7ff6139a7e5c-7ff6139a7e61 1280->1288 1287->1288 1289 7ff6139a7ece 1287->1289 1288->1289 1290 7ff6139a7e63-7ff6139a7e6d 1288->1290 1291 7ff6139a7ed1-7ff6139a7eed 1289->1291 1290->1291 1292 7ff6139a7e6f-7ff6139a7e9b setsockopt 1290->1292 1293 7ff6139a7eef-7ff6139a7f03 call 7ff6139a8800 1291->1293 1294 7ff6139a7f1d-7ff6139a7f20 1291->1294 1295 7ff6139a7ec9-7ff6139a7ecc 1292->1295 1296 7ff6139a7e9d-7ff6139a7ec4 WSAGetLastError call 7ff613992500 call 7ff6139a5af0 1292->1296 1307 7ff6139a7f11-7ff6139a7f1b 1293->1307 1308 7ff6139a7f05-7ff6139a7f0f 1293->1308 1298 7ff6139a7f22-7ff6139a7f47 getsockopt 1294->1298 1299 7ff6139a7f74-7ff6139a7f77 1294->1299 1295->1291 1296->1295 1302 7ff6139a7f53-7ff6139a7f6e setsockopt 1298->1302 1303 7ff6139a7f49-7ff6139a7f51 1298->1303 1304 7ff6139a805f-7ff6139a8066 1299->1304 1305 7ff6139a7f7d-7ff6139a7f84 1299->1305 1302->1299 1303->1299 1303->1302 1309 7ff6139a8068-7ff6139a8095 call 7ff613996290 * 2 1304->1309 1310 7ff6139a809a-7ff6139a80a1 1304->1310 1305->1304 1311 7ff6139a7f8a-7ff6139a7fb5 setsockopt 1305->1311 1307->1298 1308->1299 1339 7ff6139a80e5-7ff6139a80e7 1309->1339 1340 7ff6139a8097 1309->1340 1313 7ff6139a80a3-7ff6139a80a6 1310->1313 1314 7ff6139a80a8-7ff6139a80c8 call 7ff6139d1130 call 7ff6139a7630 1310->1314 1316 7ff6139a7fce-7ff6139a8042 call 7ff6139a8370 * 2 WSAIoctl 1311->1316 1317 7ff6139a7fb7-7ff6139a7fc9 call 7ff6139a5af0 1311->1317 1313->1314 1320 7ff6139a80fe-7ff6139a8128 call 7ff6139b4c90 call 7ff6139ad7b0 1313->1320 1314->1320 1338 7ff6139a80ca-7ff6139a80d8 call 7ff6139a65d0 1314->1338 1316->1304 1337 7ff6139a8044-7ff6139a805a WSAGetLastError call 7ff6139a5af0 1316->1337 1317->1304 1341 7ff6139a813f-7ff6139a8142 1320->1341 1342 7ff6139a812a-7ff6139a813a call 7ff6139957f0 1320->1342 1337->1304 1338->1258 1351 7ff6139a80de-7ff6139a80e0 1338->1351 1339->1310 1349 7ff6139a80e9-7ff6139a80f9 call 7ff6139a65d0 1339->1349 1340->1310 1346 7ff6139a81ef-7ff6139a81f8 1341->1346 1347 7ff6139a8148-7ff6139a8150 1341->1347 1342->1341 1346->1260 1347->1346 1350 7ff6139a8156-7ff6139a815d 1347->1350 1349->1260 1354 7ff6139a815f-7ff6139a8174 connect 1350->1354 1355 7ff6139a8188-7ff6139a8193 WSAGetLastError 1350->1355 1351->1260 1354->1355 1356 7ff6139a8176-7ff6139a8178 1354->1356 1357 7ff6139a8195-7ff6139a819e 1355->1357 1358 7ff6139a81e2-7ff6139a81e4 1355->1358 1360 7ff6139a81eb-7ff6139a81ed 1356->1360 1361 7ff6139a817a-7ff6139a8183 1356->1361 1357->1358 1359 7ff6139a81a0-7ff6139a81e0 call 7ff613992500 call 7ff6139a5af0 call 7ff6139a65d0 1357->1359 1358->1360 1359->1260 1360->1260 1361->1260
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                          • API String ID: 3453287622-3868455274
                                          • Opcode ID: a2329d31af6ccdedd8291ba3b20cb9468dd4f4060951aad07901af01d56ef692
                                          • Instruction ID: e9b5d99048e4389ccb8d99e4c791ddf5d8af0503771182a89c72edc3df452b2d
                                          • Opcode Fuzzy Hash: a2329d31af6ccdedd8291ba3b20cb9468dd4f4060951aad07901af01d56ef692
                                          • Instruction Fuzzy Hash: 40F1A172E0CA4286E7509B25D4422BD7790FB44FA4F404A35DA4FABAA6EF3CE545CB00

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,?,00007FF6139D24BA,?,?,?,?,00007FF6139A89EB), ref: 00007FF6139A8674
                                          • GetProcAddress.KERNEL32(?,?,00007FF6139D24BA,?,?,?,?,00007FF6139A89EB), ref: 00007FF6139A8699
                                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF6139D24BA,?,?,?,?,00007FF6139A89EB), ref: 00007FF6139A86AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProcstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 27745253-3327535076
                                          • Opcode ID: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                          • Instruction ID: a4a02cf2c9e079d53291a170889fb34cf30fc50d71a81f40da1ad6abe6ada575
                                          • Opcode Fuzzy Hash: 230c0ed0a1b2d880a65c49ba9e4704915758f5ad6352508eade00287004d952d
                                          • Instruction Fuzzy Hash: ED418056F0DF5286EB558B16A4011796B91BF49FF1B084A34CE4E9A7A2FE3CE486C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1905 7ff6139b4a60-7ff6139b4aae socket 1906 7ff6139b4ab0 1905->1906 1907 7ff6139b4ab5-7ff6139b4b0e htonl setsockopt 1905->1907 1908 7ff6139b4c64-7ff6139b4c82 call 7ff6139df580 1906->1908 1909 7ff6139b4b14-7ff6139b4b29 bind 1907->1909 1910 7ff6139b4c3b-7ff6139b4c57 closesocket * 3 1907->1910 1909->1910 1913 7ff6139b4b2f-7ff6139b4b45 getsockname 1909->1913 1911 7ff6139b4c5c 1910->1911 1911->1908 1913->1910 1915 7ff6139b4b4b-7ff6139b4b5a listen 1913->1915 1915->1910 1916 7ff6139b4b60-7ff6139b4b75 socket 1915->1916 1916->1910 1917 7ff6139b4b7b-7ff6139b4b90 connect 1916->1917 1917->1910 1918 7ff6139b4b96-7ff6139b4bac accept 1917->1918 1918->1910 1919 7ff6139b4bb2-7ff6139b4bce call 7ff6139a8e80 1918->1919 1922 7ff6139b4bd5-7ff6139b4bdc 1919->1922 1922->1922 1923 7ff6139b4bde-7ff6139b4bf8 send 1922->1923 1923->1910 1924 7ff6139b4bfa-7ff6139b4c16 recv 1923->1924 1924->1910 1925 7ff6139b4c18-7ff6139b4c2c memcmp 1924->1925 1925->1910 1926 7ff6139b4c2e-7ff6139b4c39 closesocket 1925->1926 1926->1911
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                          • String ID:
                                          • API String ID: 3699910901-0
                                          • Opcode ID: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                          • Instruction ID: b5f91e2fcfd8e2e84646fef20f7c0428ddb93bd9bfdea00558ad6a156196a948
                                          • Opcode Fuzzy Hash: 6e6282c668dcfc894862906e82aaace15aa8d0c260b38d1dd148d6634827d9ca
                                          • Instruction Fuzzy Hash: 5D515D72608F4682E7509B26E4455A97361FB84FB4F504B30EA7B977EAEF3CD4458B00

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1927 7ff6139a6980-7ff6139a69cd 1928 7ff6139a69cf-7ff6139a69d3 1927->1928 1929 7ff6139a69d8-7ff6139a6a13 call 7ff6139ad7b0 1927->1929 1930 7ff6139a6ef6-7ff6139a6f14 call 7ff6139df580 1928->1930 1935 7ff6139a6a15 1929->1935 1936 7ff6139a6a18-7ff6139a6a1b 1929->1936 1935->1936 1937 7ff6139a6a38 1936->1937 1938 7ff6139a6a1d-7ff6139a6a20 1936->1938 1941 7ff6139a6a3b-7ff6139a6a67 call 7ff6139ad840 1937->1941 1939 7ff6139a6a33-7ff6139a6a36 1938->1939 1940 7ff6139a6a22-7ff6139a6a25 1938->1940 1939->1941 1940->1941 1942 7ff6139a6a27-7ff6139a6a31 1940->1942 1945 7ff6139a6a82-7ff6139a6a8a 1941->1945 1946 7ff6139a6a69-7ff6139a6a7d call 7ff6139a5970 1941->1946 1942->1941 1948 7ff6139a6ab9-7ff6139a6ad7 1945->1948 1949 7ff6139a6a8c-7ff6139a6a9e call 7ff6139a7b50 1945->1949 1953 7ff6139a6ee6-7ff6139a6eee 1946->1953 1952 7ff6139a6ae0-7ff6139a6af5 1948->1952 1958 7ff6139a6aa0-7ff6139a6aa2 1949->1958 1959 7ff6139a6ab2-7ff6139a6ab4 1949->1959 1955 7ff6139a6afb-7ff6139a6b0f call 7ff6139b5fe0 1952->1955 1956 7ff6139a6d7a 1952->1956 1953->1930 1964 7ff6139a6c90-7ff6139a6c93 1955->1964 1965 7ff6139a6b15-7ff6139a6b40 call 7ff6139ad840 1955->1965 1957 7ff6139a6d7e-7ff6139a6d8f 1956->1957 1957->1952 1961 7ff6139a6d95-7ff6139a6d97 1957->1961 1958->1959 1962 7ff6139a6aa4-7ff6139a6aad call 7ff6139a7c60 1958->1962 1959->1953 1966 7ff6139a6d9d-7ff6139a6db4 call 7ff6139a8280 1961->1966 1967 7ff6139a6edc 1961->1967 1962->1959 1969 7ff6139a6c95-7ff6139a6c9c 1964->1969 1970 7ff6139a6d04-7ff6139a6d4a SleepEx getsockopt 1964->1970 1981 7ff6139a6b42-7ff6139a6b54 call 7ff6139a5af0 1965->1981 1982 7ff6139a6b59-7ff6139a6b5c 1965->1982 1983 7ff6139a6e67-7ff6139a6e69 1966->1983 1984 7ff6139a6dba-7ff6139a6dc1 1966->1984 1973 7ff6139a6ede 1967->1973 1969->1970 1974 7ff6139a6c9e-7ff6139a6ca0 1969->1974 1977 7ff6139a6d56 1970->1977 1978 7ff6139a6d4c-7ff6139a6d54 WSAGetLastError 1970->1978 1973->1953 1979 7ff6139a6baf-7ff6139a6bb1 1974->1979 1980 7ff6139a6ca6-7ff6139a6cec SleepEx getsockopt 1974->1980 1985 7ff6139a6d5a-7ff6139a6d5c 1977->1985 1978->1985 1979->1956 1995 7ff6139a6bb7-7ff6139a6bcc WSASetLastError 1979->1995 1986 7ff6139a6cee-7ff6139a6cf6 WSAGetLastError 1980->1986 1987 7ff6139a6cfb-7ff6139a6cff 1980->1987 1981->1982 1991 7ff6139a6b5e-7ff6139a6b65 1982->1991 1992 7ff6139a6bab 1982->1992 1983->1973 1989 7ff6139a6dc7-7ff6139a6dce 1984->1989 1990 7ff6139a6e6b-7ff6139a6e72 1984->1990 1993 7ff6139a6d5e-7ff6139a6d64 1985->1993 1994 7ff6139a6dd3-7ff6139a6e21 1985->1994 1986->1979 1987->1979 2000 7ff6139a6e96-7ff6139a6ed9 call 7ff613992500 call 7ff6139a5970 1989->2000 1997 7ff6139a6e74-7ff6139a6e7b 1990->1997 1998 7ff6139a6e7d-7ff6139a6e84 1990->1998 1991->1992 2001 7ff6139a6b67-7ff6139a6b93 call 7ff6139ad840 1991->2001 1992->1979 1993->1994 2004 7ff6139a6d66-7ff6139a6d75 call 7ff6139a5af0 1993->2004 2002 7ff6139a6e23-7ff6139a6e2b call 7ff6139a65d0 1994->2002 2003 7ff6139a6e36-7ff6139a6e4b call 7ff6139a7b50 1994->2003 1995->1956 1996 7ff6139a6bd2-7ff6139a6c3c call 7ff6139aeba0 call 7ff613992500 call 7ff6139a5af0 1995->1996 2030 7ff6139a6c5e-7ff6139a6c74 call 7ff6139a8280 1996->2030 2031 7ff6139a6c3e-7ff6139a6c45 1996->2031 1997->2000 2006 7ff6139a6e8f 1998->2006 2007 7ff6139a6e86-7ff6139a6e8d 1998->2007 2000->1967 2001->1992 2021 7ff6139a6b95-7ff6139a6ba6 call 7ff6139a8280 2001->2021 2002->2003 2003->1973 2022 7ff6139a6e51-7ff6139a6e53 2003->2022 2004->1956 2006->2000 2007->2000 2021->1992 2022->1973 2026 7ff6139a6e59-7ff6139a6e62 call 7ff6139a7c60 2022->2026 2026->1983 2037 7ff6139a6c87-7ff6139a6c8b 2030->2037 2038 7ff6139a6c76-7ff6139a6c81 2030->2038 2031->2030 2032 7ff6139a6c47-7ff6139a6c4e 2031->2032 2034 7ff6139a6c50-7ff6139a6c53 2032->2034 2034->2030 2036 7ff6139a6c55-7ff6139a6c5c 2034->2036 2036->2030 2036->2034 2037->1957 2038->1956 2038->2037
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                          • API String ID: 0-3307081561
                                          • Opcode ID: e2eedc7052c941d1432b2a018d79d9ac4f8581cfbb25bdcbeb98e85e99d6e6c7
                                          • Instruction ID: c1fd38732fcaaa9465f7e74730e9ed035be958c9d77d7874689552f7b8facc71
                                          • Opcode Fuzzy Hash: e2eedc7052c941d1432b2a018d79d9ac4f8581cfbb25bdcbeb98e85e99d6e6c7
                                          • Instruction Fuzzy Hash: 5DE1C062F08A8282EB148B25D5462B977A1FB85BB4F044735DA5FA77E2EF3CE451C340

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 994 7ff613982aa0-7ff613982aef call 7ff613982840 997 7ff6139830a8-7ff613983117 call 7ff613983120 Sleep exit 994->997 998 7ff613982af5-7ff613982afa 994->998 1003 7ff613983118-7ff61398311f call 7ff6139819f0 997->1003 998->997 1000 7ff613982b00-7ff613982c1e call 7ff613983160 call 7ff613983c30 call 7ff6139832d0 call 7ff613983c30 call 7ff6139833d0 call 7ff613983c30 998->1000 1017 7ff613982c54-7ff613982c6d 1000->1017 1018 7ff613982c20-7ff613982c31 1000->1018 1021 7ff613982ca5-7ff613982cad 1017->1021 1022 7ff613982c6f-7ff613982c81 1017->1022 1019 7ff613982c33-7ff613982c46 1018->1019 1020 7ff613982c4f call 7ff6139df22c 1018->1020 1019->1020 1025 7ff613982c48-7ff613982c4e _invalid_parameter_noinfo_noreturn 1019->1025 1020->1017 1023 7ff613982ce3-7ff613982cfb 1021->1023 1024 7ff613982caf-7ff613982cc0 1021->1024 1027 7ff613982c83-7ff613982c96 1022->1027 1028 7ff613982c9f-7ff613982ca4 call 7ff6139df22c 1022->1028 1031 7ff613982cfd-7ff613982d0e 1023->1031 1032 7ff613982d32-7ff613982d3a 1023->1032 1029 7ff613982cc2-7ff613982cd5 1024->1029 1030 7ff613982cde call 7ff6139df22c 1024->1030 1025->1020 1027->1028 1033 7ff613982c98-7ff613982c9e _invalid_parameter_noinfo_noreturn 1027->1033 1028->1021 1029->1030 1035 7ff613982cd7-7ff613982cdd _invalid_parameter_noinfo_noreturn 1029->1035 1030->1023 1037 7ff613982d2c-7ff613982d31 call 7ff6139df22c 1031->1037 1038 7ff613982d10-7ff613982d23 1031->1038 1039 7ff613982d3c-7ff613982d4d 1032->1039 1040 7ff613982d70-7ff613982db7 1032->1040 1033->1028 1035->1030 1037->1032 1038->1037 1044 7ff613982d25-7ff613982d2b _invalid_parameter_noinfo_noreturn 1038->1044 1046 7ff613982d6b call 7ff6139df22c 1039->1046 1047 7ff613982d4f-7ff613982d62 1039->1047 1042 7ff613982db9-7ff613982dc6 1040->1042 1043 7ff613982dc8-7ff613982deb 1040->1043 1050 7ff613982e42-7ff613982e5b call 7ff613983550 call 7ff613982840 1042->1050 1051 7ff613982ded-7ff613982df4 1043->1051 1052 7ff613982e1f-7ff613982e22 1043->1052 1044->1037 1046->1040 1047->1046 1048 7ff613982d64-7ff613982d6a _invalid_parameter_noinfo_noreturn 1047->1048 1048->1046 1065 7ff613982e60-7ff613982e98 call 7ff613984bd0 call 7ff6139848c0 1050->1065 1051->1003 1055 7ff613982dfa-7ff613982e08 call 7ff6139df1f0 1051->1055 1056 7ff613982e2b 1052->1056 1057 7ff613982e24-7ff613982e29 call 7ff6139df1f0 1052->1057 1066 7ff613982e0a-7ff613982e16 1055->1066 1067 7ff613982e18-7ff613982e1e _invalid_parameter_noinfo_noreturn 1055->1067 1058 7ff613982e2e-7ff613982e3d memcpy 1056->1058 1057->1058 1058->1050 1072 7ff613982fa3-7ff613983013 call 7ff6139848c0 call 7ff6139df1f0 call 7ff613984310 call 7ff613985a00 call 7ff613983e50 1065->1072 1073 7ff613982e9e-7ff613982ead call 7ff6139848c0 1065->1073 1066->1058 1067->1052 1097 7ff613983015-7ff613983060 call 7ff6139848c0 call 7ff6139849a0 call 7ff613983b10 ShellExecuteA exit 1072->1097 1098 7ff613983061-7ff6139830a7 call 7ff6139848c0 call 7ff613984d00 call 7ff613983b10 MessageBoxA call 7ff613983cd0 exit 1072->1098 1079 7ff613982eb5 1073->1079 1080 7ff613982eaf-7ff613982eb3 1073->1080 1081 7ff613982eb8-7ff613982ec1 1079->1081 1080->1081 1083 7ff613982ec6-7ff613982ee9 call 7ff613984310 call 7ff613983e50 1081->1083 1084 7ff613982ec3 1081->1084 1094 7ff613982eeb-7ff613982efc 1083->1094 1095 7ff613982f1f-7ff613982f33 1083->1095 1084->1083 1099 7ff613982f1a call 7ff6139df22c 1094->1099 1100 7ff613982efe-7ff613982f11 1094->1100 1101 7ff613982f69-7ff613982fa2 call 7ff6139df580 1095->1101 1102 7ff613982f35-7ff613982f43 1095->1102 1097->1098 1098->997 1099->1095 1100->1099 1106 7ff613982f13-7ff613982f19 _invalid_parameter_noinfo_noreturn 1100->1106 1108 7ff613982f45-7ff613982f58 1102->1108 1109 7ff613982f61-7ff613982f64 call 7ff6139df22c 1102->1109 1106->1099 1108->1109 1114 7ff613982f5a-7ff613982f60 _invalid_parameter_noinfo_noreturn 1108->1114 1109->1101 1114->1109
                                          APIs
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139828A7
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982917
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982977
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139829C7
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982A17
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982C48
                                            • Part of subcall function 00007FF6139848C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613984980
                                            • Part of subcall function 00007FF6139DF1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6139843EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF6139DF20A
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982C98
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982CD7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982D25
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982D64
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982E18
                                          • memcpy.VCRUNTIME140 ref: 00007FF613982E3D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982F13
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982F5A
                                          • ShellExecuteA.SHELL32 ref: 00007FF613983052
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398305A
                                          • MessageBoxA.USER32 ref: 00007FF613983090
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139830A1
                                          • Sleep.KERNEL32 ref: 00007FF613983109
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613983111
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF613983118
                                            • Part of subcall function 00007FF613983160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398326F
                                            • Part of subcall function 00007FF613983160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139832B0
                                            • Part of subcall function 00007FF613983C30: memcpy.VCRUNTIME140 ref: 00007FF613983C83
                                            • Part of subcall function 00007FF6139832D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139833B0
                                            • Part of subcall function 00007FF6139833D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139834B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                          • String ID: Failure$download$invalidver$message$open$sessionid$success
                                          • API String ID: 3283070336-3881042241
                                          • Opcode ID: 1e7466b00c29e06c08f4ea5f87bbe137f5503f3082a7dc0f4c96e7eef9db421e
                                          • Instruction ID: e0a62c8ffe61a6d1d47db7eb5b51c71723b26ad9a05b9ba05b7f1f1a910e6a6c
                                          • Opcode Fuzzy Hash: 1e7466b00c29e06c08f4ea5f87bbe137f5503f3082a7dc0f4c96e7eef9db421e
                                          • Instruction Fuzzy Hash: E602F762A08F8685EB009B64D4463AD2761FF85BB4F405A75DA9E67AD7EF3CD084D300

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1125 7ff6139bb5c0-7ff6139bb63d 1126 7ff6139bb63f-7ff6139bb643 1125->1126 1127 7ff6139bb65e-7ff6139bb663 1125->1127 1126->1127 1128 7ff6139bb645-7ff6139bb659 call 7ff6139a5af0 1126->1128 1129 7ff6139bb665-7ff6139bb67d call 7ff6139a5af0 1127->1129 1130 7ff6139bb682-7ff6139bb686 1127->1130 1143 7ff6139bbaac-7ff6139bbab9 1128->1143 1140 7ff6139bbaa3-7ff6139bbaa6 1129->1140 1131 7ff6139bb6a1-7ff6139bb6a4 1130->1131 1132 7ff6139bb688-7ff6139bb69c call 7ff6139a5af0 1130->1132 1137 7ff6139bb9ba 1131->1137 1138 7ff6139bb6aa-7ff6139bb6ae 1131->1138 1132->1140 1144 7ff6139bb9c2-7ff6139bb9ca 1137->1144 1138->1137 1142 7ff6139bb6b4-7ff6139bb6c9 1138->1142 1140->1143 1147 7ff6139bbbc5-7ff6139bbbcb 1140->1147 1145 7ff6139bb6d0-7ff6139bb6fb realloc 1142->1145 1146 7ff6139bb6cb-7ff6139bb6ce 1142->1146 1143->1147 1148 7ff6139bbabf-7ff6139bbac3 1143->1148 1150 7ff6139bb9ce 1144->1150 1154 7ff6139bb71e-7ff6139bb74b 1145->1154 1155 7ff6139bb6fd-7ff6139bb719 call 7ff6139a5970 1145->1155 1146->1145 1153 7ff6139bb74d-7ff6139bb762 call 7ff6139a5cf0 1146->1153 1151 7ff6139bbbdd-7ff6139bbbf3 1147->1151 1152 7ff6139bbbcd-7ff6139bbbd0 1147->1152 1148->1147 1149 7ff6139bbac9-7ff6139bbacd 1148->1149 1149->1147 1156 7ff6139bbad3-7ff6139bbae8 call 7ff6139a8800 1149->1156 1157 7ff6139bb9d6-7ff6139bb9dc 1150->1157 1159 7ff6139bbbf5-7ff6139bbc39 memcpy * 2 1151->1159 1160 7ff6139bbc3b-7ff6139bbc41 1151->1160 1152->1151 1158 7ff6139bbbd2-7ff6139bbbda 1152->1158 1163 7ff6139bb767-7ff6139bb76d 1153->1163 1154->1153 1155->1143 1185 7ff6139bbbae-7ff6139bbbc0 call 7ff6139a5af0 1156->1185 1186 7ff6139bbaee-7ff6139bbaf0 1156->1186 1165 7ff6139bba72-7ff6139bba78 1157->1165 1166 7ff6139bb9e2-7ff6139bb9f7 call 7ff6139a5af0 1157->1166 1158->1151 1167 7ff6139bbc65-7ff6139bbc87 call 7ff6139df580 1159->1167 1169 7ff6139bbc55-7ff6139bbc58 1160->1169 1170 7ff6139bbc43-7ff6139bbc46 1160->1170 1173 7ff6139bb773-7ff6139bb77f 1163->1173 1174 7ff6139bb972-7ff6139bb97a 1163->1174 1177 7ff6139bb7a0-7ff6139bb7af 1165->1177 1178 7ff6139bba7e-7ff6139bba8e 1165->1178 1198 7ff6139bba02-7ff6139bba12 1166->1198 1199 7ff6139bb9f9-7ff6139bb9fc 1166->1199 1171 7ff6139bbc60-7ff6139bbc62 1169->1171 1172 7ff6139bbc5a-7ff6139bbc5e 1169->1172 1170->1169 1180 7ff6139bbc48-7ff6139bbc50 1170->1180 1171->1167 1172->1171 1181 7ff6139bb781-7ff6139bb787 1173->1181 1182 7ff6139bb799-7ff6139bb79e 1173->1182 1183 7ff6139bb992 1174->1183 1184 7ff6139bb97c-7ff6139bb98d 1174->1184 1177->1140 1188 7ff6139bb7b5-7ff6139bb7b7 1177->1188 1178->1140 1189 7ff6139bba90-7ff6139bba94 1178->1189 1180->1169 1191 7ff6139bb95e-7ff6139bb96d call 7ff6139a5af0 1181->1191 1192 7ff6139bb78d-7ff6139bb794 call 7ff6139a5af0 1181->1192 1182->1177 1183->1182 1193 7ff6139bb998-7ff6139bb9b5 1183->1193 1184->1177 1185->1147 1186->1185 1194 7ff6139bbaf6-7ff6139bbb02 1186->1194 1188->1140 1196 7ff6139bb7bd-7ff6139bb7c0 1188->1196 1197 7ff6139bba9b 1189->1197 1191->1182 1192->1182 1193->1177 1194->1147 1201 7ff6139bb7d2-7ff6139bb850 call 7ff6139a83c0 1196->1201 1202 7ff6139bb7c2-7ff6139bb7c6 1196->1202 1203 7ff6139bba9e call 7ff6139a5af0 1197->1203 1206 7ff6139bba18-7ff6139bba59 call 7ff6139a5af0 call 7ff6139b9a80 1198->1206 1207 7ff6139bbb9a-7ff6139bbba9 1198->1207 1199->1198 1204 7ff6139bbb82-7ff6139bbb89 1199->1204 1218 7ff6139bb864-7ff6139bb869 1201->1218 1219 7ff6139bb852-7ff6139bb857 1201->1219 1202->1201 1210 7ff6139bb7c8-7ff6139bb7cc 1202->1210 1203->1140 1204->1197 1220 7ff6139bba5f-7ff6139bba6d call 7ff6139a5af0 1206->1220 1221 7ff6139bbb8e-7ff6139bbb95 1206->1221 1207->1203 1210->1140 1210->1201 1223 7ff6139bb86f-7ff6139bb899 1218->1223 1224 7ff6139bb90e-7ff6139bb912 1218->1224 1219->1218 1222 7ff6139bb859-7ff6139bb85e 1219->1222 1220->1177 1221->1203 1222->1218 1226 7ff6139bbb07-7ff6139bbb0d 1222->1226 1227 7ff6139bb8a0-7ff6139bb8bb realloc 1223->1227 1228 7ff6139bb89b-7ff6139bb89e 1223->1228 1224->1144 1230 7ff6139bb918-7ff6139bb91d 1224->1230 1234 7ff6139bbb0f-7ff6139bbb20 1226->1234 1235 7ff6139bbb36-7ff6139bbb61 call 7ff613991d10 call 7ff6139a5af0 1226->1235 1232 7ff6139bb8c1-7ff6139bb8e1 1227->1232 1233 7ff6139bbb66-7ff6139bbb7d call 7ff6139a5970 1227->1233 1228->1227 1231 7ff6139bb8e5-7ff6139bb8e9 1228->1231 1230->1144 1236 7ff6139bb923-7ff6139bb935 1230->1236 1238 7ff6139bb90c 1231->1238 1239 7ff6139bb8eb-7ff6139bb908 memcpy 1231->1239 1232->1231 1233->1140 1240 7ff6139bbb22 1234->1240 1241 7ff6139bbb2a-7ff6139bbb31 1234->1241 1235->1140 1236->1157 1243 7ff6139bb93b-7ff6139bb95c memcpy 1236->1243 1238->1224 1239->1238 1240->1241 1241->1197 1243->1150
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                          • API String ID: 3510742995-857957974
                                          • Opcode ID: 507de865ae20c84d9630f303409964dba77a077305b430b96329f337efb5b13c
                                          • Instruction ID: 5d6e6650ff93a2fbff742921752067d0f546b883f1a9c3f20a51ec855cd3501b
                                          • Opcode Fuzzy Hash: 507de865ae20c84d9630f303409964dba77a077305b430b96329f337efb5b13c
                                          • Instruction Fuzzy Hash: C002D232A08F4585EB60DB09D485B693BA4FB40FA4F504935DA4EAB7EAEF78D845C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1368 7ff6139baa50-7ff6139baabe 1369 7ff6139baae0 1368->1369 1370 7ff6139baac0-7ff6139baad5 1368->1370 1372 7ff6139baae7-7ff6139bab01 1369->1372 1370->1369 1371 7ff6139baad7-7ff6139baade 1370->1371 1371->1372 1373 7ff6139bab07-7ff6139bab0c 1372->1373 1374 7ff6139bb1cb 1372->1374 1373->1374 1375 7ff6139bab12-7ff6139bab20 1373->1375 1376 7ff6139bab62-7ff6139bab66 1375->1376 1377 7ff6139bab22-7ff6139bab5c malloc 1375->1377 1379 7ff6139babb3-7ff6139babc4 1376->1379 1380 7ff6139bab68-7ff6139babad malloc 1376->1380 1377->1376 1378 7ff6139bb1bf 1377->1378 1378->1374 1381 7ff6139bac38-7ff6139bac3a 1379->1381 1382 7ff6139babc6-7ff6139babe0 realloc 1379->1382 1380->1378 1380->1379 1385 7ff6139bac3c-7ff6139bac60 call 7ff6139a5cf0 1381->1385 1386 7ff6139bac9a-7ff6139bad41 call 7ff6139a83c0 malloc 1381->1386 1383 7ff6139bac20-7ff6139bac36 1382->1383 1384 7ff6139babe2-7ff6139babec call 7ff6139a5970 1382->1384 1383->1381 1391 7ff6139babf1 1384->1391 1392 7ff6139bac65-7ff6139bac68 1385->1392 1386->1378 1393 7ff6139bad47-7ff6139bad61 memcpy 1386->1393 1394 7ff6139babf6-7ff6139bac1f call 7ff6139df580 1391->1394 1395 7ff6139baedf-7ff6139baee6 1392->1395 1396 7ff6139bac6e-7ff6139bac70 1392->1396 1393->1391 1397 7ff6139bad67-7ff6139badd3 free 1393->1397 1401 7ff6139bb1b8-7ff6139bb1ba 1395->1401 1402 7ff6139baeec-7ff6139baef8 1395->1402 1399 7ff6139baec6-7ff6139baeda call 7ff6139a5970 1396->1399 1400 7ff6139bac76-7ff6139bac7e 1396->1400 1408 7ff6139bb1a3-7ff6139bb1aa 1397->1408 1409 7ff6139badd9-7ff6139bade0 1397->1409 1399->1394 1400->1399 1405 7ff6139bac84-7ff6139bac96 1400->1405 1401->1394 1402->1394 1405->1386 1410 7ff6139bb1ae 1408->1410 1411 7ff6139bade6-7ff6139baded 1409->1411 1412 7ff6139bb14c-7ff6139bb158 1409->1412 1410->1401 1413 7ff6139badef-7ff6139badf2 1411->1413 1414 7ff6139badf8-7ff6139badff 1411->1414 1415 7ff6139bb18b-7ff6139bb19e 1412->1415 1416 7ff6139bb15a-7ff6139bb186 call 7ff613991d10 call 7ff6139a5970 1412->1416 1413->1414 1417 7ff6139baefd-7ff6139baf04 1413->1417 1418 7ff6139bae00-7ff6139bae04 1414->1418 1415->1394 1416->1394 1420 7ff6139baf44-7ff6139baf6d call 7ff613991d10 call 7ff6139a5970 1417->1420 1421 7ff6139baf06-7ff6139baf0d 1417->1421 1422 7ff6139bae43-7ff6139bae4a 1418->1422 1423 7ff6139bae06-7ff6139bae0a 1418->1423 1420->1391 1421->1416 1425 7ff6139baf13-7ff6139baf3f call 7ff613991d10 call 7ff6139a5970 1421->1425 1426 7ff6139bae59-7ff6139bae62 1422->1426 1427 7ff6139bae4c 1422->1427 1423->1422 1429 7ff6139bae0c-7ff6139bae27 call 7ff6139a6230 1423->1429 1425->1394 1426->1418 1433 7ff6139bae64-7ff6139bae68 1426->1433 1427->1426 1440 7ff6139bae2c-7ff6139bae32 1429->1440 1437 7ff6139bae6e-7ff6139bae73 1433->1437 1438 7ff6139baf98-7ff6139baf9f 1433->1438 1437->1438 1442 7ff6139bae79-7ff6139bae8a 1437->1442 1444 7ff6139bafa7-7ff6139bafae 1438->1444 1445 7ff6139baf72-7ff6139baf93 call 7ff6139a5970 1440->1445 1446 7ff6139bae38-7ff6139bae3d 1440->1446 1442->1444 1449 7ff6139bae90-7ff6139baeb4 memcpy 1442->1449 1444->1410 1447 7ff6139bafb4-7ff6139bafb7 1444->1447 1445->1394 1446->1422 1446->1445 1451 7ff6139bafc3-7ff6139bafcb 1447->1451 1452 7ff6139bafb9 1447->1452 1449->1447 1453 7ff6139baeba-7ff6139baebf 1449->1453 1455 7ff6139baff3 1451->1455 1456 7ff6139bafcd-7ff6139bafe7 1451->1456 1452->1451 1453->1399 1458 7ff6139baffb-7ff6139baffe 1455->1458 1456->1455 1457 7ff6139bafe9-7ff6139baff1 1456->1457 1457->1458 1459 7ff6139bb120-7ff6139bb128 1458->1459 1460 7ff6139bb004-7ff6139bb035 1458->1460 1459->1401 1461 7ff6139bb12e-7ff6139bb139 1459->1461 1465 7ff6139bb0f3-7ff6139bb11e call 7ff613991d10 call 7ff6139a5970 1460->1465 1466 7ff6139bb03b-7ff6139bb043 1460->1466 1461->1401 1462 7ff6139bb13b-7ff6139bb147 call 7ff6139d5ad0 1461->1462 1462->1394 1472 7ff6139bb0c5-7ff6139bb0c8 1465->1472 1466->1465 1469 7ff6139bb049-7ff6139bb04c 1466->1469 1471 7ff6139bb04e-7ff6139bb055 1469->1471 1469->1472 1476 7ff6139bb0c0 1471->1476 1477 7ff6139bb057-7ff6139bb07e memset call 7ff6139d84b0 1471->1477 1474 7ff6139bb0d0-7ff6139bb0d2 1472->1474 1475 7ff6139bb0ca CertFreeCertificateContext 1472->1475 1474->1459 1479 7ff6139bb0d4-7ff6139bb0e5 call 7ff6139a5970 1474->1479 1475->1474 1476->1472 1483 7ff6139bb080-7ff6139bb08a 1477->1483 1484 7ff6139bb0bb 1477->1484 1479->1394 1486 7ff6139bb08c-7ff6139bb096 1483->1486 1487 7ff6139bb0ea-7ff6139bb0f1 1483->1487 1484->1476 1486->1487 1489 7ff6139bb098-7ff6139bb0aa call 7ff61399f0e0 1486->1489 1488 7ff6139bb0b3-7ff6139bb0b6 call 7ff6139a5970 1487->1488 1488->1484 1489->1484 1493 7ff6139bb0ac 1489->1493 1493->1488
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                          • API String ID: 860210379-3059304359
                                          • Opcode ID: 43dad6052e7db5d0feb779de27c83d9fe3549c54bc9181445eb254f7299b92d5
                                          • Instruction ID: c3f1ab54d67a16de687b6bb9ffd14f47794bc62d961ff3d80ac77ef6f6ab549b
                                          • Opcode Fuzzy Hash: 43dad6052e7db5d0feb779de27c83d9fe3549c54bc9181445eb254f7299b92d5
                                          • Instruction Fuzzy Hash: 3E129132A08F8285EB608B19D8517AE37A4FB44FA5F504936DA5FAB796EF3CD441C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1494 7ff6139b9c70-7ff6139b9ce0 1495 7ff6139b9cff 1494->1495 1496 7ff6139b9ce2-7ff6139b9cf4 1494->1496 1498 7ff6139b9d06-7ff6139b9d20 call 7ff6139a8800 1495->1498 1496->1495 1497 7ff6139b9cf6-7ff6139b9cfd 1496->1497 1497->1498 1501 7ff6139b9d31-7ff6139b9d38 1498->1501 1502 7ff6139b9d22-7ff6139b9d2c call 7ff6139a5af0 1498->1502 1504 7ff6139b9d78 1501->1504 1505 7ff6139b9d3a-7ff6139b9d5a GetModuleHandleA GetProcAddress 1501->1505 1502->1501 1507 7ff6139b9d7a-7ff6139b9d8b 1504->1507 1505->1504 1506 7ff6139b9d5c-7ff6139b9d72 call 7ff6139a8800 1505->1506 1506->1504 1514 7ff6139b9d74-7ff6139b9d76 1506->1514 1509 7ff6139b9db0 1507->1509 1510 7ff6139b9d8d-7ff6139b9da5 1507->1510 1513 7ff6139b9db7-7ff6139b9dba 1509->1513 1510->1509 1512 7ff6139b9da7-7ff6139b9dae 1510->1512 1512->1513 1515 7ff6139b9dbc-7ff6139b9dd3 call 7ff6139a8800 1513->1515 1516 7ff6139b9dfb-7ff6139b9e02 1513->1516 1514->1507 1522 7ff6139b9dd5-7ff6139b9de0 1515->1522 1523 7ff6139b9de2-7ff6139b9df6 call 7ff6139a5970 1515->1523 1517 7ff6139b9e06-7ff6139b9e17 1516->1517 1520 7ff6139b9e19-7ff6139b9e31 1517->1520 1521 7ff6139b9e3c 1517->1521 1520->1521 1524 7ff6139b9e33-7ff6139b9e3a 1520->1524 1525 7ff6139b9e43-7ff6139b9e45 1521->1525 1522->1517 1534 7ff6139ba9fd-7ff6139baa26 call 7ff6139df580 1523->1534 1524->1525 1527 7ff6139b9e88-7ff6139b9e92 1525->1527 1528 7ff6139b9e47-7ff6139b9e63 call 7ff6139a0360 call 7ff61399fd80 1525->1528 1530 7ff6139b9e98-7ff6139b9ec3 1527->1530 1531 7ff6139ba707-7ff6139ba71e call 7ff6139b7900 1527->1531 1552 7ff6139b9e80-7ff6139b9e83 call 7ff6139a0390 1528->1552 1553 7ff6139b9e65-7ff6139b9e7d 1528->1553 1535 7ff6139b9ec5-7ff6139b9edc 1530->1535 1536 7ff6139b9efb 1530->1536 1544 7ff6139ba720-7ff6139ba731 call 7ff6139b7900 1531->1544 1545 7ff6139ba733-7ff6139ba73d call 7ff6139a5af0 1531->1545 1540 7ff6139b9ede-7ff6139b9ee3 1535->1540 1541 7ff6139b9ee5-7ff6139b9eec 1535->1541 1542 7ff6139b9f00-7ff6139b9f0a 1536->1542 1540->1542 1547 7ff6139b9eee-7ff6139b9ef3 1541->1547 1548 7ff6139b9ef5-7ff6139b9ef9 1541->1548 1549 7ff6139b9f12-7ff6139b9f1d 1542->1549 1550 7ff6139b9f0c-7ff6139b9f0f 1542->1550 1544->1545 1561 7ff6139ba742-7ff6139ba74d 1544->1561 1545->1561 1547->1542 1548->1542 1556 7ff6139ba6ef-7ff6139ba6fe call 7ff6139a5970 1549->1556 1557 7ff6139b9f23-7ff6139b9f38 1549->1557 1550->1549 1552->1527 1553->1552 1566 7ff6139ba9f8 1556->1566 1557->1556 1563 7ff6139ba753-7ff6139ba7d4 call 7ff6139a5af0 call 7ff6139a8380 1561->1563 1564 7ff6139ba7d6-7ff6139ba7e8 1561->1564 1565 7ff6139ba7ed-7ff6139ba845 calloc 1563->1565 1564->1565 1568 7ff6139ba860-7ff6139ba863 1565->1568 1569 7ff6139ba847-7ff6139ba851 call 7ff6139a5970 1565->1569 1566->1534 1572 7ff6139ba865-7ff6139ba8c3 1568->1572 1573 7ff6139ba856-7ff6139ba85b 1568->1573 1569->1573 1577 7ff6139ba8c9-7ff6139ba8f8 free 1572->1577 1578 7ff6139ba96c-7ff6139ba988 call 7ff6139a6230 1572->1578 1573->1534 1579 7ff6139ba946-7ff6139ba967 call 7ff613991d10 call 7ff6139a5970 1577->1579 1580 7ff6139ba8fa-7ff6139ba900 1577->1580 1585 7ff6139ba98d-7ff6139ba9aa 1578->1585 1579->1534 1583 7ff6139ba920-7ff6139ba941 call 7ff613991d10 call 7ff6139a5970 1580->1583 1584 7ff6139ba902-7ff6139ba91b call 7ff613991d10 call 7ff6139a5970 1580->1584 1583->1534 1584->1566 1593 7ff6139ba9e9-7ff6139ba9f3 call 7ff6139a5970 1585->1593 1594 7ff6139ba9ac-7ff6139ba9af 1585->1594 1593->1566 1594->1593 1599 7ff6139ba9b1-7ff6139ba9e7 1594->1599 1599->1534
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                          • API String ID: 1646373207-2477831187
                                          • Opcode ID: 2338b05bd6f938158b7bbd3647836caff589d68b3deee7ea365616dd5d438d8c
                                          • Instruction ID: 32d3de84ee002f814cfaf546dfe9ff8ae3eb074a790dd766d648013a8a6fecae
                                          • Opcode Fuzzy Hash: 2338b05bd6f938158b7bbd3647836caff589d68b3deee7ea365616dd5d438d8c
                                          • Instruction Fuzzy Hash: 55029132A08F8186E7508B25D4417EE37A4FB45FA4F508936DA5EAB796EF3CE544C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1602 7ff61399b2b0-7ff61399b2fb calloc 1603 7ff61399b43e-7ff61399b447 _errno 1602->1603 1604 7ff61399b301-7ff61399b38a malloc 1602->1604 1605 7ff61399b449-7ff61399b465 1603->1605 1606 7ff61399b3c7-7ff61399b3ce 1604->1606 1607 7ff61399b38c-7ff61399b3b1 InitializeCriticalSectionEx call 7ff6139b4a60 1604->1607 1608 7ff61399b3e0-7ff61399b3f1 free 1606->1608 1609 7ff61399b3d0-7ff61399b3da DeleteCriticalSection free 1606->1609 1614 7ff61399b3b7-7ff61399b3bf 1607->1614 1615 7ff61399b466-7ff61399b47a _strdup 1607->1615 1611 7ff61399b3f3 call 7ff6139b8680 1608->1611 1612 7ff61399b3f8-7ff61399b400 1608->1612 1609->1608 1611->1612 1617 7ff61399b402 closesocket 1612->1617 1618 7ff61399b408-7ff61399b438 free 1612->1618 1614->1606 1615->1606 1619 7ff61399b480-7ff61399b4a0 free _strdup 1615->1619 1617->1618 1618->1603 1620 7ff61399b4ce-7ff61399b4d8 1619->1620 1621 7ff61399b4a2-7ff61399b4b1 call 7ff6139b8d50 1619->1621 1622 7ff61399b551-7ff61399b56c free 1620->1622 1623 7ff61399b4da-7ff61399b502 EnterCriticalSection LeaveCriticalSection 1620->1623 1627 7ff61399b4b6-7ff61399b4bc 1621->1627 1622->1603 1625 7ff61399b515-7ff61399b518 1623->1625 1626 7ff61399b504-7ff61399b50c CloseHandle 1623->1626 1631 7ff61399b522-7ff61399b532 call 7ff61399b130 free 1625->1631 1632 7ff61399b51a-7ff61399b51d call 7ff6139b8da0 1625->1632 1630 7ff61399b538-7ff61399b53b 1626->1630 1628 7ff61399b50e-7ff61399b510 1627->1628 1629 7ff61399b4be-7ff61399b4cb _errno 1627->1629 1628->1605 1629->1620 1635 7ff61399b548-7ff61399b54b closesocket 1630->1635 1636 7ff61399b53d-7ff61399b543 call 7ff613995b00 1630->1636 1631->1630 1632->1631 1635->1622 1636->1635
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                          • String ID:
                                          • API String ID: 259767416-0
                                          • Opcode ID: fe9dc3e15b7135038b309508d58dd590963aa39b29c1eba6b1d019a3f51d2b9f
                                          • Instruction ID: 5d9e2fb56b5b4728d93977fb87cac380dce57fee97783cb7b17da999a18f2c41
                                          • Opcode Fuzzy Hash: fe9dc3e15b7135038b309508d58dd590963aa39b29c1eba6b1d019a3f51d2b9f
                                          • Instruction Fuzzy Hash: 08815A22E09F8187E624DF22E8512A97760FB98B60F445635DB9F567A2EF7CE4D48300
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                          • API String ID: 0-760484938
                                          • Opcode ID: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                          • Instruction ID: b7ce55992b147c1b6024fff2dfc600cc62cc7a201a5349ab52cf18a07587749f
                                          • Opcode Fuzzy Hash: efddc1f6dacb3119a96794c8e25f0bd1cf04d4b00aa7f066a4e6263cdbba1fe6
                                          • Instruction Fuzzy Hash: 2142C222F09FC295EB598B2195413B97790FB45FA4F084A35CE9E977A6EF78E460C300

                                          Control-flow Graph

                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF613991B61,?,?,?,?,00007FF613983591), ref: 00007FF6139A18C8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A1911
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: callocfree
                                          • String ID: <$<$<$`$v
                                          • API String ID: 306872129-2056843887
                                          • Opcode ID: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                          • Instruction ID: 6622714ea84c960c95e32177034d029b11713e384a38f59e4c0a716710d622df
                                          • Opcode Fuzzy Hash: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                          • Instruction Fuzzy Hash: 3A915C72908BC186E3008F24D4053E837A4FB55F6CF085738DE995B39ADFBAA194C720

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                          • API String ID: 2911674258-670633250
                                          • Opcode ID: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                          • Instruction ID: 5272cc4dc24c274fcc99f7197f07cea5ecf7f1f5740e1d8c5549ebffcd0de799
                                          • Opcode Fuzzy Hash: 78bda30eb9f00ef79d3851da8f0a2d784c8795b32e686334d913f5884b7e80e3
                                          • Instruction Fuzzy Hash: D4919F62A18BC186D710CF25D4512ED33A0FB89F98F445236DE8E9762AEF39E185CB10

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2074 7ff6139b86d0-7ff6139b86fd getaddrinfo 2075 7ff6139b8894-7ff6139b88a1 2074->2075 2076 7ff6139b8703-7ff6139b8715 2074->2076 2077 7ff6139b8874-7ff6139b887d WSASetLastError 2076->2077 2078 7ff6139b871b 2076->2078 2079 7ff6139b8883-7ff6139b8890 2077->2079 2080 7ff6139b8720-7ff6139b8726 2078->2080 2079->2075 2081 7ff6139b8728-7ff6139b872b 2080->2081 2082 7ff6139b872d-7ff6139b8730 2080->2082 2083 7ff6139b8739-7ff6139b873d 2081->2083 2084 7ff6139b87e1-7ff6139b87e8 2082->2084 2085 7ff6139b8736 2082->2085 2083->2084 2086 7ff6139b8743-7ff6139b874a 2083->2086 2084->2080 2087 7ff6139b87ee 2084->2087 2085->2083 2086->2084 2088 7ff6139b8750-7ff6139b8753 2086->2088 2089 7ff6139b8822-7ff6139b882f 2087->2089 2088->2084 2092 7ff6139b8759-7ff6139b876a malloc 2088->2092 2090 7ff6139b8831 freeaddrinfo 2089->2090 2091 7ff6139b8837-7ff6139b883a 2089->2091 2090->2091 2093 7ff6139b886f-7ff6139b8872 2091->2093 2094 7ff6139b883c-7ff6139b883f 2091->2094 2095 7ff6139b8770-7ff6139b87a5 malloc 2092->2095 2096 7ff6139b881c 2092->2096 2093->2077 2093->2079 2097 7ff6139b8841-7ff6139b8868 free * 3 2094->2097 2098 7ff6139b886a-7ff6139b886d 2094->2098 2099 7ff6139b87a7-7ff6139b87bd memcpy 2095->2099 2100 7ff6139b880b-7ff6139b881a free 2095->2100 2096->2089 2097->2097 2097->2098 2098->2079 2101 7ff6139b87bf-7ff6139b87cc _strdup 2099->2101 2102 7ff6139b87ce-7ff6139b87d8 2099->2102 2100->2089 2101->2102 2103 7ff6139b87f0-7ff6139b8809 free * 2 2101->2103 2104 7ff6139b87de 2102->2104 2105 7ff6139b87da 2102->2105 2103->2089 2104->2084 2105->2104
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                          • String ID:
                                          • API String ID: 2364279375-0
                                          • Opcode ID: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                          • Instruction ID: 64a5760ec04660a34cf43f0ab4228e0409ea4fc5bb9e3fd3f28d04ef61a6c578
                                          • Opcode Fuzzy Hash: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                          • Instruction Fuzzy Hash: B2515036A0DF9187EA658F02A5419396BA4FB48FA4F088835DE5FAB755EF3CE4448700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2106 7ff6139b5fe0-7ff6139b6025 2107 7ff6139b6027-7ff6139b602a 2106->2107 2108 7ff6139b605b-7ff6139b6075 2106->2108 2107->2108 2111 7ff6139b602c-7ff6139b602f 2107->2111 2109 7ff6139b6077-7ff6139b6087 2108->2109 2110 7ff6139b608c-7ff6139b60a7 2108->2110 2109->2110 2112 7ff6139b6137-7ff6139b6143 2110->2112 2113 7ff6139b60ad-7ff6139b60b2 2110->2113 2111->2108 2114 7ff6139b6031-7ff6139b6034 2111->2114 2115 7ff6139b6190-7ff6139b619a 2112->2115 2116 7ff6139b6145-7ff6139b6159 2112->2116 2117 7ff6139b60b4-7ff6139b60be 2113->2117 2118 7ff6139b60c7-7ff6139b60ca 2113->2118 2119 7ff6139b6054-7ff6139b6056 2114->2119 2120 7ff6139b6036 2114->2120 2127 7ff6139b61d3-7ff6139b61db 2115->2127 2128 7ff6139b619c-7ff6139b619f 2115->2128 2122 7ff6139b616f-7ff6139b6171 2116->2122 2123 7ff6139b615b 2116->2123 2117->2118 2124 7ff6139b60c0-7ff6139b60c5 2117->2124 2125 7ff6139b60cc-7ff6139b60d0 2118->2125 2126 7ff6139b60ed-7ff6139b60f2 2118->2126 2121 7ff6139b62fd 2119->2121 2129 7ff6139b6038-7ff6139b6046 WSASetLastError 2120->2129 2130 7ff6139b604b-7ff6139b604e Sleep 2120->2130 2137 7ff6139b62ff-7ff6139b631f call 7ff6139df580 2121->2137 2134 7ff6139b6173-7ff6139b6176 2122->2134 2135 7ff6139b6189-7ff6139b618c 2122->2135 2133 7ff6139b6160-7ff6139b6167 2123->2133 2124->2117 2124->2118 2125->2126 2136 7ff6139b60d2-7ff6139b60e6 2125->2136 2138 7ff6139b6104-7ff6139b610e 2126->2138 2139 7ff6139b60f4-7ff6139b60fb 2126->2139 2131 7ff6139b61e2 2127->2131 2132 7ff6139b61dd-7ff6139b61e0 2127->2132 2128->2127 2140 7ff6139b61a1-7ff6139b61a3 2128->2140 2129->2121 2130->2119 2142 7ff6139b6210-7ff6139b6213 2131->2142 2143 7ff6139b61e4-7ff6139b620e 2131->2143 2141 7ff6139b621a-7ff6139b624a select 2132->2141 2133->2122 2144 7ff6139b6169-7ff6139b616d 2133->2144 2134->2135 2145 7ff6139b6178-7ff6139b6185 2134->2145 2135->2115 2136->2126 2149 7ff6139b6110-7ff6139b6118 2138->2149 2150 7ff6139b612b-7ff6139b6133 2138->2150 2139->2138 2147 7ff6139b60fd-7ff6139b6102 2139->2147 2140->2127 2148 7ff6139b61a5-7ff6139b61a8 2140->2148 2152 7ff6139b6250-7ff6139b625a 2141->2152 2142->2141 2151 7ff6139b6215 2142->2151 2143->2141 2144->2122 2144->2133 2145->2135 2147->2138 2147->2139 2154 7ff6139b61b1 2148->2154 2155 7ff6139b61aa-7ff6139b61ac 2148->2155 2149->2150 2156 7ff6139b611a-7ff6139b6127 2149->2156 2150->2112 2151->2141 2159 7ff6139b6264 2152->2159 2160 7ff6139b625c-7ff6139b625f 2152->2160 2157 7ff6139b61b3-7ff6139b61c1 WSASetLastError 2154->2157 2158 7ff6139b61c6-7ff6139b61d1 Sleep 2154->2158 2155->2152 2156->2150 2157->2152 2158->2152 2161 7ff6139b6266-7ff6139b6268 2159->2161 2162 7ff6139b626d-7ff6139b6270 2159->2162 2160->2137 2161->2137 2163 7ff6139b629f-7ff6139b62a2 2162->2163 2164 7ff6139b6272-7ff6139b629a __WSAFDIsSet * 2 2162->2164 2165 7ff6139b62ce-7ff6139b62d1 2163->2165 2166 7ff6139b62a4-7ff6139b62b5 __WSAFDIsSet 2163->2166 2164->2163 2167 7ff6139b629c 2164->2167 2165->2121 2170 7ff6139b62d3-7ff6139b62e4 __WSAFDIsSet 2165->2170 2168 7ff6139b62b7 2166->2168 2169 7ff6139b62ba-7ff6139b62c9 __WSAFDIsSet 2166->2169 2167->2163 2168->2169 2169->2165 2171 7ff6139b62cb 2169->2171 2172 7ff6139b62e9-7ff6139b62f8 __WSAFDIsSet 2170->2172 2173 7ff6139b62e6 2170->2173 2171->2165 2172->2121 2174 7ff6139b62fa 2172->2174 2173->2172 2174->2121
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                          • Instruction ID: 61046aee6348241872bd3c8eb31bea6d9c9e96db21e4687f418a5c2c4b7c38c8
                                          • Opcode Fuzzy Hash: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                          • Instruction Fuzzy Hash: D491FD31A0CE8286FB644E1698419BA6291FB44B74F508934D95FEFBCAFF3CF9418640
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                          • API String ID: 2635317215-3812100122
                                          • Opcode ID: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                          • Instruction ID: ac1a9f08dd4ad6100d386ef24cfb8f191c4bf018e3fb5d9e1ad39c8d58d12cce
                                          • Opcode Fuzzy Hash: d745ec9ae58cf2da707b93dddb6ae0445aae9b10f91d28d0416c49dab86b07c7
                                          • Instruction Fuzzy Hash: 7351A421F0CF82C3F6598B25A4513BA7790EB45BA0F140931DB8E977A6EF3DE9518700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: system
                                          • String ID: .8$h%49
                                          • API String ID: 3377271179-4206735779
                                          • Opcode ID: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                          • Instruction ID: de1c46a07357b19eb86cdb9951b480fe22274df244e767791afee9bd4f4815bd
                                          • Opcode Fuzzy Hash: e1d3076ed9d51c2f839fb864ec69f16c8f30c31a97545b534a8eb50fa7e2259f
                                          • Instruction Fuzzy Hash: D5615B63E18BDA88F301CBA9E8461BC7B70BBD9B58F015679CECA75916FF681148C344
                                          APIs
                                            • Part of subcall function 00007FF6139B86D0: getaddrinfo.WS2_32 ref: 00007FF6139B86F2
                                            • Part of subcall function 00007FF6139B86D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B875E
                                            • Part of subcall function 00007FF6139B86D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B8798
                                            • Part of subcall function 00007FF6139B86D0: memcpy.VCRUNTIME140(?,?,?,00007FF61399B1F5), ref: 00007FF6139B87B1
                                            • Part of subcall function 00007FF6139B86D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B87BF
                                            • Part of subcall function 00007FF6139B86D0: freeaddrinfo.WS2_32(?,?,?,00007FF61399B1F5), ref: 00007FF6139B8831
                                            • Part of subcall function 00007FF6139B86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B8845
                                            • Part of subcall function 00007FF6139B86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B884F
                                            • Part of subcall function 00007FF6139B86D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF61399B1F5), ref: 00007FF6139B885C
                                          • WSAGetLastError.WS2_32 ref: 00007FF61399B1FB
                                          • WSAGetLastError.WS2_32 ref: 00007FF61399B205
                                          • EnterCriticalSection.KERNEL32 ref: 00007FF61399B220
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF61399B22F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF61399B240
                                          • send.WS2_32 ref: 00007FF61399B263
                                          • WSAGetLastError.WS2_32 ref: 00007FF61399B26D
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF61399B280
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                          • String ID:
                                          • API String ID: 506363382-0
                                          • Opcode ID: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                          • Instruction ID: 8ae8c0e0618c33d3d24115797a0f02cb8103d4e6b62b7e19636d6db0da8b4ce7
                                          • Opcode Fuzzy Hash: bf152be5e74fb760d3c049dad89691837c5dff5b7d510eaca98c6ec77837753b
                                          • Instruction Fuzzy Hash: 3D314D72A08B42C6EB508F65E45226E27A0FB84FA8F444531D91FE76A6EF3CD485C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                          • Instruction ID: 91b32427de1613c68f55632851a30d91f6f0bf50fb73626adbf7f8397340c3c4
                                          • Opcode Fuzzy Hash: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                          • Instruction Fuzzy Hash: 71A1F732A18E92C6EB694A159405BB96295FF44FB4F148A34EA1BDB7CDFF3DD8018700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                          • API String ID: 3056473165-3891197721
                                          • Opcode ID: fbaa020e30d34ebc4685cf47e22d8be72c4720d4c35440349a4689a0d0d02158
                                          • Instruction ID: 74acc5e9465c20f4b827c81e359c701e1c23ea1a5968f79129d6d4a427b43c6e
                                          • Opcode Fuzzy Hash: fbaa020e30d34ebc4685cf47e22d8be72c4720d4c35440349a4689a0d0d02158
                                          • Instruction Fuzzy Hash: 4B718E72B08B018AEB14CB65D4516AD37A5FB48BB8F004A35DF2EAB7D5EE38E405C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                          • String ID:
                                          • API String ID: 1328870896-0
                                          • Opcode ID: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                          • Instruction ID: 834a8b6f342f1d4b58219dcf8856edacaeac767bb1da3395d85f8f0adaf38ed5
                                          • Opcode Fuzzy Hash: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                          • Instruction Fuzzy Hash: 35314C21E0CA4382FA54AB66D4533B963D0AF45FA4F444C35E64FEB3D7FE2DA8488211
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s$Connection #%ld to host %s left intact
                                          • API String ID: 1294909896-118628944
                                          • Opcode ID: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                          • Instruction ID: c75f2f6247d1b72d807bce26517dfca540ac2e9ac2f56146dbd27abe73a8bf89
                                          • Opcode Fuzzy Hash: 25ab57a35ded7b4366cd3229136faa6fbebb1ef31794a7cbe106c78bf5a5e3d9
                                          • Instruction Fuzzy Hash: 03916F32B08E8186EB589F2595427B967A4FB44FB4F444935DA4FAB356EF3CE460C380
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A11BB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A11D1
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A0FED
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A100A
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A101E
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A103A
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A1057
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A107A
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A108E
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A10A2
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A10C8
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A10DC
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A10F0
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A113F
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A114C
                                            • Part of subcall function 00007FF6139A0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A1175
                                          • memset.VCRUNTIME140 ref: 00007FF6139A1205
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 2717317152-3248832348
                                          • Opcode ID: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                          • Instruction ID: de74544e15a477825339344b0118de1b8283a7de9168bd21866928c2a274e30d
                                          • Opcode Fuzzy Hash: b4bb99099c09c2f90696dadfa9133446c6bcfceade5dd8e952d596f6c22118ac
                                          • Instruction Fuzzy Hash: 33716D62E0CFC281E751CF2594122BD3751EB95FA4F484631DE9EAB6A6EF38E4818350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$memcpy
                                          • String ID: 1.1
                                          • API String ID: 4107583993-2150719395
                                          • Opcode ID: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                          • Instruction ID: 779622defb859b64ecc6ffb30511c14cf1f4110b0077d3a3d3b0ed7a82ecb5e5
                                          • Opcode Fuzzy Hash: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                          • Instruction Fuzzy Hash: 25518F72708FC586D6648B26E4417AA73A4FB44F94F448431DF9E9B75AEF3CE4948300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastmallocrecvsend
                                          • String ID: Send failure: %s
                                          • API String ID: 25851408-857917747
                                          • Opcode ID: a6506a0d2cd2bf56def8e955f094f9f147e258e37c492eb6729e9695d4306e10
                                          • Instruction ID: f4c1ed8f3b761d9cd6e39f4ea723753b333410c11ff5b52b528cecf319e4a70f
                                          • Opcode Fuzzy Hash: a6506a0d2cd2bf56def8e955f094f9f147e258e37c492eb6729e9695d4306e10
                                          • Instruction Fuzzy Hash: 1C418F62B05B4185EB648F26E8057796690FB48FB8F544A35DEAE973A6EF3CD440C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 1294909896-3343404259
                                          • Opcode ID: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                          • Instruction ID: f52348cb64496ab1d37bed6ddcdd4d15e20dfc634d813a05c1e8f2d8975e0c5c
                                          • Opcode Fuzzy Hash: 064f49bb6e255ade0c927bea9155e5f26801896246ecfeb9cc64ea89652f1773
                                          • Instruction Fuzzy Hash: C3D17021A08E4289FB248F25D4522BD27A1FF44FA8F045935DE0FAB69BEF39E545C350
                                          APIs
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139828A7
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982917
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982977
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139829C7
                                            • Part of subcall function 00007FF613982840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982A17
                                          • MessageBoxA.USER32 ref: 00007FF613983727
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398378A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                          • String ID: keyauth.win$null
                                          • API String ID: 3545939226-2841560827
                                          • Opcode ID: a149f5d0346e2e4d48248f0c08c14f7f6b43faf1cd1bb1cce2e8f79fdbdf0108
                                          • Instruction ID: 6c4e9d523da6df9a47b2b971c955723925b928350ad3aa580db480ff44bf3ead
                                          • Opcode Fuzzy Hash: a149f5d0346e2e4d48248f0c08c14f7f6b43faf1cd1bb1cce2e8f79fdbdf0108
                                          • Instruction Fuzzy Hash: 3D51DE22B08B4586FB04DF75D4563AD2321BB44FA8F404934DE4E67AABEF3C90828340
                                          APIs
                                            • Part of subcall function 00007FF6139A8660: GetModuleHandleA.KERNEL32(?,?,?,00007FF6139D24BA,?,?,?,?,00007FF6139A89EB), ref: 00007FF6139A8674
                                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF6139A89EB), ref: 00007FF6139D24D0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: AddressCallerHandleModuleProc
                                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                          • API String ID: 2084706301-3788156360
                                          • Opcode ID: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                          • Instruction ID: 97b6d41e681e0c5f8824a94239248281c29cf306f1022eccc5c69d85fa302c20
                                          • Opcode Fuzzy Hash: f8e17ba8d6c6c72759de793df64b220ff247381932ecd5de2460a51393658e6d
                                          • Instruction Fuzzy Hash: 00F01960F09F4280FF54971AA8937702A90AF55F64F844974C84EEA692FE3CA1858700
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 0-3343404259
                                          • Opcode ID: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                          • Instruction ID: 0ba61448fdf56347543cef3aa313772caf8d0e19862c291d7854a8591a0cde12
                                          • Opcode Fuzzy Hash: f84caca69c7972fb98c0df09d891486e401f7fb6e43fed5d7a8f50e34cea5287
                                          • Instruction Fuzzy Hash: 1CB16222A0CE4289FB648E25945627D27A5EF41FA8F544935CA0FAB297FE3DE944C340
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139B13D0
                                            • Part of subcall function 00007FF6139B1960: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139B19BA
                                            • Part of subcall function 00007FF6139B1710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139B17A8
                                            • Part of subcall function 00007FF6139B1710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139B17B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$calloc
                                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                          • API String ID: 3095843317-1242256665
                                          • Opcode ID: 576f52932e20a67f69501a890910ecf293095fa115c1143bd2a4251892c664de
                                          • Instruction ID: 282ff18354d6386629f2231e467bf5319967d8b99d28e6763c52a33cdf92e75a
                                          • Opcode Fuzzy Hash: 576f52932e20a67f69501a890910ecf293095fa115c1143bd2a4251892c664de
                                          • Instruction Fuzzy Hash: D841BC72A0CF8286E750DB25A4427B977A1EB45BA4F188436DA4EDB69BFF3CD404C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: closesocket$calloc
                                          • String ID:
                                          • API String ID: 2958813939-0
                                          • Opcode ID: 0dc316c9491471f36169ca13040c5426418297ab516acf4aecf8f4c226863d07
                                          • Instruction ID: 61e699a27fc9ce690e4d815f6a181d741ea0b244b445ddff84d7dd8135e619bf
                                          • Opcode Fuzzy Hash: 0dc316c9491471f36169ca13040c5426418297ab516acf4aecf8f4c226863d07
                                          • Instruction Fuzzy Hash: 48414E32A08E4286E740AF35D4522E92361FB88F74F584A31DE5EDA2EBFF38D5458350
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                          • API String ID: 0-3791222319
                                          • Opcode ID: a38cc91fe961a61f807d027dd041507603a95d00c7f28230958b43a3fdfda65b
                                          • Instruction ID: 2950d214c0d2b2d871e87cd1afa3d0066bcfbd0d8da092cd94814e0ad347f4b6
                                          • Opcode Fuzzy Hash: a38cc91fe961a61f807d027dd041507603a95d00c7f28230958b43a3fdfda65b
                                          • Instruction Fuzzy Hash: AF51C421B1CA9689EB549B1185427796691EF45FB8F14CA35CA2F9B3EAFF3CE401C310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freerecv
                                          • String ID:
                                          • API String ID: 2032557106-0
                                          • Opcode ID: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                          • Instruction ID: ce0460ab274f7dba3e409764f06a09a57f2e07d678b3dc5536c20f30a235446f
                                          • Opcode Fuzzy Hash: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                          • Instruction Fuzzy Hash: A9C1D432A08A828AEB258F2594517BE2290FB44BB4F444A35DE9F977C6FF3DE445C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 1294909896-3248832348
                                          • Opcode ID: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                          • Instruction ID: 64a0e7701e43c6a60c90d91570c18c088d413fe71761c46d4760f6d75d2ea3ee
                                          • Opcode Fuzzy Hash: 14735c8d4da5ff9c77df89ee8aaeda6f25f4d3af1a329b697456f181ecc354f3
                                          • Instruction Fuzzy Hash: 92516F62E08AC181E7418F25D4553A97750EB85FA8F084631DF9EAB3AAEF79D491C310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastrecv
                                          • String ID:
                                          • API String ID: 2514157807-0
                                          • Opcode ID: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                          • Instruction ID: 719e6b403857d5314e19fd67b6b654081e8d451448ab661e3ed09cdf9f542eb6
                                          • Opcode Fuzzy Hash: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                          • Instruction Fuzzy Hash: 4AE0DFA1F04A0582FF2947B1E8563782190AB44B72F444B34CA3BC63D0EE2C44D24300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: closesocket
                                          • String ID:
                                          • API String ID: 2781271927-0
                                          • Opcode ID: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                          • Instruction ID: 89bb53f2d9177d71cdb2cff0e4b086b6b2176fc6ea5aaa54371c4102c81ad621
                                          • Opcode Fuzzy Hash: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                          • Instruction Fuzzy Hash: 0D019212F05D4281EB54DB3AE1993AD2390EF88FA4F088531DB0ECB2A7EE2CD491C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: socket
                                          • String ID:
                                          • API String ID: 98920635-0
                                          • Opcode ID: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                          • Instruction ID: f5c69c018ccf3eac2c4d1e9d534f2b9b332d39269eadb244df53bcab380327eb
                                          • Opcode Fuzzy Hash: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                          • Instruction Fuzzy Hash: F0E09B36F06A1582DE489735C4535B53350AB55B34F844771C63E533D1ED2CE5969B00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _beginthreadex
                                          • String ID:
                                          • API String ID: 3014514943-0
                                          • Opcode ID: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                          • Instruction ID: 53325402a8dcadf520c9c56e4c03c2f518b7db79dc0cce0b678dc348b0cc8701
                                          • Opcode Fuzzy Hash: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                          • Instruction Fuzzy Hash: A9D02B63B18B00839F20DF72A841069E351B788B74B484738EE7D827F4EF3CD1854600
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ioctlsocket
                                          • String ID:
                                          • API String ID: 3577187118-0
                                          • Opcode ID: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                          • Instruction ID: 7f08b0d58c1320d4ddb69663f7d3c0bc31f5ddd4bc0d1ead8c68c4df57e1ef33
                                          • Opcode Fuzzy Hash: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                          • Instruction Fuzzy Hash: 26C08067F14A81C3D3445F7254850C76772BBC4714F955435D24782224FD3CC2E58B40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                          • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                          • API String ID: 3939785054-690044944
                                          • Opcode ID: 29391b55335036efc77e5294a79f8f76e0da53b964b828aae9b04ff18febf4e3
                                          • Instruction ID: 1d04778042b8c560b5dcf25316e0ad7b1ce7be100f6b6c834672f727e9f0fa3f
                                          • Opcode Fuzzy Hash: 29391b55335036efc77e5294a79f8f76e0da53b964b828aae9b04ff18febf4e3
                                          • Instruction Fuzzy Hash: 87C27571A08E8285FB50DB2584467B92791EB41FA8F488935CE4FAF69BFE3DE445C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$#211$fwrite$#217calloc
                                          • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                          • API String ID: 2742731861-78870445
                                          • Opcode ID: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                          • Instruction ID: 5ee6e953150b6c6f96a06fee49d20568a9688c540a00a52d59c0da82bc15091a
                                          • Opcode Fuzzy Hash: 831d87dee25c1670673b59d4b4179000b4e3fe808a50e4d779f915d0a570c901
                                          • Instruction Fuzzy Hash: 13425D66B08F4286FB109B66D4552B927A1FB48FA8F404931DE4FA7B96FE3CE445C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 1664669839-85532522
                                          • Opcode ID: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                          • Instruction ID: a8fc54bfdf8596dc0ca4135b3546c85c039218e1c7a6654395f595207e9a87fa
                                          • Opcode Fuzzy Hash: 5dc6d2020e20b7b7b4f3fd0f005dc465797da0486d902d5c39db5575fa961406
                                          • Instruction Fuzzy Hash: CAA2C862A18F8A85FF108B64D4453ED2361FB85BB4F404A31DA5EA7ADAEF7CD085D300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                                          • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                          • API String ID: 1025660337-777782649
                                          • Opcode ID: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                          • Instruction ID: 8cfc0f4ff56d0ba663ddced9dbd2845b575d591861502ce47342ce612f376427
                                          • Opcode Fuzzy Hash: 3a84ad12ddd9242ef5708b47fd60f2fc0ce5b5ff1c798c18c0fc51936d33e422
                                          • Instruction Fuzzy Hash: E9126C71A0CE8285EB648F16E4463BA63A0FB45FA4F444935DA4FA7796EF3CE544C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 969624648-85532522
                                          • Opcode ID: 4b3d2206014de7f61fa1300ad114516bb9951d61e68c3632b4719bc4a50493be
                                          • Instruction ID: 6dff163548291fee832aa249a5fa5b917be9175b3628c48efb9d06b26ba0f104
                                          • Opcode Fuzzy Hash: 4b3d2206014de7f61fa1300ad114516bb9951d61e68c3632b4719bc4a50493be
                                          • Instruction Fuzzy Hash: 7392A762A18F8985EF10DB68E4453AD2361FB85BB4F401631DB5EA7ADAEF7CD085D300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                          • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                          • API String ID: 561913010-2037819326
                                          • Opcode ID: b99ef1342f43ec3ae102a7ff4fd16fab8c957940eb817becddc35c7575eee630
                                          • Instruction ID: a7de4078f44b3af9759ef6cb321b1aa21f0f1bbb58f096a8de7b8e9b36311b72
                                          • Opcode Fuzzy Hash: b99ef1342f43ec3ae102a7ff4fd16fab8c957940eb817becddc35c7575eee630
                                          • Instruction Fuzzy Hash: FA429F72A08F4285EB109B15E4422B977A0FB84FB4F844A31DA5FA7796EF3CE944C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastcallocfreegetsockname
                                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                          • API String ID: 2454324209-2383553807
                                          • Opcode ID: b97dba633d30b4d0c544a2ffe8f3c3dcebe4e1f558373a43b1b957c6b0dbfa42
                                          • Instruction ID: e0e23b5886035dc89be9e77dfb5311288d41d7dd3621a6772ea0ff9528407231
                                          • Opcode Fuzzy Hash: b97dba633d30b4d0c544a2ffe8f3c3dcebe4e1f558373a43b1b957c6b0dbfa42
                                          • Instruction Fuzzy Hash: 71229461B08F8281EB519B22D4522BE67A1FB85FA4F444831EA4FE7697FE3CE545C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CreateFile_errnofree
                                          • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                          • API String ID: 1377488173-902404565
                                          • Opcode ID: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                          • Instruction ID: b9c2c82f166eb1020f9d4740c3a9fae00ea80724387612ca62c5b87059d2040c
                                          • Opcode Fuzzy Hash: 919779ac502394a4df49bfc1684378c912bd20c5370d5fdb507a62585e4b15d8
                                          • Instruction Fuzzy Hash: A6B1A465B08F4182E7109B5AE4026A967A1BF44FB4F800936DD8FA7BA6FF3CE544C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                          • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                          • API String ID: 1339443121-1021110354
                                          • Opcode ID: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                          • Instruction ID: cc34f001d6b1f7162c896a1abeaf1dfcfaabaf6abca7ea4850089124df0aa0ce
                                          • Opcode Fuzzy Hash: 85b546518fe974906508f346c34f15a72552962cb0c771cf6e189cb72353a543
                                          • Instruction Fuzzy Hash: 4402B121A0DF8285EA51CB15A4863A97794BF85FA8F480935DE4FA77A6EF7CE404C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                          • API String ID: 2190258309-2223379150
                                          • Opcode ID: 7071650c09dff2dad16001d1756b7afe7cc268e2c7eedb60c4a3bb5df4c44f15
                                          • Instruction ID: 924fd2e5ad4f81f624642ada5c0b6c7ca9a76978e7f17eccde8de80b244efce5
                                          • Opcode Fuzzy Hash: 7071650c09dff2dad16001d1756b7afe7cc268e2c7eedb60c4a3bb5df4c44f15
                                          • Instruction Fuzzy Hash: FE126C72A08F5286EB90CF25E4566A93BA4FB44FA4F440835DA8F97B96EF3CD445C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strncmp$memset
                                          • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                          • API String ID: 3268688168-2769131373
                                          • Opcode ID: 3e5bc1e74b012f5f58e1374a4c72a9ebe9ef3efd138e2f1c7d373a212fd8c81f
                                          • Instruction ID: 537eecc6ea4381d1641cf9b0525623d3201f7cce774f34e50711eb5f59ff8e15
                                          • Opcode Fuzzy Hash: 3e5bc1e74b012f5f58e1374a4c72a9ebe9ef3efd138e2f1c7d373a212fd8c81f
                                          • Instruction Fuzzy Hash: F7E1A262E18B8285E7108B65D4422BD3760FB85FA8F405A36EA4FA7766FF7CD544C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 958247072-579821726
                                          • Opcode ID: 24dbfc32c8dc895f344db0d517b328b1238d857ed911aa6ec1f707056b30ba47
                                          • Instruction ID: 2526d59a26313275a85158e084df8bdfaa753d7c6d267705523a8ed05127dc37
                                          • Opcode Fuzzy Hash: 24dbfc32c8dc895f344db0d517b328b1238d857ed911aa6ec1f707056b30ba47
                                          • Instruction Fuzzy Hash: 9932A762A18F8A85FF108B69D4453ED2361FB85BB4F404631DA5EA7ADAEF7CD085D300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup$fclosefgetsfopen
                                          • String ID: $default$login$machine$password
                                          • API String ID: 431015889-155862542
                                          • Opcode ID: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                          • Instruction ID: 765ac45a9dd4f99b15b9c555785c4950d6803e65dd04f6a4c5f820be1a027f19
                                          • Opcode Fuzzy Hash: 95c53613c4b75bead37d9737eb2d18ca3386db0ad298d740e1b388510a37e02d
                                          • Instruction Fuzzy Hash: 1BA1B621A0CF8285FA619F25A51337A6A90BF84FE4F480931DE4FA7796FE3DE4448700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _errno$strtol
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                          • API String ID: 3596500743-988243589
                                          • Opcode ID: d5ea2b37de5eb515f93575f2e8a4e345096032bb43ad1bb4d757d0c498c82414
                                          • Instruction ID: 7eeb6433dc5fbb2e211491eb502679d46d00323b6e2fafe353390ff101bd6a80
                                          • Opcode Fuzzy Hash: d5ea2b37de5eb515f93575f2e8a4e345096032bb43ad1bb4d757d0c498c82414
                                          • Instruction Fuzzy Hash: D2F1CA72F18A514AEB14CF64D4015BC37A1BF44BA8F548A35DE1FBB7D9EE38A8058740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                          • String ID: @
                                          • API String ID: 2041421932-2766056989
                                          • Opcode ID: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                          • Instruction ID: 2a481e854a3c123998b87b4be26bb0804dcd95df181c89c4c51ad6584468607b
                                          • Opcode Fuzzy Hash: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                          • Instruction Fuzzy Hash: 26316D72618B8186E760CF12E845AAE7761FBC5FD1F048435DE8EA7A59DF3CD4458B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchr
                                          • String ID: Unknown error %u (0x%08X)
                                          • API String ID: 1897771742-1058733786
                                          • Opcode ID: 2a26dff799f40e172bf9d9a434e10a599cd41592b269adf14bd1a7543fbd748f
                                          • Instruction ID: 330d2d4adb7f33412d7235ee41c0d86452c7e96c32697b4afa6cf907e81c5580
                                          • Opcode Fuzzy Hash: 2a26dff799f40e172bf9d9a434e10a599cd41592b269adf14bd1a7543fbd748f
                                          • Instruction Fuzzy Hash: 57216662A08F4586EB116F26F80526E7AA0BF55FE0F084875DE8FA3756EE3CD4418710
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                          • API String ID: 0-2774518510
                                          • Opcode ID: 0379ac116aa3b89d2553a78560e2e6e0937a33831639c842719652bd6057e29d
                                          • Instruction ID: e92c9e9bf74974b091c7876093aeaeb9fe3f6eac92eff8d4df299dd13bfecf63
                                          • Opcode Fuzzy Hash: 0379ac116aa3b89d2553a78560e2e6e0937a33831639c842719652bd6057e29d
                                          • Instruction Fuzzy Hash: 4042CA62E0CBC245EBA58A2581513B937D1FB41F58F184A35CB5EA73A7FF2DA854D300
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF6139BC5C8,?,?,?,?,?,?,00007FF6139D380E), ref: 00007FF6139BC646
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF6139BC5C8,?,?,?,?,?,?,00007FF6139D380E), ref: 00007FF6139BC7AD
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139BC90C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                          • API String ID: 3985033223-3943651191
                                          • Opcode ID: d4663184589d98a712ad90b88dcd5440e845ddca40feda83b796be39e2ad880e
                                          • Instruction ID: 178791a95c9cb0aa486b4c991be6b58be8f39d440d4d0e0319dcf33eee8a6254
                                          • Opcode Fuzzy Hash: d4663184589d98a712ad90b88dcd5440e845ddca40feda83b796be39e2ad880e
                                          • Instruction Fuzzy Hash: F891FC72A0CAD185EB119B25A4417BE7B94EB45FB4F084631DA9E9B7DBEF3CD4018B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: calloc$ErrorLastbind
                                          • String ID: bind() failed; %s
                                          • API String ID: 2604820300-1141498939
                                          • Opcode ID: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                          • Instruction ID: 8a0cc7bf945057f87217cf811cf1fbf1d3d284a7684479dc2b11127e0fed8c4c
                                          • Opcode Fuzzy Hash: 043503e0fdb1e12a905a901aa78c990b7d9c545350290c38aea68328abc36be4
                                          • Instruction Fuzzy Hash: B951C372A08B8186FB159B25D4563E837A0FB48FA4F044835CA4F8B396EF3DE456C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: calloc$ErrorLastbind
                                          • String ID: bind() failed; %s
                                          • API String ID: 2604820300-1141498939
                                          • Opcode ID: 5e9d399451e69d20be855dd8e9b27b5fe3cdf2e55046a58bcd62b973cec69776
                                          • Instruction ID: b9b4e99eab8a4f87c336a7e0dd3eb39c5b64d4d3526daaa4c456ee07d1aeac1d
                                          • Opcode Fuzzy Hash: 5e9d399451e69d20be855dd8e9b27b5fe3cdf2e55046a58bcd62b973cec69776
                                          • Instruction Fuzzy Hash: 82518032A08F8686EB158B26D4523B977A0FB44FA4F044835CE4E9B796FF3CE4619701
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                          • API String ID: 0-2102732564
                                          • Opcode ID: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                          • Instruction ID: e251076b9bb351862c05ef02f159978e284cd1f980c7be1e2137993a5b10aafb
                                          • Opcode Fuzzy Hash: 1a402775ebe9d7af04e26a2663a3cff6c5ec690d9225f72786fb014b8e9cfb9a
                                          • Instruction Fuzzy Hash: 82219291E0DE4AC3FE14C796A412BF402225B45FB1F948D36E80FAA3D7FEAC6555C280
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireRandom
                                          • String ID: @
                                          • API String ID: 2916321625-2766056989
                                          • Opcode ID: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                          • Instruction ID: 8e8dac3ac443673a243be5a1a0bd37b496788d45e7bf932bdba4bda9e0c54998
                                          • Opcode Fuzzy Hash: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                          • Instruction Fuzzy Hash: D5F08665B18A8182E710CB57F44536AA360FFC8BE6F444831DE8D97769EE7CC0858700
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                          • API String ID: 0-1379995092
                                          • Opcode ID: 5e1eafa53adae3ce6afb8c9d757bf206f60acaa71a792b37c3c2878a97f52238
                                          • Instruction ID: 0a8381962c9e8cf4e7d6a527b6dc6eff6d0ea3588deb82b1f553d39f933e9ae8
                                          • Opcode Fuzzy Hash: 5e1eafa53adae3ce6afb8c9d757bf206f60acaa71a792b37c3c2878a97f52238
                                          • Instruction Fuzzy Hash: 71420536E0CE8686F7604A19944637A77A1FB41FB4F544B30DA5FA76E6FE3CE8418600
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                          • String ID:
                                          • API String ID: 2110207923-0
                                          • Opcode ID: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                          • Instruction ID: dd7736d47a6e991da5d99c9d10b896b69c8ab9ab6ad5edb2e3b600ced107b8b1
                                          • Opcode Fuzzy Hash: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                          • Instruction Fuzzy Hash: E401B176608A81C2EB10CF62E44576AB330FB85FD9F148831DA8E46A69CF3CC448CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Crypt$AcquireContextCreateHash
                                          • String ID: @
                                          • API String ID: 1914063823-2766056989
                                          • Opcode ID: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                          • Instruction ID: a4a3d6afc38d15a9576b41c4128456629ede22e5c05d46da0193542cc8578437
                                          • Opcode Fuzzy Hash: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                          • Instruction Fuzzy Hash: 2CE0D861B14A9283F7204B62E402B5A6350FB88F89F448430CE8D4BA19DF3CC1418F04
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _getpidhtons
                                          • String ID:
                                          • API String ID: 3416910171-0
                                          • Opcode ID: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                          • Instruction ID: 9c5b74a00ef283272dff3e72876a01df3d48da3f5032585f88596f76ffc2ed8c
                                          • Opcode Fuzzy Hash: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                          • Instruction Fuzzy Hash: D4112E66A247D0CAD304CF36E5001AD3770FB5CB84F04962AFB8987B19EB78D690C744
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@
                                          • String ID:
                                          • API String ID: 1029415015-0
                                          • Opcode ID: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                          • Instruction ID: 3837bd414a68aa1f253397bcb42e81fca30a3cd73c1aee16a136a694a48a0a1d
                                          • Opcode Fuzzy Hash: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                          • Instruction Fuzzy Hash: F681CE23B19B9989EB00CB69D0953AC37B0E794F98F584862CF4EA7796EF38D044D350
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                          • Instruction ID: 46778831541a00858b17a09d23dd4dc13fdfab65cae2befafe4656ed608bc09e
                                          • Opcode Fuzzy Hash: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                          • Instruction Fuzzy Hash: F1610572B09F8842DA10CB29E44567963A1FB99BE4F109A35DF5E97B89FF3CE1419300
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                          • Instruction ID: b5eb34cdaf2b712133cd635003e007eb0ebd2680d972c2e22bd7820f2cda98b4
                                          • Opcode Fuzzy Hash: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                          • Instruction Fuzzy Hash: 4FA01261A05D458093008702E150D101250F78CB263004031C40D41411CD248081C200
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strcmp$strncpy$strchr
                                          • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                          • API String ID: 1395212091-3550120021
                                          • Opcode ID: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                          • Instruction ID: 7bf01a1dee2c76bdb27fd09fc65bff15c2e83f4cc0b5bebe2d0071c89dce2f20
                                          • Opcode Fuzzy Hash: a95fb3a32220d5d2373a41e2be5983f02937563951c6669e17548706725ee269
                                          • Instruction Fuzzy Hash: 4812FB10B2CE5791FB509766D8429B922A5BF11B78F409832E90FFE69BFE2CE505C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$CounterPerformanceQuery
                                          • String ID: Closing connection %ld
                                          • API String ID: 3490100708-2599090834
                                          • Opcode ID: b9841c2d2f7e244eaf557c7957d55c27c61e3d7d63ad313c88b15d1e5c17b3dc
                                          • Instruction ID: 17c48cd44e32a239d3e879d4c5c878a2cab2b79073ba41658831f65e06a67904
                                          • Opcode Fuzzy Hash: b9841c2d2f7e244eaf557c7957d55c27c61e3d7d63ad313c88b15d1e5c17b3dc
                                          • Instruction Fuzzy Hash: C8C10235A18F9282E7409F21E8512EC3768FB85FA8F484631EE9F5B75ADF3891958310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree$strpbrk
                                          • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                          • API String ID: 2737852498-2994854565
                                          • Opcode ID: b7ac18f558916f32379507697334559a0aacd794b5fde6b1c1b46c2a7d01ae62
                                          • Instruction ID: 4d5a3db6a9952a86bb18a747a0c0639aaa97e53d029f5efe7da9cffa97b93478
                                          • Opcode Fuzzy Hash: b7ac18f558916f32379507697334559a0aacd794b5fde6b1c1b46c2a7d01ae62
                                          • Instruction Fuzzy Hash: 39D15922E09F5281FB50CB2198166B927A4BF46FA8F484931DD4FA7796FE3CE549C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                          • Instruction ID: 7b4dedf94d0065ef88380f2a68be95f0a79033740de84c39b863c1b306627057
                                          • Opcode Fuzzy Hash: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                          • Instruction Fuzzy Hash: CA71103561CF81C2D7809F21E8956BC37A8FB84FA9F480435DE8E9B7199F389199C321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: calloc$_strdupfreehtonsmemset
                                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                          • API String ID: 130798683-4053692942
                                          • Opcode ID: 56bba87fc7c51af6d924c74d1b1b2e1982686a9a0faedffc57aa1329a3a47c90
                                          • Instruction ID: 0072e7c0fc1eb07dd0ae2c2cd969ad39cc9f4877b7c2b3f403926e09d7058b60
                                          • Opcode Fuzzy Hash: 56bba87fc7c51af6d924c74d1b1b2e1982686a9a0faedffc57aa1329a3a47c90
                                          • Instruction Fuzzy Hash: 1EE18132B08A8686EB608F25E4423B977A4FB44FA4F444935DA8FA7756EF3CE544C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 1346393832-579821726
                                          • Opcode ID: ad25c7a86437acde071c81594076c447ca3aaed47a1884f3f9ceb8d8117a9dab
                                          • Instruction ID: 637dd10df27d7a1e4313db94e0382e462e0dfc462e81bccfd05dbe08a93b0613
                                          • Opcode Fuzzy Hash: ad25c7a86437acde071c81594076c447ca3aaed47a1884f3f9ceb8d8117a9dab
                                          • Instruction Fuzzy Hash: C412B662A18F8585FF108B69D4463ED2361FB85BB4F504A31DA5EA2ADAEF7CD081D300
                                          APIs
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDB96
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDBBC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDBCD
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDC3B
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDC6C
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDC8C
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDC9E
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDD00
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDD71
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDD88
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDE43
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDEB7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6139CD2CF), ref: 00007FF6139CDEC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$free$_strdupcalloc
                                          • String ID: LDAP$base$one$onetree$sub$subtree
                                          • API String ID: 112326314-884163498
                                          • Opcode ID: 0558161d3525c0c5b2a966061e87bab19ec401be3912131fe2ef438a4881e9cb
                                          • Instruction ID: 7d4ed50f4e6227988591afe93bc7e5004fc4dae5adb14fa2f5845be426869bda
                                          • Opcode Fuzzy Hash: 0558161d3525c0c5b2a966061e87bab19ec401be3912131fe2ef438a4881e9cb
                                          • Instruction Fuzzy Hash: 8BB18F26A09F8282FB519B1594522792790FF89FA0F488935DE4FA7B86FF3CE455C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memchrstrtol
                                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                          • API String ID: 1626215102-895336422
                                          • Opcode ID: 590790d0129b1d5c45be9896e4dc915168101e99f472bba4d13294d82c54f45f
                                          • Instruction ID: fdbf0c0f6856b864f8e12fb15eec3cb6e515e3daefda41522dff079dcf7fa755
                                          • Opcode Fuzzy Hash: 590790d0129b1d5c45be9896e4dc915168101e99f472bba4d13294d82c54f45f
                                          • Instruction Fuzzy Hash: 85619B61B0CE4685EA14AB66A4022B93250BF44FB0F804E31D96FA77E3EE3CE5459B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                          • API String ID: 1294909896-115817326
                                          • Opcode ID: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                          • Instruction ID: efeafa899cd1e70ca755a2a0184f33135491ee42a2a8f139e580df1d5fbc3558
                                          • Opcode Fuzzy Hash: 9d864d28d9e300f388af087b7d8b9fd2095f76582643c860ef49b6a4ced9ffbd
                                          • Instruction Fuzzy Hash: B3917E21E0CF9292FA608B1594427B92794AB41FB4F048935DA4EBB79BFF3CE855D340
                                          APIs
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                          • memcpy.VCRUNTIME140 ref: 00007FF613986486
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF613986518
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF613986559
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139866A3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139866E2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613986730
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613986771
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139867CE
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613986888
                                            • Part of subcall function 00007FF6139DF1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6139843EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF6139DF20A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139868C9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613986996
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139869D7
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6139869FA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                          • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                          • API String ID: 264867259-3075834232
                                          • Opcode ID: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                          • Instruction ID: e58db78605736d2eb51988511ce0a8f1a09b03448ce93bf0b58760927186694f
                                          • Opcode Fuzzy Hash: 4e1204277121835ebe4e06a958129741cbb2a0c4066216bae6c9bb7d253b311e
                                          • Instruction Fuzzy Hash: 4212C562E08F4581FB109B65E44636D2761EB84BF8F004B35DB6EA76DAEE7CE484D340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                          • String ID:
                                          • API String ID: 1087521380-0
                                          • Opcode ID: be88be890d69c48f3ab97c3fa41fe16f5b033f2fd1f21b873e75df2716961dc1
                                          • Instruction ID: a2549abe48ce3c2fcaa18af25de5ed9e5dac3a45f6289f965b4276ebd3ee8f39
                                          • Opcode Fuzzy Hash: be88be890d69c48f3ab97c3fa41fe16f5b033f2fd1f21b873e75df2716961dc1
                                          • Instruction Fuzzy Hash: 56B14B22A0AF434AFF558F2695522792B94AF45FB4F080935DE5FA6782EF3CE494C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchrstrrchr$_strdupstrstr
                                          • String ID: .$/$/$/$?
                                          • API String ID: 2325335452-1821401756
                                          • Opcode ID: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                          • Instruction ID: fd977151db56ad02aa02febcdab703e5b14bd79fd2cf791d13755bf70c78178c
                                          • Opcode Fuzzy Hash: 532677097c9836d2ba0a64a8e6dc7d0731298d3760ddfc5c2a40f58a8fc9dc2d
                                          • Instruction Fuzzy Hash: 1C81AF12E0CB8246FB658B22950237A6A91AF45FA5F485835DE8FA73C7FE3CB445C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$free
                                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                          • API String ID: 3578582447-31095704
                                          • Opcode ID: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                          • Instruction ID: acabaab188a750e042ad2bb38251da4b3135985687f1ad10ac255dec9897a645
                                          • Opcode Fuzzy Hash: 40fc0069801b7dfe2785114d83a4b2d6c3cc27889de5eff3aac2ff71acebb616
                                          • Instruction Fuzzy Hash: D3818B21A0DF8284FB519B1299522B96681BF45FE4F884931DD4FA7797FF2CE902C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                          • Instruction ID: 80ab52376150946a828d545a61553d1893b98a11c35f11a1dccff9becdc9c1b5
                                          • Opcode Fuzzy Hash: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                          • Instruction Fuzzy Hash: 6291D336618F9193E7898F31E9912AC7768F749F58F080135EF9E8B355DF34A2A58310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                          • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                          • API String ID: 1094891576-1753329177
                                          • Opcode ID: 955c7712c79ff587e7c603a986f10185c6f7a27a7aa30e803e5dd7570a33bcd5
                                          • Instruction ID: a4c1018bfb84cd3115802e539993559e87a59973c18aafd1b47c3b8d4bb58556
                                          • Opcode Fuzzy Hash: 955c7712c79ff587e7c603a986f10185c6f7a27a7aa30e803e5dd7570a33bcd5
                                          • Instruction Fuzzy Hash: 6AD18E22E19A8285FB619B25D4113F93760FB44FA8F444A31DA5FA7AE6EF3CE505C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                          • API String ID: 1294909896-874090715
                                          • Opcode ID: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                          • Instruction ID: 51451d722e02193faa1a011ace4c114f851e1aecd15fd0bac53c060f3652cbcc
                                          • Opcode Fuzzy Hash: a4b04b913e93c2f9c523f7cf3eae0e2690bd5702689a41c3ee2f1092c1171054
                                          • Instruction Fuzzy Hash: E9A15B22E18F5286FB50DB52D8425BD37A4AB44BA4F444A31DE4EB77A6EF3CE5448340
                                          APIs
                                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A403
                                          • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A47D
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A4A1
                                          • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A4F0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A52A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A53C
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A54F
                                          • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A56A
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A580
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399A589
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                          • API String ID: 1368378007-4087121635
                                          • Opcode ID: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                          • Instruction ID: 3cf5295d2103068b71f55c3a2e66322923d4526df0a854c8a12f7fa98ce40f98
                                          • Opcode Fuzzy Hash: 1f35a80a99e6fd3e0fec7f91074f21a35dd5555525d88da8c92026e8bc2dde98
                                          • Instruction Fuzzy Hash: 01514051B0DE528AFE559F2698162B927A4FF45FE4F444830DD4FA6752FE3CE8458300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno
                                          • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                          • API String ID: 3939687465-1752685260
                                          • Opcode ID: 708f498282070d420d337acb99e452de26abb5abd9db17b713cf8609bfd7f0db
                                          • Instruction ID: 5f1e9c97656b224c9e8b4a914edabddb2645b59379a69509e99b86e7b001db73
                                          • Opcode Fuzzy Hash: 708f498282070d420d337acb99e452de26abb5abd9db17b713cf8609bfd7f0db
                                          • Instruction Fuzzy Hash: A251D362A0DF8689E7249F21E4423BE3794BB44F60F444975DA8F96696EF3CE504C710
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                          • API String ID: 0-3760664348
                                          • Opcode ID: d8306cbf9e920900b8540f97aa77802167219f0d8489164594f42279dd235b6e
                                          • Instruction ID: 6055f00f4fe0d408668cf7646359919158503cb152d941fc3441359d66577e9b
                                          • Opcode Fuzzy Hash: d8306cbf9e920900b8540f97aa77802167219f0d8489164594f42279dd235b6e
                                          • Instruction Fuzzy Hash: E3E1B062A0CA818AEB548F1590417797B90FB45FB4F448936DA8FAB79AEF3CF444C740
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139855CE
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6139855FC
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398560A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613985644
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613985695
                                          • memset.VCRUNTIME140 ref: 00007FF6139854C3
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                            • Part of subcall function 00007FF613986310: memcpy.VCRUNTIME140 ref: 00007FF613986486
                                            • Part of subcall function 00007FF613981FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982121
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613985802
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398582E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398583C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613985877
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139858CA
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139859B1
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6139859C9
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6139859D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                          • String ID: value
                                          • API String ID: 2102519606-494360628
                                          • Opcode ID: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                          • Instruction ID: 668391eb9f2dbc1fb26a20c288105912144f15adefc26ca28246d798a70fd657
                                          • Opcode Fuzzy Hash: 023b6053358200f424848e61aa4fa9e49c9a7dc309aec37bbb2a978c88a57a66
                                          • Instruction Fuzzy Hash: 8CF10B22A08F8585FB10DB75D4453AD6761FB85BB4F105631EAAE53AEAEF3CD085D300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                          • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                          • API String ID: 2572311694-3353508759
                                          • Opcode ID: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                          • Instruction ID: 7aa94226e75034ad83f24bd3197565f0e68ec15b0160bef686a2e7143b77f0fe
                                          • Opcode Fuzzy Hash: 003eef28260a4f8df0df00670386984386231f818a0537bbf2c3299004cc96c5
                                          • Instruction Fuzzy Hash: 01B1A361A08E8285EB708B15D8127B92791FB84FA4F448931D94FEB7EAEF7CD845C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup
                                          • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                          • API String ID: 1922034842-2519073162
                                          • Opcode ID: 7e1ad2abd64872e1a6c8b3d4c2903b2d40eb7b32a9edbe3065d4335cf41a8063
                                          • Instruction ID: cd36cf7683ac323eb3e4be1448e5eb745579e2af267a7f617c1153175b86f226
                                          • Opcode Fuzzy Hash: 7e1ad2abd64872e1a6c8b3d4c2903b2d40eb7b32a9edbe3065d4335cf41a8063
                                          • Instruction Fuzzy Hash: 1D918061A0CE9385FB618B129446BB96790BF41FE4F448831DA4FEB69FFE2DE5458300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID:
                                          • API String ID: 2653869212-0
                                          • Opcode ID: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                          • Instruction ID: 3fc232ab439a080190ee6cb70fb69c0bbe2e3af72d240b4a8e50c78308e3adad
                                          • Opcode Fuzzy Hash: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                          • Instruction Fuzzy Hash: 16B16C32A0AF418BEB658F25E44127977A4FB44B65F480935DB8F97B51EF3CE0688300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                          • API String ID: 111713529-3006446216
                                          • Opcode ID: 855c74e2298b12dfae87e416f71bfb0fd242813ebbe9111dfcebbe4282bd71ec
                                          • Instruction ID: 907f0a7665592b86385644e979203eab1a78cfa05bb9e45a9d4c22b59a7662aa
                                          • Opcode Fuzzy Hash: 855c74e2298b12dfae87e416f71bfb0fd242813ebbe9111dfcebbe4282bd71ec
                                          • Instruction Fuzzy Hash: DC71B856E0DFC185EB118B2994072BA7FA0EB45F94F584832CA4FAB353EE2DD149C301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                          • API String ID: 2190258309-1086287758
                                          • Opcode ID: 59aae337aff638c80ea522d502be7416802ba366a363efdf939df804e7f274dd
                                          • Instruction ID: b30226b2eded0ec0b3bafd9ec3a593903ce6129d169aa102ba470eddc9e9ff47
                                          • Opcode Fuzzy Hash: 59aae337aff638c80ea522d502be7416802ba366a363efdf939df804e7f274dd
                                          • Instruction Fuzzy Hash: F6B15072B08F5286EB508B65E8422AD7BA4FB48FA4F440435EE4EA7B59EF3CD545C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                          • API String ID: 1294909896-1220118048
                                          • Opcode ID: ee4d974dc3b3459793741b3c071e06878cee760591840d70200e270625e77535
                                          • Instruction ID: 595c227a2efe1e6c25f5ce456a5435b92869eeb0362c1d9abfc36d4f9eb611f1
                                          • Opcode Fuzzy Hash: ee4d974dc3b3459793741b3c071e06878cee760591840d70200e270625e77535
                                          • Instruction Fuzzy Hash: E6712C65A0CF4681EA10DB5294431FA6790FB89FA4F444932DE5EAB78BFF3CE605C640
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID:
                                          • API String ID: 111713529-0
                                          • Opcode ID: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                          • Instruction ID: b0d86548e41d3aa1cdeb3caa192d7005126b9edb3b2ba51d76df8373790b59e9
                                          • Opcode Fuzzy Hash: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                          • Instruction Fuzzy Hash: D3618C26A08F91C7EB25CF12A4459697BA4FB48FA0B498835DF4E9B755EF3CE484C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                          • API String ID: 1294909896-2312071747
                                          • Opcode ID: a239f058e62c514e76706a9140ba831bcd74617e94364339e7ba736567eb66f4
                                          • Instruction ID: 6c2168eadecf2540a36bc87c5a5c69a20206c2f38a73d732ab9f7ecf1cbf1b5f
                                          • Opcode Fuzzy Hash: a239f058e62c514e76706a9140ba831bcd74617e94364339e7ba736567eb66f4
                                          • Instruction Fuzzy Hash: 2FD1D4A1A0CF8246FA649B2590523B97251FB45BB0F400A35DAAFE72D3FF3CE8548344
                                          APIs
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                            • Part of subcall function 00007FF613986310: memcpy.VCRUNTIME140 ref: 00007FF613986486
                                            • Part of subcall function 00007FF613981FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982121
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398A851
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398A87F
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398A88D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398A8C7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398A924
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398A9DD
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398AA0B
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF61398AA19
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398AA53
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398AAA4
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61398AAEE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                          • String ID: value
                                          • API String ID: 3212548336-494360628
                                          • Opcode ID: 318b2423f1fc7c9365d9dea7f80e65f750f29bf68608046753f263769fa03efc
                                          • Instruction ID: c5e1ac1be63de4b98a028c31611f1e355f9dfcb1e08a727145ae969605b7113e
                                          • Opcode Fuzzy Hash: 318b2423f1fc7c9365d9dea7f80e65f750f29bf68608046753f263769fa03efc
                                          • Instruction Fuzzy Hash: C3A19772A18F8585FB009B65E4463AD2361FB85BB4F101B31DA6E62EDAEF7CD081D700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                          • String ID: Unknown error %d (%#x)
                                          • API String ID: 4262108436-2414550090
                                          • Opcode ID: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                          • Instruction ID: e9288a876a6959128c38dc09440207d17b54943a247f573296085f090ac520a5
                                          • Opcode Fuzzy Hash: 7b9888dc63a3e7c9f678162156a496c77b2712124fc0888817af1d5cf78b4351
                                          • Instruction Fuzzy Hash: 3331B261A08B4689FB156F22E81227D6691BF84FA0F484875DE8FE7797FE3CE4418301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$calloc$malloc
                                          • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                          • API String ID: 3103867982-1477229593
                                          • Opcode ID: f6aa1fc959be3f9f3a446533eda4e5d1b2324a14c444640e397b44d0ad8ee9cd
                                          • Instruction ID: 19b4328d5c75a6d49314d87ec322224eadb049590887b5bd7f7581cf2203b62e
                                          • Opcode Fuzzy Hash: f6aa1fc959be3f9f3a446533eda4e5d1b2324a14c444640e397b44d0ad8ee9cd
                                          • Instruction Fuzzy Hash: 95C15176A08F5186EB50CF65E4422AD3BA4FB44FA8F500836DE4EA7759EF38E845C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                          • API String ID: 2190258309-1457932261
                                          • Opcode ID: d66a8e2a531d88578f19dc84826a95064c5f9f86ba4d3b4d7cb9b6f8f2967699
                                          • Instruction ID: de90732a052e536ff82e4184a405da0dc058f870b2f1cfef3cff90a5e55e0757
                                          • Opcode Fuzzy Hash: d66a8e2a531d88578f19dc84826a95064c5f9f86ba4d3b4d7cb9b6f8f2967699
                                          • Instruction Fuzzy Hash: FF619162B08B8285EB118B21A4467FA27A1BB45BA4F844D35CD5FAB797FF3CE544C300
                                          APIs
                                          • memset.VCRUNTIME140 ref: 00007FF6139C9D8B
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139C9EB5
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995757
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995763
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139C9E6F
                                            • Part of subcall function 00007FF613995690: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139956A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freestrncpy$_strdupmemset
                                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                          • API String ID: 3826632026-748038847
                                          • Opcode ID: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                          • Instruction ID: c3de7c65aa1feb8b30d1fe436a2fda8e1cdcffcb282598253dcedf52251d1338
                                          • Opcode Fuzzy Hash: 1fef72c7444546989d73c0875fbfa1f9dd609a4fb55574ababa5f96400690454
                                          • Instruction Fuzzy Hash: 10717D32A0CEC695FB218F15D4427E96360FF84BA4F880532DA8EA725AFF38D555C750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                          • API String ID: 1294909896-3837278924
                                          • Opcode ID: 8bff296f59c387a8d797001e2b4b23bc00947aaa51299eb1c46842c7a3ab6500
                                          • Instruction ID: f86e8c69f0ab45cd79689f1ec271bdbbb3c2996f6f1af9a18ae666f7e3427b3d
                                          • Opcode Fuzzy Hash: 8bff296f59c387a8d797001e2b4b23bc00947aaa51299eb1c46842c7a3ab6500
                                          • Instruction Fuzzy Hash: 04D15E62A08AC295EF11CF24D0413B97BA1FB45FA8F849532CA4EA7796EF3CD546C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                          • API String ID: 1802528911-931584821
                                          • Opcode ID: 00404623e120793d597db3c352179d0aa63a3864e2c814257e5a1cf65cb6576d
                                          • Instruction ID: 9409fa99073e97e05c830ffc417986605c82abb7f809a6a4ae714b5f6cfab910
                                          • Opcode Fuzzy Hash: 00404623e120793d597db3c352179d0aa63a3864e2c814257e5a1cf65cb6576d
                                          • Instruction Fuzzy Hash: 8191CF32A08AC285F7218F15E4067EA67A1FB44BB8F480631EE8E57B96EF3CD145C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: sendto$_time64
                                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                          • API String ID: 2327272419-1785996722
                                          • Opcode ID: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                          • Instruction ID: 794562643c62833ee0688080aaecd92c124c4241aa79b03d3a4fe76c8a0dc6b4
                                          • Opcode Fuzzy Hash: 082182b0c608b5dd753e2c0b4bfb06eb638cf906bf23a4cf43ef42e9b11363e8
                                          • Instruction Fuzzy Hash: FF915D76608B81C5EB51CF29D4413A93BA0FB88F98F448532DA8E9B769EF39D506C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                          • API String ID: 3510742995-1652449680
                                          • Opcode ID: 6c3bbffbfaa8afe039b59d5f2ad093e3cc1498ca40d8528e7d0893ab42bc7699
                                          • Instruction ID: 97dd536c307d00ad97a1dd12d97b6764366387b395240fc2ff8940a7de95cb64
                                          • Opcode Fuzzy Hash: 6c3bbffbfaa8afe039b59d5f2ad093e3cc1498ca40d8528e7d0893ab42bc7699
                                          • Instruction Fuzzy Hash: 6FA15072E08E8681E7509F2594423F93791EB85FA4F484A31DD4FAB2A6FE7CE4458310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                          • API String ID: 1294909896-3146291949
                                          • Opcode ID: 2bc415dddcf2fbc5f9affb62417552fc3cfeb8ceedfac8cd1da88004e01584b9
                                          • Instruction ID: b23fdae6c0144a9b9ad9e722d97dc479eb33ab69a085ab54e7a2fc6738721ba4
                                          • Opcode Fuzzy Hash: 2bc415dddcf2fbc5f9affb62417552fc3cfeb8ceedfac8cd1da88004e01584b9
                                          • Instruction Fuzzy Hash: A8916121B0CF8286FB649F2594527B96290EF45FA4F448835DA4FAB68BFF6CE440C341
                                          APIs
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A5584
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A559A
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55AE
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55C2
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55D6
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55EA
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55FE
                                            • Part of subcall function 00007FF6139A5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A5612
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A4612
                                            • Part of subcall function 00007FF6139CE540: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE555
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE56F
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE58A
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5A6
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5C2
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5DA
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5F2
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE60A
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE622
                                            • Part of subcall function 00007FF6139CE540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE63A
                                            • Part of subcall function 00007FF6139CE540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE654
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139A4816
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139A4859
                                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF6139A499E
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139A4A1B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$free$callocstrtoul
                                          • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                          • API String ID: 954404409-4150109901
                                          • Opcode ID: 2ca85521c9ecdf955f9429382aae5dedbdb67b063789061bcb64614b8007046f
                                          • Instruction ID: 8eb7c657bbbbe3547ad784ac58ad121f8e1019a8587d902935f8c285dbe5c5d4
                                          • Opcode Fuzzy Hash: 2ca85521c9ecdf955f9429382aae5dedbdb67b063789061bcb64614b8007046f
                                          • Instruction Fuzzy Hash: 87C17531F08E8286EB649A2595563F97690FB85B64F040A31CA1FFB7A6FF3CE5548340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc$_time64calloctolower
                                          • String ID: :%u$Shuffling %i addresses
                                          • API String ID: 133842801-338667637
                                          • Opcode ID: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                          • Instruction ID: 7b10817d9186142873a3f4e6bb84defec302dbb793b7acc05bc8782e402d4cf7
                                          • Opcode Fuzzy Hash: 1c6b2c5cffc96e1f2faa13328d5cbc488b8c058bf72ff2addcdcbf0fc35252f0
                                          • Instruction Fuzzy Hash: E4719C72E19E8282EB508B11E4557A977A4FB48FA8F444A31DE4F977A6EF3CE445C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                          • API String ID: 1294909896-1896214517
                                          • Opcode ID: bcc6fd5a38e36d593fabfc2fa539815a04fff9fc478c505d022e484110f194b5
                                          • Instruction ID: 22a62c061b75d671db67f1ecd5b40b5014e0e298771128bcdbef99225bb8dbff
                                          • Opcode Fuzzy Hash: bcc6fd5a38e36d593fabfc2fa539815a04fff9fc478c505d022e484110f194b5
                                          • Instruction Fuzzy Hash: D5D17D72A09B8285EB60CF15E4427B977A0FB84B68F040936DE8E6779AEF3CD445C704
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                          • API String ID: 2190258309-1670639106
                                          • Opcode ID: 529f760526342dc532923641d4e7bfe965fc7578af4e37c6f5efba9c0881beb6
                                          • Instruction ID: 340023922128741dc29e717baa33446e1c858ee9a08d96479f74292ff4a606bc
                                          • Opcode Fuzzy Hash: 529f760526342dc532923641d4e7bfe965fc7578af4e37c6f5efba9c0881beb6
                                          • Instruction Fuzzy Hash: FFA18662909F8285EB518F25D445BB82B90FB44FA8F445831EE4FAB69BEF3DD494C301
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF0FB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF161
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF16F
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF26D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF2D6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF2EE
                                            • Part of subcall function 00007FF6139CE240: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139CE250
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF316
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF32D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF352
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF39F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139CF3B4
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF4FC
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF506
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF510
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF51A
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF524
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF52E
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF538
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF542
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF54C
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF556
                                            • Part of subcall function 00007FF6139CF4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF560
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$calloc$_strdup
                                          • String ID: ,$:
                                          • API String ID: 2460172880-4193410690
                                          • Opcode ID: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                          • Instruction ID: 708a8a770d96960d22d50beedd0768112b4c8d09fc94e57b2bf4dc818c0727e6
                                          • Opcode Fuzzy Hash: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                          • Instruction Fuzzy Hash: F1517012E1CF8643E7619B3595162B96750BB55FA8F04AA30DE8FA6647FF2CF1C88300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$free$strrchr$_access_stat64
                                          • String ID:
                                          • API String ID: 2557200964-0
                                          • Opcode ID: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                          • Instruction ID: b44eb301c585202dcbab8a4613c60173655bd92c326fff6f0bff272f9de0c6e7
                                          • Opcode Fuzzy Hash: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                          • Instruction Fuzzy Hash: 0F415221B09F828AFF509F12A8522792694FF48FA0F484934DA4F97796FF3CE9558700
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE555
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE56F
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE58A
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5A6
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5C2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5DA
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE5F2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE60A
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE622
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE63A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A45B5,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139CE654
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$callocfree
                                          • String ID:
                                          • API String ID: 1183638330-0
                                          • Opcode ID: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                          • Instruction ID: 30a0552e493f80d9299662d498edd24f52c69e5d8a50d0cc717aae323d6fa9c9
                                          • Opcode Fuzzy Hash: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                          • Instruction Fuzzy Hash: A1313A65F1AF0283EFA9DB56A15257826A4FF48F61B0C1834DA0F96742FF3CE4648360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy$strchr
                                          • String ID:
                                          • API String ID: 1615377186-0
                                          • Opcode ID: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                          • Instruction ID: 78d083cf2741022ce24a408d0f59eda5aa2609f8e9c6a13879cb2f070a5a8025
                                          • Opcode Fuzzy Hash: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                          • Instruction Fuzzy Hash: BC519F66B09F8142EA658F16A50627A7695BF44FE4F484930DE4FAB766FF3CE4058300
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6139A3D09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 97b97c4f9b03deb6ba4f315342eb381be36a29c9834092b213fdfb9fd5abec28
                                          • Instruction ID: ec8343198b0f8b62f83503d3e900814cb29beff34255935cd161e5ec7cd66d81
                                          • Opcode Fuzzy Hash: 97b97c4f9b03deb6ba4f315342eb381be36a29c9834092b213fdfb9fd5abec28
                                          • Instruction Fuzzy Hash: 22716022E08F8286E7658B25D4953B977A0FB44BA4F180A35DB4E977A2EF7DE454C300
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6139A3D09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 06bdd3633e5708c44053d2bde8a132e77b6d53fc0ee967ead5b8041a6449c34a
                                          • Instruction ID: 05097b5de168bf4de58712c35f22f5b8fec5d9aa24fd0b1f1794fbf91b9fb009
                                          • Opcode Fuzzy Hash: 06bdd3633e5708c44053d2bde8a132e77b6d53fc0ee967ead5b8041a6449c34a
                                          • Instruction Fuzzy Hash: 5461B223A0CF8286E7558B25D8953A97BA0FB44FA4F094935DB8E97362EF7CE455C300
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                          • API String ID: 0-1262176364
                                          • Opcode ID: 467d5c9c31773df116a706cbdf672d776cac5ef44452e7be24205e671929127c
                                          • Instruction ID: 4bfd121dd9d4fbf423de8138b00e3022ef3025d1885e4d3b8b4951e0d3c6baa9
                                          • Opcode Fuzzy Hash: 467d5c9c31773df116a706cbdf672d776cac5ef44452e7be24205e671929127c
                                          • Instruction Fuzzy Hash: 0B41A122B08B9286FB219B5AE5421BD6360BF45FA0F844831DA4FB7657FF7CE9448700
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6139B450A), ref: 00007FF6139A851F
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6139B450A), ref: 00007FF6139A8571
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6139B450A), ref: 00007FF6139A8595
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6139B450A), ref: 00007FF6139A85E5
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF6139B450A), ref: 00007FF6139A8628
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdupstrchr
                                          • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                          • API String ID: 153040452-3976116069
                                          • Opcode ID: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                          • Instruction ID: c32b0caebba69ccbf44df2b06405e6ff1ffbf80ca3fd30c2dd096e10d6d4eeee
                                          • Opcode Fuzzy Hash: 991cca11e921deaf2fb3f742e1aed303678f25a5ce7169caec8dc6d57ca1d1d1
                                          • Instruction Fuzzy Hash: 63419122B0CF8582E6209F01E4453AA7BA4FB45F94F440935DE8E9B755EF3CD556C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                          • API String ID: 2653869212-571364039
                                          • Opcode ID: 9dc0b852f7038322631c9ff623631b1be7e00c642b1ca7ddf154faf074b028e8
                                          • Instruction ID: b75f5ac77ea7f700f3e77d847b46b04d0c32340e0da39a10f9410f6f63779eed
                                          • Opcode Fuzzy Hash: 9dc0b852f7038322631c9ff623631b1be7e00c642b1ca7ddf154faf074b028e8
                                          • Instruction Fuzzy Hash: 9D413D66B08F8245EB119B6594461FA2B65BB45FA8F480C35CE4FAB757FF3CE5448300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139C7A08
                                            • Part of subcall function 00007FF6139A5840: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF6139B1655,?,?,00000000,00007FF6139B19B5), ref: 00007FF6139A5855
                                            • Part of subcall function 00007FF6139A5840: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF6139B1655,?,?,00000000,00007FF6139B19B5), ref: 00007FF6139A586B
                                          • memcpy.VCRUNTIME140 ref: 00007FF6139C7828
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139C7979
                                          • memcpy.VCRUNTIME140 ref: 00007FF6139C7A42
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139C7A4E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$memcpy$realloc
                                          • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                          • API String ID: 657767516-1165944077
                                          • Opcode ID: f3879a8a08388b93ace09444e092abff1d8c4238582cb68e877fd15ded32fa93
                                          • Instruction ID: a7c5db3e51a239e5ee755e10a0535674ba492e3a0227ceb09fa63d0d2906fc3f
                                          • Opcode Fuzzy Hash: f3879a8a08388b93ace09444e092abff1d8c4238582cb68e877fd15ded32fa93
                                          • Instruction Fuzzy Hash: E9715F32B09F859AE658CB25D8413AD67A4FB49BA0F444835EF9E97755EF3CE460C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_time64
                                          • String ID:
                                          • API String ID: 3087401894-0
                                          • Opcode ID: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                          • Instruction ID: 8745e25900fb199f6d70221e646cd2f3e12c0bf6cec86bb9f1390e4f45e586c7
                                          • Opcode Fuzzy Hash: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                          • Instruction Fuzzy Hash: F3216136A19F5186EB509F12E8415796B74FB48FA4F090831EE8F97716EE3CD885C340
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                          • API String ID: 0-808606891
                                          • Opcode ID: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                          • Instruction ID: 6a8df083cb3146ca7a1284cec0b122833ef4f3f3b50e5ea98f4cbe461081bd4c
                                          • Opcode Fuzzy Hash: 3ff7f47f9996d535c6382d0025158cafa12b24fe735b2f180ded5116634d41eb
                                          • Instruction Fuzzy Hash: 6DB1B062908E89C1E7248F28D08127C3762FB95F68F644971C65F932DAEF3CE8A5D350
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139DE30A
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139DE358
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139DE3BB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139DE4F9
                                            • Part of subcall function 00007FF6139D22A0: strchr.VCRUNTIME140(00000000,?,?,00007FF6139D185F), ref: 00007FF6139D22E6
                                            • Part of subcall function 00007FF6139D22A0: strchr.VCRUNTIME140(00000000,?,?,00007FF6139D185F), ref: 00007FF6139D22F6
                                            • Part of subcall function 00007FF6139D22A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF6139D185F), ref: 00007FF6139D2320
                                            • Part of subcall function 00007FF6139D22A0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D2355
                                            • Part of subcall function 00007FF6139D22A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139D237A
                                            • Part of subcall function 00007FF6139D22A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139D239C
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6139DE584
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$callocmallocstrchr$freestrncpy
                                          • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                          • API String ID: 370574955-353107822
                                          • Opcode ID: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                          • Instruction ID: 7ee935f399b4cddcea8e4f947dda7f1077043fcd0b89be71be5229824fa19888
                                          • Opcode Fuzzy Hash: 765f7b10c892f1fb1e6010970bd4640316ed08fb1ae60ff5c030ea6a027f76d4
                                          • Instruction Fuzzy Hash: 8EA15D32A08F5586EB508F65E4422AD77A5FB48FA8F040835EE4EA7B59EF38E445C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                          • Instruction ID: 4b928952786892bcdf586d4d08d069d69ea635228cf95a1073b818dccee53b7a
                                          • Opcode Fuzzy Hash: 328f28ee43acbe02e3b55e4857f65d3be118cca83605d292f44299386820e1f1
                                          • Instruction Fuzzy Hash: 5F915221A0DF978EFF718F2690463B96794AF45F64F480835CA8F96693FE2CE4448350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                          • API String ID: 1169197092-907567932
                                          • Opcode ID: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                          • Instruction ID: e631dd88706a21717c648555532cd14924c352e2a7032aed03fd4a40ba0f4d18
                                          • Opcode Fuzzy Hash: 2edee1d6d6b9369a94ec35f2711a8e3ce3417dfda42f4832661bacb91708de52
                                          • Instruction Fuzzy Hash: C071E76190CB8286F7145612954367A7AD0FB01FA4F04C8B5DE9BEE6CBFF2CE4548701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                          • API String ID: 1169197092-978722393
                                          • Opcode ID: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                          • Instruction ID: 6dc28a2e183e345f7c15217e8394accd2562fa12bab8edc43f7f2929e6f60376
                                          • Opcode Fuzzy Hash: 8bdde5ae7f6a45b5a7f26c8991cb0c6dd01dc0cbdf0c72bd889af76c7a23e672
                                          • Instruction Fuzzy Hash: 1D715E21A0DF938AFF718F2690463BA2794AF45F64F494835CA8F96693FF2DE4448350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfreestrpbrk
                                          • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                          • API String ID: 1812939018-2300960079
                                          • Opcode ID: ec7dde51753d90db8e99e92e45708158327cfa7a3992d6b3b56b6418e18a2dea
                                          • Instruction ID: 27b8a401e5aa1c1ce6ed11ca859196988b1cfd9f51c6318c9ea2e966786851bc
                                          • Opcode Fuzzy Hash: ec7dde51753d90db8e99e92e45708158327cfa7a3992d6b3b56b6418e18a2dea
                                          • Instruction Fuzzy Hash: E8519262E08F8281EB15CB15E4117B967A0FB46FA4F844631DA8FA3796EF2DE544C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$callocfreestrrchr
                                          • String ID: Wildcard - Parsing started
                                          • API String ID: 2641349667-2274641867
                                          • Opcode ID: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                          • Instruction ID: fb37cd6b9caa5504b35849f1c3075adfe8d9213f094ffbd86474c8752ac08bbf
                                          • Opcode Fuzzy Hash: 7821651418ac284b7fe37018b700e1dd8bffd1ee22ba97486258aa5e4425af75
                                          • Instruction Fuzzy Hash: EA515732A08F8285EB55CF15E4421B836A5FB84FB4F494835CA8FAB392EF38E555C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                          • API String ID: 2653869212-3672398475
                                          • Opcode ID: 595424baaf0bc46a46dd7db77f120e4f57f80110cac3368c3dfe95d5b267a38e
                                          • Instruction ID: ac39276ef3fcbc35b91e7be6a73691b9a0c64d8eda81ddc2156b61f304b94590
                                          • Opcode Fuzzy Hash: 595424baaf0bc46a46dd7db77f120e4f57f80110cac3368c3dfe95d5b267a38e
                                          • Instruction Fuzzy Hash: A7418E62B08F8285EB118B6594461FA2B65BB05FA8F880C35DE4FAB757EF3CE1448300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139996CD
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139996F7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999701
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399970B
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999715
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399971F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999729
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999733
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF61399973D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999746
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF6139A10B9,?,?,00000000,00007FF6139A15F5), ref: 00007FF613999761
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                          • Instruction ID: 5bb70ccfdd58e1bdd361185c8b7a0bdf06908b398a5b70c7a69a014266fede5e
                                          • Opcode Fuzzy Hash: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                          • Instruction Fuzzy Hash: 8121F836A18F5182DB509F22E8855686B74FB88FA0F480431EE8FA7725DE3CD889C300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF4FC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF506
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF510
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF51A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF524
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF52E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF538
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF542
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF54C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF556
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139CE522,?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CF560
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                          • Instruction ID: a047f219bfb41ef4a7a836ae910049db6e322bb93d4240fba66c29d235a38e53
                                          • Opcode Fuzzy Hash: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                          • Instruction Fuzzy Hash: 9A01B926728E11C3D7549F25DC554782B34FF88F65B581431DE4F9A225EE38D899C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: mallocmemcpy
                                          • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                          • API String ID: 4276657696-1832275178
                                          • Opcode ID: 69b0ccfb545972a865a62a18da8bb8aafa5613a807871fdf383be4992c4471e4
                                          • Instruction ID: 4b53ef4f47895fa28026435d82e2d1dd62f9a87bc4709a4c09340cbfe581a666
                                          • Opcode Fuzzy Hash: 69b0ccfb545972a865a62a18da8bb8aafa5613a807871fdf383be4992c4471e4
                                          • Instruction Fuzzy Hash: 2EA17062E09F8285EA658F11A5423A973A4FB44FA5F044935DE8FA379AFF3CE440C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                          • API String ID: 3313557100-1003742340
                                          • Opcode ID: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                          • Instruction ID: 94affb554dc9db49de4db44cc3977b4671624ab0cc851415c64de0d5c1626ee8
                                          • Opcode Fuzzy Hash: ac4d52a539b15f27428fc5d89cc48acd8341c1d8d3da493b39954d9423c2a7b7
                                          • Instruction Fuzzy Hash: 27818236A08F81C1EA548B26D4427AA67A4FB55FA4F444835DF8FA7742EF7CD4A1C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                          • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                          • API String ID: 1392894463-1168109407
                                          • Opcode ID: 6e76f70bd5b8103ca8f58d44c944ae791c305b292061b6a87a6ed5ada98c8c51
                                          • Instruction ID: d27c0a9a80212af90307dab084b58e0d7ef71ec3eef741a7e2c6642ad21ef39a
                                          • Opcode Fuzzy Hash: 6e76f70bd5b8103ca8f58d44c944ae791c305b292061b6a87a6ed5ada98c8c51
                                          • Instruction Fuzzy Hash: 4D418125A0CE8386EA508B2694422BD6790AF45FE4F444931EA9FE7397FF3CE905C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$mallocrealloc
                                          • String ID: 0123456789-$<DIR>$APM0123456789:
                                          • API String ID: 359134164-4291660576
                                          • Opcode ID: b87fbd036890b47f9b0cd1bab2e43e5707946047c1b405ef22310b67469fa962
                                          • Instruction ID: 85d7ce92110357a38b3dfe51bb1a8d6136be0780539f60d53b6d814bb43015de
                                          • Opcode Fuzzy Hash: b87fbd036890b47f9b0cd1bab2e43e5707946047c1b405ef22310b67469fa962
                                          • Instruction Fuzzy Hash: B6B14976A08B4686EB649F29D05333967A0FB44FA8F144839CA4F97796EF38E451CB40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: malloc$Ioctlsetsockopt
                                          • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                          • API String ID: 3352517165-607151321
                                          • Opcode ID: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                          • Instruction ID: a93fb9e810f8b240c8046d0d7f256c179f2ea1fe09c455a77e37a53c2016e752
                                          • Opcode Fuzzy Hash: ee81accd4b847cd42e6af56fc2334136a251d3c0f8ce0672d0cf2a3ae3100591
                                          • Instruction Fuzzy Hash: 8FB18232E08F8286EB659F25D0553F93790EB44F69F080635CE4E9A7AAEF3C9485C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 8139019e80c5ec88f17aeb8915c878c5d1d47a621de3c7b0d0edb2625798ab54
                                          • Instruction ID: 37fd4c2c5545e2be10836b1c8cd7b646c4ffb90be9bf19d766983e49d25824db
                                          • Opcode Fuzzy Hash: 8139019e80c5ec88f17aeb8915c878c5d1d47a621de3c7b0d0edb2625798ab54
                                          • Instruction Fuzzy Hash: 7761B562A18F8585EB10CB75E4463ED6361FB85BB4F005731EA5EA6ADAEF38D081D700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                          • Instruction ID: 263a52fba9c3387e2a81c5320ac97d8e9d42c8e0545d2365a01622646db22a88
                                          • Opcode Fuzzy Hash: 595543e97e4f44316877afba9dfb2750bd3319d5226b2b7634a77da9004cd7a0
                                          • Instruction Fuzzy Hash: 4761A572A18E8585FB108B75E4463ED2361FB85BB4F105B31DA6E66ADAEF7CD081D300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freeisupper$mallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3511497317-3412697401
                                          • Opcode ID: b52c7bb7d1c7cac77b7c8d046bf2007316f3759b90af48cd7ee6a67ced8cd261
                                          • Instruction ID: c37b6906467d83bc66641b899896e647d64d32b7ec57076e1e0faf8bd52992a7
                                          • Opcode Fuzzy Hash: b52c7bb7d1c7cac77b7c8d046bf2007316f3759b90af48cd7ee6a67ced8cd261
                                          • Instruction Fuzzy Hash: B6511711E0DA9245FB1A9B25815B3786F93EB11FB0F044A35C6AFE6AC7EE2D9445C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _close$_fstat64_openstrchr
                                          • String ID: Can't get the size of %s$Can't open %s for writing
                                          • API String ID: 423814720-3544860555
                                          • Opcode ID: 13e5b1f758b492002390f4d21743b9d9be13eeb5f45215b79f59d9c128932a50
                                          • Instruction ID: 5530d95a2d893c9f423f87ec5fcf65fe34cbcc667444581c7343b9b1d1653366
                                          • Opcode Fuzzy Hash: 13e5b1f758b492002390f4d21743b9d9be13eeb5f45215b79f59d9c128932a50
                                          • Instruction Fuzzy Hash: 27517462B08E4681EA149B25D8127B96391FB84FF4F484935DA5FA7396FE3CF4458340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLasthtonssend
                                          • String ID: Sending data failed (%d)
                                          • API String ID: 2027122571-2319402659
                                          • Opcode ID: befb03195a2148d1b1ff0ac0ac481479d5c72445e3b291bc39e30fad092fb3ed
                                          • Instruction ID: 47ab98c2344e0c9478033e4452fbfcc01b8d9c23d83d5e2c03561d6ee547db5f
                                          • Opcode Fuzzy Hash: befb03195a2148d1b1ff0ac0ac481479d5c72445e3b291bc39e30fad092fb3ed
                                          • Instruction Fuzzy Hash: 2D41BF32A08E8685E7015F76D411AAC3730F754FA9F848932DB9A93756EF7CE456C301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 111713529-2901970132
                                          • Opcode ID: af7acaef84084e0d3a6a94bc248c2c0a1cef4ae4d46cb6da752fa977f64bedcd
                                          • Instruction ID: eaa5e5b9110eba3428f7978592cc2a052704fec0aab2f8bc68cd82a4929efe0a
                                          • Opcode Fuzzy Hash: af7acaef84084e0d3a6a94bc248c2c0a1cef4ae4d46cb6da752fa977f64bedcd
                                          • Instruction Fuzzy Hash: E2312865A08F8245EB159B6198470FA2BA5BF05FA8F480C35DE4FAB757FF3CA5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 111713529-517259162
                                          • Opcode ID: bbb5a7a9f1b646046fe03c8c4798a3fb899d3ca6497a6504817b76176552b82e
                                          • Instruction ID: 2109513d34bc074a350ecb8bfe0f6b7b9066c581e6db3d5d8c6917fd407e6727
                                          • Opcode Fuzzy Hash: bbb5a7a9f1b646046fe03c8c4798a3fb899d3ca6497a6504817b76176552b82e
                                          • Instruction Fuzzy Hash: 44314951E09F8245EB119B6594461FA2BA5BF05FA8F880C35DE0FAA797FF3CA5488300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                          • String ID:
                                          • API String ID: 3063020102-0
                                          • Opcode ID: ed39c7d1c51f3db297fe99c6e755470af78e6e1de6504059e5262683a49ffbc1
                                          • Instruction ID: c07f161c297f8f4740bbc5cda88ee349d463827ad52dd7608e23d91ee07a8776
                                          • Opcode Fuzzy Hash: ed39c7d1c51f3db297fe99c6e755470af78e6e1de6504059e5262683a49ffbc1
                                          • Instruction Fuzzy Hash: 0CB1B262B18F4685EB10CB65E4023AD2361EB84BB8F404A75DE6E67AD7EF3CD095D340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-3805148269
                                          • Opcode ID: c6ae9fa0a038b8fac058063dacbcb7526f06a8394d406d1e43624cac3139f064
                                          • Instruction ID: 27799b27ccdf6106aa0459f69f105e7c16d2ce9144bcf7e7d9f1cd6b5907e3b5
                                          • Opcode Fuzzy Hash: c6ae9fa0a038b8fac058063dacbcb7526f06a8394d406d1e43624cac3139f064
                                          • Instruction Fuzzy Hash: 7A715A62E08BD244EB108F2595461FD6BA5BB05BA4F444C36DA8FAB756FF3CE545C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-599393795
                                          • Opcode ID: 83c56e755e620055c0fa3659b43fafff221207177ab0696b05b148a0a566e44a
                                          • Instruction ID: b6afb97f305cf561c66860c84ecb24cc79509682829c74e85a4dc6d8a54a8803
                                          • Opcode Fuzzy Hash: 83c56e755e620055c0fa3659b43fafff221207177ab0696b05b148a0a566e44a
                                          • Instruction Fuzzy Hash: 75618062E0CF9244EB108B2595461B96BA5BB05FA4F844835DA4FAA75BEF3CE544C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                          • API String ID: 1294909896-1642401773
                                          • Opcode ID: 59f460ac5380dd79f6a867ac5ef20a454ae35efbab770c3c74f0f6e64463f9e0
                                          • Instruction ID: 53edafb0765af92a2c63831688d1217ad89088fe0af4415e830f2c3929cd41bb
                                          • Opcode Fuzzy Hash: 59f460ac5380dd79f6a867ac5ef20a454ae35efbab770c3c74f0f6e64463f9e0
                                          • Instruction Fuzzy Hash: 4E514E62A08F8284EB109F6594421ED6B65BB45FA8F884C35CA4FAB357FF3CE6448300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-3876350232
                                          • Opcode ID: 718e0edb844c39f72f5a5453fececd066911b5f4b0fc70f80471252c26b35449
                                          • Instruction ID: 197fec0376d2c4eb84b9f6449a1efe15f27bac425650b670126bb6d3ea933b04
                                          • Opcode Fuzzy Hash: 718e0edb844c39f72f5a5453fececd066911b5f4b0fc70f80471252c26b35449
                                          • Instruction Fuzzy Hash: 1B512E62E0DF8284EB108B6594421F96BA5BB45FA4F884835DA4FAB757EF3CE544C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: 2ceff9df3f33277577f0104260bbffde3566e5b22424af7c496f0e4332a6a445
                                          • Instruction ID: 6543eeaf735b44c30bc3225e18add0988f7707fbd1aa90b4a260071c0ac0fb9e
                                          • Opcode Fuzzy Hash: 2ceff9df3f33277577f0104260bbffde3566e5b22424af7c496f0e4332a6a445
                                          • Instruction Fuzzy Hash: 34418E65A08B8245EF159B6294061FD2BA6BF15FA8F480D35CD4FAB797FF3CA5048300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                          • API String ID: 2190258309-1780565354
                                          • Opcode ID: 1cc48e0c41870337beabcd0a033c8b29a8aea442c7c760e77b31f6e6c80b91b2
                                          • Instruction ID: 1bf8b0f5f8d8f492d8cb7ea18d10f69c5764aba687e4ea9c6963ee72f6786b03
                                          • Opcode Fuzzy Hash: 1cc48e0c41870337beabcd0a033c8b29a8aea442c7c760e77b31f6e6c80b91b2
                                          • Instruction Fuzzy Hash: 11417471A0CFC6C2EB618B26E4422B86794BB45FA4F544831CE8FA7657EE3CD445C310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 725999a47900e04c1776c750a0a3892cffa72dc707c286e8c641b5765a13ecac
                                          • Instruction ID: 743c575ae5cd47e3bf7170c99563dba9822b41c9989a5dd7c647338d5cf64740
                                          • Opcode Fuzzy Hash: 725999a47900e04c1776c750a0a3892cffa72dc707c286e8c641b5765a13ecac
                                          • Instruction Fuzzy Hash: 48414632908F9282FB618F21D44167937A8FB49F64F448935DE8EA7359EF38D850C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                          • Instruction ID: 6aa4521f9c914727a0210982be95090a74019989c1e611fdabe2a004c3c0bc6e
                                          • Opcode Fuzzy Hash: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                          • Instruction Fuzzy Hash: B6311E36A18F5186E7509F12E8156697B64FB88FE4F480431DE8EA7B59EF3CD845C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 6a71efeabdaa36d73244b4352c5f5012b7b3ec64435facd515957462087f5632
                                          • Instruction ID: 8b2ca0ee2467ef36611bd66665eb4f343b382000203c51cd6c4ca3834db54a94
                                          • Opcode Fuzzy Hash: 6a71efeabdaa36d73244b4352c5f5012b7b3ec64435facd515957462087f5632
                                          • Instruction Fuzzy Hash: 0D21EA36618F5186D7509F22E8554697B78FB88FA4F480831DE8E97729DF3CD489C700
                                          APIs
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6139D2AB3), ref: 00007FF6139D3748
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6139D2AB3), ref: 00007FF6139D378A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6139D2AB3), ref: 00007FF6139D382F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6139D2AB3), ref: 00007FF6139D3842
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D3D27
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$memcpystrchr
                                          • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                          • API String ID: 1438451818-3030351490
                                          • Opcode ID: a8182fd0dfdacbe33f9d3f9c7374c26c3e360a6d2655ff1bf9f5d1c61c0da78b
                                          • Instruction ID: b4426a4d3808661923a73d4a1da79daf11152e5751767ac17b65b9d0dcf60af2
                                          • Opcode Fuzzy Hash: a8182fd0dfdacbe33f9d3f9c7374c26c3e360a6d2655ff1bf9f5d1c61c0da78b
                                          • Instruction Fuzzy Hash: 2A02A452B08FC386F7119AA6D4877BA2795AF45FA8F444831DE0EE7787FE68D8448340
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF61399A92A,?,?,?,?,?,?,?,00007FF61399A6F7), ref: 00007FF6139B7911
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6139B7AB3
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6139B7AD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                          • API String ID: 2644425738-1191287149
                                          • Opcode ID: 6731cf7eb79fe99fc956e7da2918d2a85c4fd8fba441eb85d481e59dff622fac
                                          • Instruction ID: 9a64ba2fd963b2791cde84b02517ec8dcc91d6440f7428428b3bffcd0de733b4
                                          • Opcode Fuzzy Hash: 6731cf7eb79fe99fc956e7da2918d2a85c4fd8fba441eb85d481e59dff622fac
                                          • Instruction Fuzzy Hash: 31512612E0DBD741EE218B25A41257E7690AF45FA8F9C8A31DA4FAE74AFE3CD541C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                          • Instruction ID: a8c1d324c3a3be7b2f000fc34131bf9e45f6d67299d469d415a9bc48b391cddf
                                          • Opcode Fuzzy Hash: 90133f61e9f3a2972452251f6a672964b389b412b9e8e14f35b27df89e8546ac
                                          • Instruction Fuzzy Hash: 33615121A09F938AFF718F2690463BA6794AF44F64F090835DA8F92693FF2DE4448350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 573759493-910067264
                                          • Opcode ID: 526dd6a61990846182b873f93f743bd90d9af5d28ecef45840b88224687b0280
                                          • Instruction ID: fbf8c51e5f72d4ed0a826e67c8b8a1736e16dc8bb34e0dba0bd2de270aff6a13
                                          • Opcode Fuzzy Hash: 526dd6a61990846182b873f93f743bd90d9af5d28ecef45840b88224687b0280
                                          • Instruction Fuzzy Hash: A8610861E0CE9644FB11AF2595072797BA6EB11FA4F944831C68FE2A96FF3CD941C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdup$strchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3404610657-2292467869
                                          • Opcode ID: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                          • Instruction ID: b8b7be36e436ec45f7a4c490c3353ce073c631944b639ebb1f8e0109254d0276
                                          • Opcode Fuzzy Hash: 62dffb43bf084e46f221ed9f2adcc8f6b7e67df89a3940d09ae168eab1eb17b1
                                          • Instruction Fuzzy Hash: B4615361A09B978AFF718F2590463BA6794EF44F64F090835DE8F92693FF2DE4448350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strstr
                                          • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                          • API String ID: 1392478783-2096918210
                                          • Opcode ID: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                          • Instruction ID: cc5de1e832b4aaf00f88a4a47cf909157bff119e5b5bb3bb87d1e1f7f9033dd6
                                          • Opcode Fuzzy Hash: 6e3d0a3c5aa691337795dccfca836fcde4962f08d3d7d525d14d9e7aa75dc6f1
                                          • Instruction Fuzzy Hash: 3751E762B08F8242FB259719A4862B87390FB45F74F440A31DA5F92AD3FF7CE5858700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freememcpy$malloc
                                          • String ID: Failed to alloc scratch buffer!
                                          • API String ID: 169112436-1446904845
                                          • Opcode ID: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                          • Instruction ID: 60c17c51544002dadaa7db461119dd6bce054a313ee7574a7aa5eb950b1f9905
                                          • Opcode Fuzzy Hash: 983475b5252fee3b519ee8893d5ff2ec22a28cab796edf3ac853c7e78d6e9305
                                          • Instruction Fuzzy Hash: E551A032618BC196EA258B65E4016EA7794FB49B94F440935DF8EA7752EF3CE164C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastfreememcpy
                                          • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                          • API String ID: 1248052217-2335292235
                                          • Opcode ID: fa97018fce896f81ca5d4429d1ceceda691d05f0cb1cad433c6317878a5e6d84
                                          • Instruction ID: d72eab64d6df6ed8de46d54f95e7724c1cf08e6b53b8080b71a6cc3ef3d32c24
                                          • Opcode Fuzzy Hash: fa97018fce896f81ca5d4429d1ceceda691d05f0cb1cad433c6317878a5e6d84
                                          • Instruction Fuzzy Hash: 1D518221B0CE8285FB649A1595823B92290BB45FA4F888935DE4FE76D7FF2CE945C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Digest$stale$true
                                          • API String ID: 1294909896-2487968700
                                          • Opcode ID: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                          • Instruction ID: 2c23bfb073f6062da46ff6a227162ce23e4e0fd9cb7ae9160dd94a564b44e18e
                                          • Opcode Fuzzy Hash: 29f2d144675f23a553318cadf2dbd3e2c172a0bf61d37d97765e181fdbbf1ba6
                                          • Instruction Fuzzy Hash: 20516121A0CE4286EB608B25E8523B977A0FF44FA4F484571DADE976D2FF2CE555C700
                                          APIs
                                            • Part of subcall function 00007FF613986DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6139823CB), ref: 00007FF613986E4E
                                            • Part of subcall function 00007FF613986DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6139823CB), ref: 00007FF613986E5C
                                            • Part of subcall function 00007FF613986DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6139823CB), ref: 00007FF613986E72
                                            • Part of subcall function 00007FF613983BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF613981D8B), ref: 00007FF613983BF6
                                            • Part of subcall function 00007FF613985DD0: memcpy.VCRUNTIME140(?,?,?,00007FF613981DBA), ref: 00007FF613985E61
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982469
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139824A8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139824F6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982544
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                          • String ID: at line $, column
                                          • API String ID: 2665656946-191570568
                                          • Opcode ID: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                          • Instruction ID: 263a33be92955d0171b33eb2b00096053eafcfc9f8584c3b48d69557b9370122
                                          • Opcode Fuzzy Hash: 57100d119804690e628be863f834d55bd5b6b334a7ff37d4b486aad42ae39a7f
                                          • Instruction Fuzzy Hash: F3517162F04F4585FB00DB75E4463AC2362EB84BB8F005675DA6E63BEAEE38D4959340
                                          APIs
                                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984A93
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984AE7
                                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984B0E
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984B36
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984B7C
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984B83
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF61398314B,?,?,?,00007FF613983104), ref: 00007FF613984B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                          • String ID:
                                          • API String ID: 1492985063-0
                                          • Opcode ID: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                          • Instruction ID: 8a23f3e9c78c221383757e0ba48bc1c2962500b78f452bf41e47e745b3414a18
                                          • Opcode Fuzzy Hash: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                          • Instruction Fuzzy Hash: B8517332608E4581EB208B1AD58227CA7A0FFC4FA5F15CA75CA5FA77A2DF3DD4469304
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                          • API String ID: 1294909896-1255959952
                                          • Opcode ID: 41c08fb2ae54d73b9aad3b1fb28f7d5162b95befd8a93294c5f9c0ba9144d006
                                          • Instruction ID: fb550ce0af918a9d6de16f8a8887e03aee9483a1c836dec7fa8b48c12fd0b7d3
                                          • Opcode Fuzzy Hash: 41c08fb2ae54d73b9aad3b1fb28f7d5162b95befd8a93294c5f9c0ba9144d006
                                          • Instruction Fuzzy Hash: CF517F22A08B8296FB11CB25D4832B92B95FB41FA4F444831DA8EA7782EF3DE455C351
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _time64
                                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                          • API String ID: 1670930206-870032562
                                          • Opcode ID: 5603a38b167ad5d39fbdc1c17dec4cf10488a2e3eb711140c002149bca51ea0d
                                          • Instruction ID: 35cae594aa7b6b1849a25081d67b0038296d122bfcc25e396ed3e582134d6254
                                          • Opcode Fuzzy Hash: 5603a38b167ad5d39fbdc1c17dec4cf10488a2e3eb711140c002149bca51ea0d
                                          • Instruction Fuzzy Hash: 67412D76B14A5682DB20CF2AE00156877A0F798F98F505831DE0DD7B55EE39E942CB40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: fseek
                                          • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                          • API String ID: 623662203-959247533
                                          • Opcode ID: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                          • Instruction ID: 32b002eddaf477a9795720c9bcf977066f0d52a0b31270ad4aa96addb2db5100
                                          • Opcode Fuzzy Hash: 636c29a6ac46b64cd287b79ad26834ec061afeb8b3ebe0566f26f826e7c36bbb
                                          • Instruction Fuzzy Hash: 8D413461F14E8181FB549F2A94463B92391EB85FA4F481531DE0FDF796EE2DD480C744
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-3155708153
                                          • Opcode ID: 0b765e0755920559e9d2752ae23419eff446ece7a23fa35f3ed63ae1d9cff77a
                                          • Instruction ID: f8f692cfcc58db9b5ae943db12a15ebe108f085e2dc66e60f02ac96d0556126b
                                          • Opcode Fuzzy Hash: 0b765e0755920559e9d2752ae23419eff446ece7a23fa35f3ed63ae1d9cff77a
                                          • Instruction Fuzzy Hash: A4414A62A08B9245EA109B6594471FE2BA5BB05FA8F844C35CE4FAB757FE3CE1488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                          • API String ID: 2190258309-3662781045
                                          • Opcode ID: 2d839c62f561e1cb6da38a300fc64ca3975719bf1c477f748898bce26a61f6bd
                                          • Instruction ID: 48b86bb686c4e1181234c5d5e89cd180192ecd000b07d652eecef7ec8ff02064
                                          • Opcode Fuzzy Hash: 2d839c62f561e1cb6da38a300fc64ca3975719bf1c477f748898bce26a61f6bd
                                          • Instruction Fuzzy Hash: E0414F26A0CF8281EB108B15E4461EA67A5FB45FA4F584832DA4EAB75BEE3CE545C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-659367561
                                          • Opcode ID: 43aff7a05e90a007a98c231397dc463d57d0ef91e1f3fe74e4c719b20d4e5bc1
                                          • Instruction ID: 0d7a6353548d43bafc5ec4c6b8040e26f5301a7387cab0fb8b67c94da76aa248
                                          • Opcode Fuzzy Hash: 43aff7a05e90a007a98c231397dc463d57d0ef91e1f3fe74e4c719b20d4e5bc1
                                          • Instruction Fuzzy Hash: D6417B52B09F8244EE109B6694471F92BA1AB05FA4F884C35DE4FAB797FE3CE1488340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$freemallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 2172629687-3412697401
                                          • Opcode ID: 8ef32bb30e83b178644582b19e9688f8a4366afb6a486a2f55abccd6880cd497
                                          • Instruction ID: 9d53b75d3ead2faea8efcf3a65b7fb36c096daae4c7387da4c98b8167db5c438
                                          • Opcode Fuzzy Hash: 8ef32bb30e83b178644582b19e9688f8a4366afb6a486a2f55abccd6880cd497
                                          • Instruction Fuzzy Hash: 8431D311E0DE9245FB16DB2685473786B93AB15FB0F040E31C99FE6AC7EE2D9841C300
                                          APIs
                                            • Part of subcall function 00007FF6139BBF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A04B9,?,?,?,?,00007FF61399F85B), ref: 00007FF6139BBF68
                                            • Part of subcall function 00007FF6139BBF40: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6139A04B9,?,?,?,?,00007FF61399F85B), ref: 00007FF6139BBF8E
                                            • Part of subcall function 00007FF6139BBF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A04B9,?,?,?,?,00007FF61399F85B), ref: 00007FF6139BBFAF
                                            • Part of subcall function 00007FF6139BBF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6139A04B9,?,?,?,?,00007FF61399F85B), ref: 00007FF6139BBFC0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D04CF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D0518
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D0521
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$realloc$EnvironmentVariable
                                          • String ID: %s%s.netrc$%s%s_netrc$HOME
                                          • API String ID: 4174189579-3384076093
                                          • Opcode ID: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                          • Instruction ID: fc05431279652c78fd1ae04d8baa8eccdc1e2722dae3ceec1bc7934b7f4cfbd3
                                          • Opcode Fuzzy Hash: ce33ce03b15b08335ee075b48f2ac132f7423bfbe585d713eb93ca792406d6ff
                                          • Instruction Fuzzy Hash: FB318462A0CF4182EA50DB17B8070AA76A4BF45FE4F484931ED8EA7756FF3CE4458700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanf_strdupfree
                                          • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                          • API String ID: 860312144-3309259123
                                          • Opcode ID: 3aaf3bd9c98613ab1b966e3da1ed5605299526585c756a4ca27d5f183527908c
                                          • Instruction ID: 691e0366417988bbe5197a0ff1bf238191d129297e89c8292fdc6ba618874874
                                          • Opcode Fuzzy Hash: 3aaf3bd9c98613ab1b966e3da1ed5605299526585c756a4ca27d5f183527908c
                                          • Instruction Fuzzy Hash: 29313221E0CE5281EA649B11A0525B93358FF44FB4F548832DA4FAB65BFF3CE855C341
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1941130848-1663925961
                                          • Opcode ID: e1078ee6254317aa7f302fe12d14b7c1b0a0c2898ed5fbaf491c85de4fe40530
                                          • Instruction ID: 47a4d8ab1ab9f17cb5b37d59c2d85a12332f4a66f77eb2167fa65dd82d0458e5
                                          • Opcode Fuzzy Hash: e1078ee6254317aa7f302fe12d14b7c1b0a0c2898ed5fbaf491c85de4fe40530
                                          • Instruction Fuzzy Hash: 2A212166B0CF8242EA508B15A4466EA6764BB85FA4F440832DE4F6B717EE3CD1458700
                                          APIs
                                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139A5675
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139A56A1
                                          • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139A56A9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139A56CB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF6139A29BC), ref: 00007FF6139A56E2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_errnostrerrorstrtoul
                                          • String ID: Invalid zoneid: %s; %s
                                          • API String ID: 439826447-2159854051
                                          • Opcode ID: c0c8fcb44667ca2c8fe23aa92df2b9262a7bcb97f9c91f97d65f5fb040fd2184
                                          • Instruction ID: f11c6bbad2b037b7b7400586fd7c313a45957085ddc47f01a6f8978e7acedb14
                                          • Opcode Fuzzy Hash: c0c8fcb44667ca2c8fe23aa92df2b9262a7bcb97f9c91f97d65f5fb040fd2184
                                          • Instruction Fuzzy Hash: F0116362F0DE4282EB50AB21D4416B93760FF85F68F584931DA5FA7666EF2DD884C700
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A5584
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A559A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55AE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55C2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55D6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55EA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A55FE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139A5612
                                            • Part of subcall function 00007FF6139CE510: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A562B,?,?,00000000,00007FF6139A1073,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139CE525
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                          • Instruction ID: cac5f20e5cdbfda1ec24346c6ece3383c1937cae0d5296887ce8f3aa35392051
                                          • Opcode Fuzzy Hash: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                          • Instruction Fuzzy Hash: A2119736618F81C2D7409F21ED954EC37A8FBC9FEAB580435EE4F8F655AF3480958210
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 76e9e92d93f0c8c719248e6433bf710fa477ed7a141f7287600a96dac61d5d71
                                          • Instruction ID: a6a2c1b343cdd1a27cdfda8f827cedb1a4eebbc8f55be531e50e5a095b7fd0f3
                                          • Opcode Fuzzy Hash: 76e9e92d93f0c8c719248e6433bf710fa477ed7a141f7287600a96dac61d5d71
                                          • Instruction Fuzzy Hash: 59F0F726B28E1183D7549F22EC564782B34FB88F65B581431DD4F9A225DE3CD899C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3401966785-2389359183
                                          • Opcode ID: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                          • Instruction ID: 4418cce8f6f0648c49ebc5945170c5ed0d13638d934cdde0960799c2e7abac38
                                          • Opcode Fuzzy Hash: 320c2bfa95c58a3e1609ac9c22957941cfe5e410ed8167142616c93d932a3e4d
                                          • Instruction Fuzzy Hash: ED412551A09AD206EB198B1584172BD2B52EB15FB4F484E35CA6FAB7D7FE3CE0498301
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                          • Instruction ID: c503f205d21490eef0689af614b65c90d58fd3e4dc24f95e489ba2457cb34262
                                          • Opcode Fuzzy Hash: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                          • Instruction Fuzzy Hash: 5B31F062709F8A80EE14AB16A5022A9A255FB84FF0F440E31DE6F977D6EF3CE041D300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ConditionMask$InfoVerifyVersion
                                          • String ID:
                                          • API String ID: 2793162063-0
                                          • Opcode ID: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                          • Instruction ID: 033268eb3d0018b0cff202ebf5cbcf75251a2742d5a566f1e6986feb27bc292d
                                          • Opcode Fuzzy Hash: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                          • Instruction Fuzzy Hash: 2F410922E1CB8286F2708B16E4157BA7B50FBD5B10F015639D9DE56B56EF3DE4848B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-2901970132
                                          • Opcode ID: a7dcf3b872bca8685f5961ceb99f1390aa710949134b2c2dcb5dcad2218fd221
                                          • Instruction ID: b3b2852e4fde8b40da2e11d6d5bcf0f4ffe6e4196d0690d5735a68b408f8955f
                                          • Opcode Fuzzy Hash: a7dcf3b872bca8685f5961ceb99f1390aa710949134b2c2dcb5dcad2218fd221
                                          • Instruction Fuzzy Hash: 40417166B08BC245EB109B6194461FD2B65BB05FA8F484D35DE5FAB797EF3CD1448300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr$mallocstrncpy
                                          • String ID:
                                          • API String ID: 2121287944-0
                                          • Opcode ID: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                          • Instruction ID: 21da8ede095618977e0866c4caa7c2da8df2dac767eaaf818d0dbc244ffd27e4
                                          • Opcode Fuzzy Hash: 701b562d305d28b033affdddbf65d7e14a7e199027673d6d929ac0e14e4089d7
                                          • Instruction Fuzzy Hash: E7316221A09F8186EA55DF12A5522797B90AB49FA0F085A35DE8F97796FF3CE0818300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: PLAIN
                                          • API String ID: 3313557100-4000620671
                                          • Opcode ID: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                          • Instruction ID: 43a119ff0aaf0cc403f0d7774ec52a99f9e053fe0206b257a1b5ed788a94d8cc
                                          • Opcode Fuzzy Hash: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                          • Instruction Fuzzy Hash: CE319366A08F8182EB118F56E4413AAA794FF45FE4F848A31DF9E97796EE3CD445C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-2901970132
                                          • Opcode ID: b659deefd899a68d928ef1cf79296cef25cdd2965dd7581ad9d560776997bfc4
                                          • Instruction ID: f58cf7f7c2c1b40b239c8d4d3fc1df28b0537fede14188dd595f07b1b98aa3db
                                          • Opcode Fuzzy Hash: b659deefd899a68d928ef1cf79296cef25cdd2965dd7581ad9d560776997bfc4
                                          • Instruction Fuzzy Hash: F0311A61A08B8245EB159B6194471FE2BA5BB05FA8F480C35DE4FAB75BFF3CA5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: callocfreememcpystrchr
                                          • String ID: CAPA$Got unexpected pop3-server response
                                          • API String ID: 2887963327-1591402739
                                          • Opcode ID: d495897bbb32fb7900f169f29c428b922d118fd228e5394bd397820622a21d4f
                                          • Instruction ID: e25c77da5eef8b85c7a49133231d05381fd28245067502d5d7d00a228ad994b8
                                          • Opcode Fuzzy Hash: d495897bbb32fb7900f169f29c428b922d118fd228e5394bd397820622a21d4f
                                          • Instruction Fuzzy Hash: 19319761B09B8291FA198B2590426B92694BB02FB0F444935CA1FBB7D7FF3DE569C301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3061335427-2901970132
                                          • Opcode ID: e0429e70490afcf1625c8906fbbcc74cc03aec47c80e042e40f4a1758fe81c31
                                          • Instruction ID: 468f8e3b5701bfca8f9d2bbb86b1c0802037d21923c72fe1c07f9a2dd4388617
                                          • Opcode Fuzzy Hash: e0429e70490afcf1625c8906fbbcc74cc03aec47c80e042e40f4a1758fe81c31
                                          • Instruction Fuzzy Hash: 53313B61A08B8245EB109B6198471FA2BA5BB05FA8F480C35DE4FAB757FF3CE5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3061335427-2901970132
                                          • Opcode ID: 5a34c979c22d99fa642846dc252d67e8bd6e08a4038edfdd442936c0c994fb53
                                          • Instruction ID: 00a0ad6715f0a47e20263ff9a0f109e2b42c03f774982363bd3c5c61f3cd8b47
                                          • Opcode Fuzzy Hash: 5a34c979c22d99fa642846dc252d67e8bd6e08a4038edfdd442936c0c994fb53
                                          • Instruction Fuzzy Hash: 2C311D61A08B8245EB119B6194471FE2BA5BB45FA8F440C35DE4FAB757FF3CE5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%s%lx$Signature
                                          • API String ID: 2190258309-1406629954
                                          • Opcode ID: 9fc0538b7c30dbcaa3927dab1fb2c74c56b0476ae2a7839a957097e179856c7b
                                          • Instruction ID: c89a289d685996d0813ea6fec99d8a8665d951197022d09dfb5ebe01962f8b3a
                                          • Opcode Fuzzy Hash: 9fc0538b7c30dbcaa3927dab1fb2c74c56b0476ae2a7839a957097e179856c7b
                                          • Instruction Fuzzy Hash: A7317222B0CF8246EE508B25A4462F967A4FB45FA4F540831DE4FAB757FE2DE0448740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupcallocfree
                                          • String ID:
                                          • API String ID: 1236595397-0
                                          • Opcode ID: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                          • Instruction ID: d5a8e340ce7e7eceb360a82f2e2cc5eda7d27b7b1cfd34277e58ca18e9ef2069
                                          • Opcode Fuzzy Hash: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                          • Instruction Fuzzy Hash: 1531C632A08F8586EB41CB25D0613BD27A0FB85F94F584830DE4E9B796EF3DD5858700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 635089f868349817a7395d826d5566bd80108ba5fabe08628d655c3201992dc9
                                          • Instruction ID: e3b9724c894c4418fea8f9b654c45260591091e560ddb2ba8476e341d3304a46
                                          • Opcode Fuzzy Hash: 635089f868349817a7395d826d5566bd80108ba5fabe08628d655c3201992dc9
                                          • Instruction Fuzzy Hash: E8315A51E09F8244EB109B6594431FA2BA5BB05FA8F480C35DE0FAB797FE3CE5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: c27b730ff3cde937318ceaca94d7d2e2050f88c6b36777fabcdc2f85280fb528
                                          • Instruction ID: 935d62d52b0c196bf02e0451fc649c6a6ee2e3ea6321c4d4a258e3738cfa3fa6
                                          • Opcode Fuzzy Hash: c27b730ff3cde937318ceaca94d7d2e2050f88c6b36777fabcdc2f85280fb528
                                          • Instruction Fuzzy Hash: 22315B51A09F8244EB109B6594421FA2BA5BB05FA8F480C35DE0FAB797FF3CE5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: 228067bf5d3222deb49f6ad5301e89e894cbfdd00d5943fb9e2fc26564e16a64
                                          • Instruction ID: 2ccc35fd14348fb0fad40acc9289e8da9de6052ec64b70e384cc4bbab2cbcc98
                                          • Opcode Fuzzy Hash: 228067bf5d3222deb49f6ad5301e89e894cbfdd00d5943fb9e2fc26564e16a64
                                          • Instruction Fuzzy Hash: 4E313952A09F8245EB119B6594461FA2BA5BB05FA8F484C35DE0FAB797FF3CE5488300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: OS/400$SITE NAMEFMT 1
                                          • API String ID: 3061335427-2049154998
                                          • Opcode ID: 8c691ee043a9838d7f606555e5d370af31043bb70f99fac059963eb7e74f2456
                                          • Instruction ID: 856fda21c983756ff6f236af67bea5a1aca5b5ac6e9745f7b332e7a98412f724
                                          • Opcode Fuzzy Hash: 8c691ee043a9838d7f606555e5d370af31043bb70f99fac059963eb7e74f2456
                                          • Instruction Fuzzy Hash: 44316121A0CB8286F7718B1694523B86750BB49F74F844871DA8FA7697EE3CE946C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _errno_strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 2151398962-2292467869
                                          • Opcode ID: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                          • Instruction ID: b5af4a1050ba2bd507ad0f72e187fb526a53d4a9a9696f3a524fc0a590d005cd
                                          • Opcode Fuzzy Hash: 82631bb3135a2ad10e17f086c294e470c804b6d2ccea4246878ff724b50622f8
                                          • Instruction Fuzzy Hash: AF615121A09B978AFF718F2690423BA6794AF44F64F494835DE8F92693FE2DE444C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3727083984-2292467869
                                          • Opcode ID: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                          • Instruction ID: 08690b95ffccfb1060084de4a011546e6387d4a6caea5d8c6bbf83dacb812aeb
                                          • Opcode Fuzzy Hash: c2ab3cbf1cffc3fc9e4ce8172e99c2bf4d11b967c886fdd51e25c4ea2097fbec
                                          • Instruction Fuzzy Hash: AE615261A09B938AFF718F2690463BA6794AF44F64F090835DF8F92693FF2DE4448350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                          • API String ID: 1865132094-1204028548
                                          • Opcode ID: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                          • Instruction ID: cc749f576c5ea717478615d89f458f5ccf5262270506759a9c2ff77feb0bd974
                                          • Opcode Fuzzy Hash: 0e0eaa027d3d22a4a8d4ec68c5691ab6803c475b566300ff1cb4639a436c852e
                                          • Instruction Fuzzy Hash: 3851CB31A0CFC281FB648A249041ABD3791EB45F64F584475DACEDE68FEF2DD4508320
                                          APIs
                                            • Part of subcall function 00007FF613984310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                            • Part of subcall function 00007FF613983C30: memcpy.VCRUNTIME140 ref: 00007FF613983C83
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139826E2
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613982730
                                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF613982780
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6139827CD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                          • String ID: out_of_range
                                          • API String ID: 2484256320-3053435996
                                          • Opcode ID: 011e101c21e85212f65616117e2b30cad61de5ca062f2b3863d0ff6025111508
                                          • Instruction ID: c4c338fe427ebb3d0863e2a112caddad5791b38a573c8d0c4ee96f6a006be44f
                                          • Opcode Fuzzy Hash: 011e101c21e85212f65616117e2b30cad61de5ca062f2b3863d0ff6025111508
                                          • Instruction Fuzzy Hash: 8051A132A14F4599FB00CF65E4423AC3361FB44BA8F405A75EA5E52ADAEF38E195C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _errno_strdupstrcspnstrncmpstrspn
                                          • String ID: 0123456789abcdefABCDEF:.
                                          • API String ID: 2191890455-446397347
                                          • Opcode ID: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                          • Instruction ID: 4db8cf246e0c9366d1b7eedd6c89645b60d50735857adccfae41fa7709e9574e
                                          • Opcode Fuzzy Hash: 843ade515a0bd07329736349e60a03f950eedd840701748e77495a0b5ca17848
                                          • Instruction Fuzzy Hash: 3341E612A0DEC985FF218B1495163B93B90EB05F64F480931DA8F976C3EF2CE459C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                          • API String ID: 573759493-632690687
                                          • Opcode ID: 18548420aa55df9f48917c6983994d8601e4b2c51c1ca09d28ffe1cdaf2f51e4
                                          • Instruction ID: 903ea119b4699d5c1a6becb6810ba01e517b2ea775e409cb0b53e0ebf927d75a
                                          • Opcode Fuzzy Hash: 18548420aa55df9f48917c6983994d8601e4b2c51c1ca09d28ffe1cdaf2f51e4
                                          • Instruction Fuzzy Hash: 4F41C722E0CE8695F711DB259147278BB92EB41FA0F584931C68FB2A97EF3CD945C300
                                          APIs
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984341
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF613984406
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF61398445A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF613984461
                                            • Part of subcall function 00007FF6139DF1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6139843EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF6139DF20A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID: https://keyauth.win/api/1.2/
                                          • API String ID: 1155477157-3933380396
                                          • Opcode ID: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                          • Instruction ID: c5cc62e914599587d0e3a10de25f539c04e1bce5155f452fcb918aa9cecdd9ce
                                          • Opcode Fuzzy Hash: 060c81ddfd111417c5091a61c3a1e0148c2aa5dfc69f83c4e14a55458c154890
                                          • Instruction Fuzzy Hash: EF31E622B05F4944FE199B65D6462781241AF44FF4F580A75CE2E77BD7EE7CE0829300
                                          APIs
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF6139811FA), ref: 00007FF61399075F
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF6139811FA), ref: 00007FF61399079C
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF6139811FA), ref: 00007FF6139907A6
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6139907D9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID: https://keyauth.win/api/1.2/
                                          • API String ID: 1775671525-3933380396
                                          • Opcode ID: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                          • Instruction ID: f90fda5ff6ecbbfac110aba161644a4ea7f05762b9b8cf638654d6a6599641f5
                                          • Opcode Fuzzy Hash: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                          • Instruction Fuzzy Hash: 4531C362B09B4599EE109F16AD023AD6296AB04FF0F584A35DE6F577C7EE7CE0518300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_close_openmalloc
                                          • String ID: Couldn't open file %s
                                          • API String ID: 3412525164-447283422
                                          • Opcode ID: f3f8fc9c30668e38bf7e1b4fc36f559d2a38759315c738994b48983c7e84d7f3
                                          • Instruction ID: cdb5c12389825f119afd88d613a58d36c7a6570b0fb52bc13448e0fe504035ea
                                          • Opcode Fuzzy Hash: f3f8fc9c30668e38bf7e1b4fc36f559d2a38759315c738994b48983c7e84d7f3
                                          • Instruction Fuzzy Hash: A141847160CF8681EB148F25E40127967A1FB49FF4F188931DA9E97796EF7CE4418740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                          • API String ID: 3985033223-1703240927
                                          • Opcode ID: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                          • Instruction ID: f805cfe239ab742fc43458e9713b0ce6f310d6b61067a86da16c49ed4569ed3d
                                          • Opcode Fuzzy Hash: df79667446998cfa9fe32aac958eaa7bfc2909eaa380d159321fe0720fedef74
                                          • Instruction Fuzzy Hash: 36419D21E09F42C6FB518B159901278B7A0FB45FB4F495A31CE6EA77A6FF2CD4058700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                          • API String ID: 1865132094-195851662
                                          • Opcode ID: 04786302b464ce4458984dfce92d798d726ef78eb1baf23cf9b6393892aed6c8
                                          • Instruction ID: d191569f19f5e4986bfb22999ac11485440f3b64af0eb50409daacc82f0881d1
                                          • Opcode Fuzzy Hash: 04786302b464ce4458984dfce92d798d726ef78eb1baf23cf9b6393892aed6c8
                                          • Instruction Fuzzy Hash: FA416222F0CEC281EB558B29E0413A97790FB84F98F484531DA4EEB766EF79D495CB40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$_strdupfree
                                          • String ID: FALSE
                                          • API String ID: 3359907120-3701058176
                                          • Opcode ID: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                          • Instruction ID: 8889539185377827a07e88b4d6f549a878eb6322e7c825692b2179a87c2431c8
                                          • Opcode Fuzzy Hash: e075efb9f471538cf5fea25a544e13b80d27f3e372c79109e91b7771380f9fd1
                                          • Instruction Fuzzy Hash: 6E31D422E0CE9645FB12DB2994473786B929B01FB4F440E31CA9FA1AD7EE3CD981C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %s: %s$FALSE$TRUE
                                          • API String ID: 1865132094-3430445539
                                          • Opcode ID: 325b3fe2c30e5458511042f25abbcc62c3653c67faaa361f4360c8e5e1acd019
                                          • Instruction ID: 76feffee99aea43e535ddc8680cc1d46d5a6fb658d0f19a655514c8e8718906c
                                          • Opcode Fuzzy Hash: 325b3fe2c30e5458511042f25abbcc62c3653c67faaa361f4360c8e5e1acd019
                                          • Instruction Fuzzy Hash: 67016552B0CF9285EA659B56A8467B52751BB06FA0F444831CE4F97353EE3CD1858300
                                          APIs
                                            • Part of subcall function 00007FF613983D70: memcpy.VCRUNTIME140(?,?,0000000100000000,00007FF61399083D), ref: 00007FF613983E22
                                            • Part of subcall function 00007FF613983D70: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF613983E47
                                            • Part of subcall function 00007FF613983D70: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,0000000100000000,00007FF61399083D), ref: 00007FF613983E04
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613990A50
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613990A57
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613990A5E
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613990A65
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF613990A6C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                          • String ID:
                                          • API String ID: 2318677668-0
                                          • Opcode ID: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                          • Instruction ID: 51afc2a99bf8391e243e105fa42914802a885f38835a6f314682256d128d3979
                                          • Opcode Fuzzy Hash: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                          • Instruction Fuzzy Hash: 9D61AF62A04F8589EB20DF21E48A3BD3365FB45F94F404431DA9E96BAAEF7DD494C340
                                          APIs
                                            • Part of subcall function 00007FF6139D4290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42B6
                                            • Part of subcall function 00007FF6139D4290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42D7
                                            • Part of subcall function 00007FF6139D4290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42F2
                                            • Part of subcall function 00007FF6139D4290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D4300
                                            • Part of subcall function 00007FF6139D4290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D4312
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139D43B6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: HTTP$NTLM
                                          • API String ID: 2190258309-4188377180
                                          • Opcode ID: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                          • Instruction ID: 8cee779cf80a7859b76fa4d7ef4e3558ae15dfa3be7093962ce4b4ab580d8235
                                          • Opcode Fuzzy Hash: 39a23f78fe25a4d256fce5b592c7a67188582c1c21e97960aec82a00448847b9
                                          • Instruction Fuzzy Hash: 94614B32608F8582EB608F15E4427AA77A4FB88F94F544935DE8EA7B59EF3CD454CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                          • API String ID: 1294909896-1891748601
                                          • Opcode ID: 466439d91d0d7739ce5d2f9dc11d5886e8c0a76dfe12478b16c418ff8186dc87
                                          • Instruction ID: 579269f021976323804397b5349ebc84944a027fd594b1a412c58bc3b4db0200
                                          • Opcode Fuzzy Hash: 466439d91d0d7739ce5d2f9dc11d5886e8c0a76dfe12478b16c418ff8186dc87
                                          • Instruction Fuzzy Hash: 6A51A5A2A0CF8285FA64D73490523B96250EB41B74F404A35DAAFA76D7FF7CE4858344
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3401966785-3412697401
                                          • Opcode ID: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                          • Instruction ID: 6b3250bb64a74268aa944e5eb97e593121042d51bb7307b5d7be06f74830b3b2
                                          • Opcode Fuzzy Hash: 2de0af5476a8bee818dfaffc51287aacab6865fda698d13ebbfacdef7cd6ec0c
                                          • Instruction Fuzzy Hash: FD413362A19A9205FB099A2685173782B53EB45FF0F044E31DA6FD73C7EE6CE085C310
                                          APIs
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6139DD5A0), ref: 00007FF6139DD64F
                                            • Part of subcall function 00007FF6139B7900: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF61399A92A,?,?,?,?,?,?,?,00007FF61399A6F7), ref: 00007FF6139B7911
                                            • Part of subcall function 00007FF6139B7900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6139B7AB3
                                            • Part of subcall function 00007FF6139B7900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6139B7AD0
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6139DD5A0), ref: 00007FF6139DD6BE
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6139DD5A0), ref: 00007FF6139DD6D8
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF6139DD5A0), ref: 00007FF6139DD70E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: xn--
                                          • API String ID: 2644425738-2826155999
                                          • Opcode ID: 423bf8c0c49e3ec128dd97a9686630982e6650d8334231880676cdb0425b1833
                                          • Instruction ID: 23f7a0165adcad7cbba1cca2c63f5cf4ead9b7309381880483a2549c72282667
                                          • Opcode Fuzzy Hash: 423bf8c0c49e3ec128dd97a9686630982e6650d8334231880676cdb0425b1833
                                          • Instruction Fuzzy Hash: FA41C595B1DA8205FB549B2695173B966819F45FE0F488935DE4FE7BC3FE2CE4068300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: callocfreememset
                                          • String ID: CONNECT phase completed!$allocate connect buffer!
                                          • API String ID: 3505321882-591125384
                                          • Opcode ID: 7b421a5aa3c9cdeafd06fb9577e758e1f5d371e51e66a2b483ab274c72befbc5
                                          • Instruction ID: a3ed2aed6407bfc60f303efe4c0e1f4fb4292b94edebae54b47baec0b302e28e
                                          • Opcode Fuzzy Hash: 7b421a5aa3c9cdeafd06fb9577e758e1f5d371e51e66a2b483ab274c72befbc5
                                          • Instruction Fuzzy Hash: 8851A122F08E8296F7148B29D5593B93390FB44F99F040935CB5EAB7A2EF78E5658300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                          • API String ID: 1294909896-619256714
                                          • Opcode ID: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                          • Instruction ID: 9f1bd7a1101421691e042f08fcd2a711545ec3186d11c327ed91a0ec64c68773
                                          • Opcode Fuzzy Hash: 3cc400d705c7ae2362500cf1e020bece85d41da4efc320729d18f1b821df95dc
                                          • Instruction Fuzzy Hash: BB519262E0CBD245EB118F15A5061BDBBA5FB01FA0F844835DA8FA6B56EF3CE545C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _errnofreememcpy
                                          • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                          • API String ID: 738009125-4268564757
                                          • Opcode ID: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                          • Instruction ID: 93a18c9873c713a93f288aa00a0d80d68c797ba6a6ca818e708a2e49134f1e83
                                          • Opcode Fuzzy Hash: 2666265653ab1ec3e10e930bd31a71e0d180f8da04622154dd8d31111f66fc27
                                          • Instruction Fuzzy Hash: EB51A422F0CFC682EA14DE65E4416B97355FB45FA4F448831DA8EABA5BEF7CE4458300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                          • API String ID: 1294909896-2752585153
                                          • Opcode ID: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                          • Instruction ID: 7e4772fbdf7c1f0d5ab8f42df87b5b8373848350d022ed1a4bb5ca60265e86d6
                                          • Opcode Fuzzy Hash: fd687db5ce81c312168de4ee473c0d8d84d0a0caf4907a782c0026f3af3b1231
                                          • Instruction Fuzzy Hash: B6314F62A0DFC285EB108F2194421BA7765FB05FA4F984931C64FAB257EF3CE549C301
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$calloc$memcpy
                                          • String ID:
                                          • API String ID: 3478730034-0
                                          • Opcode ID: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                          • Instruction ID: a7d5132fe125e0925e1981e3d83a86d855119f738e98670aaa2c9b55eb92ae4d
                                          • Opcode Fuzzy Hash: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                          • Instruction Fuzzy Hash: 9A21A6B1A0DB828AD7548F1194116297BA4FB4CFA0F488535DA5EAF79AEF3CD4408700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3056473165-2389359183
                                          • Opcode ID: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                          • Instruction ID: af81cb8fafdbd145f7fb9cbbd51598df050b110b144f32dad10f2bedb06f985e
                                          • Opcode Fuzzy Hash: 931404bb7ef4e7a24fca340e42252142a84ad0bfd55e92b62d93b7e113a9c3aa
                                          • Instruction Fuzzy Hash: 8121A961A09BC202EE158B2285062B92A52AF15FF4F484D35CD1FAB7E7FE3CA5488301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: b3f9ac1a51e1cb56c8a081f84247a427091f42702f2d27fe41e35f81361af7e0
                                          • Instruction ID: 264b0d8555a1cd79a0dd8541443048abff5df4586ab70cb467b0799a15422602
                                          • Opcode Fuzzy Hash: b3f9ac1a51e1cb56c8a081f84247a427091f42702f2d27fe41e35f81361af7e0
                                          • Instruction Fuzzy Hash: 34213366B0CF8246EA509B15E4462FA67A4FB45FA4F440832DE4FAB757FE3CD0458700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: bc5e897e2579d7dd63d7d746884e3d6efa0bb8b49bbbd3ec929c441a6fa49155
                                          • Instruction ID: 6fc93fe6235bfefac91d687bcc8e4deb7097fee85d9f5ce958ccab2dfa6d8451
                                          • Opcode Fuzzy Hash: bc5e897e2579d7dd63d7d746884e3d6efa0bb8b49bbbd3ec929c441a6fa49155
                                          • Instruction Fuzzy Hash: 43212166B0CF8286EA508B15E4462EA6764FB85FA4F440832DE4EAB75BEE3CD145C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: 655b0211d0849ab725f3121ffe595c78da798e7ae1bc27a02535ae4aa2ae173d
                                          • Instruction ID: 8f0a8a086765582c1b6c50f5605d0052c6b2582dcc07cf6c579c411f8e76d8e7
                                          • Opcode Fuzzy Hash: 655b0211d0849ab725f3121ffe595c78da798e7ae1bc27a02535ae4aa2ae173d
                                          • Instruction Fuzzy Hash: DD212166B0CF8286EA508B15E4462EA6764FB85FA4F440832DE4FAB75BEE3CD145C700
                                          APIs
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF613992579), ref: 00007FF613992EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strncpy
                                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                          • API String ID: 3301158039-3625861382
                                          • Opcode ID: f68edcbc337550e6e0110a99c69435a7bbb63833a9b97754134fee37ae0c7940
                                          • Instruction ID: 197b2a78d7b6f0c3db8222ca1fadfd79e0fc273e68d85703431ec3a0e7b74908
                                          • Opcode Fuzzy Hash: f68edcbc337550e6e0110a99c69435a7bbb63833a9b97754134fee37ae0c7940
                                          • Instruction Fuzzy Hash: EF110A52A0CF4A8DEA58CF99E5D52B81290EF0DFA0F4855B5C68F96687FE6CE4D08340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                          • Instruction ID: 319875e0a58e57e982c3b8f4fc0aefdb4b09db95223ca6d753dd2e2439a039e9
                                          • Opcode Fuzzy Hash: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                          • Instruction Fuzzy Hash: F3111676A08F41CAE6209F12E54126A7760FB89FA0F444535DF8E97B46EF3EE4A18700
                                          APIs
                                          Strings
                                          • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF6139B5A75
                                          • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF6139B582B
                                          • ** Resuming transfer from byte position %I64d, xrefs: 00007FF6139B5818
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: fflush
                                          • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                          • API String ID: 497872470-664487449
                                          • Opcode ID: cf5752f772f53d5a01ce0a4df43098bbf945ca1bb178d9efa3e48f8af9e2371a
                                          • Instruction ID: c6d1686cfabcd8dce10f50e9c238c2112e2389bd871d242e7530541a4971968d
                                          • Opcode Fuzzy Hash: cf5752f772f53d5a01ce0a4df43098bbf945ca1bb178d9efa3e48f8af9e2371a
                                          • Instruction Fuzzy Hash: 3591B621A06B86C5DA60CB05E545BAA7354FB84FE0F815432DE4E9BB5AFF3CD401D740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastfreememcpy
                                          • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                          • API String ID: 1248052217-2064316097
                                          • Opcode ID: 796fff929338667895051d4d0396df10a4d59ed21fe22401bcd2d6955a7ab080
                                          • Instruction ID: e7bab4b99ddb4c14b80c077b273367f3da97d7b68dbdf13f49ebc07d139695f9
                                          • Opcode Fuzzy Hash: 796fff929338667895051d4d0396df10a4d59ed21fe22401bcd2d6955a7ab080
                                          • Instruction Fuzzy Hash: F9419621A08E8685FB609F2598427B96390FB49FA4F444931DE9FE7397FE3CD8458700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: FALSE$TRUE
                                          • API String ID: 1865132094-1412513891
                                          • Opcode ID: 2989acc13cbc0029e913620442beb60a4be3815a991f995df501513d7eb905cf
                                          • Instruction ID: 46a22ffc379cdd123d1ccf4f567d9559ba88e4f637ccd27769ce01e784d5c9bf
                                          • Opcode Fuzzy Hash: 2989acc13cbc0029e913620442beb60a4be3815a991f995df501513d7eb905cf
                                          • Instruction Fuzzy Hash: E841B1A2B09B5684FF159A5A90073BC6792AB05FB4F484D32CE5FE67C6FE3CA0408210
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _time64$ErrorLast
                                          • String ID: TFTP response timeout
                                          • API String ID: 3339832089-3820788777
                                          • Opcode ID: c3af9252efa73ff710136be127cd797860d60a0ca492111bf162edc3a60d7612
                                          • Instruction ID: fe587966206c6e8902bfc38707383431f34bd9b4a125a7eba6b461958fb176cd
                                          • Opcode Fuzzy Hash: c3af9252efa73ff710136be127cd797860d60a0ca492111bf162edc3a60d7612
                                          • Instruction Fuzzy Hash: 84418032A08E8285EB609F26D4527A93790EB85FB4F444631DE6F977DAEF3CD4418740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: %s%lx
                                          • API String ID: 573759493-530121141
                                          • Opcode ID: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                          • Instruction ID: 0df5884b0f207598943a710674205ef05e68ccb9e8d4443ad39a1e84ce5f6167
                                          • Opcode Fuzzy Hash: fd4fe93a63d81f1eee54e4347bacdfe35ba4eeaea70399024db6a6f81961019a
                                          • Instruction Fuzzy Hash: 1331F312E0DEA645FB129B2994473786F92AB11FA4F144D31C68FF6A97FE2DD941C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$free
                                          • String ID: TRUE
                                          • API String ID: 573759493-3412697401
                                          • Opcode ID: 84cdeb7f4889b0e98a9bc369abe20393a8c158631b938612cc781c0bb33ba72d
                                          • Instruction ID: b5cbfadaa8d17b7312a7ab4aa37f0ff31a2937dad1a00328509416aa87a5cf71
                                          • Opcode Fuzzy Hash: 84cdeb7f4889b0e98a9bc369abe20393a8c158631b938612cc781c0bb33ba72d
                                          • Instruction Fuzzy Hash: 2431C761A0CE9685FB11CF2595463786FA2EB05FB4F480A31CA9FE2AD6EF2CD541C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: fwrite
                                          • String ID: ...$...
                                          • API String ID: 3559309478-2253869979
                                          • Opcode ID: f5d4120396a53f35d6a0aa358773e0a09f2099a20ff6d950d28a1d81d0b1d9cf
                                          • Instruction ID: 1426223c9352937508cf2ed40dd8cad3834b7ed8a79f484a58f82c28b21f1ecd
                                          • Opcode Fuzzy Hash: f5d4120396a53f35d6a0aa358773e0a09f2099a20ff6d950d28a1d81d0b1d9cf
                                          • Instruction Fuzzy Hash: 9E31D321B08E8681EB60CB11E4053F977A1FB84FA4F444631CA9E937A6EF3DE059C780
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: acceptgetsocknameioctlsocket
                                          • String ID: Connection accepted from server$Error accept()ing server connect
                                          • API String ID: 36920154-2331703088
                                          • Opcode ID: 434231671a3d3562615c89ba28fcd0375854ad9688cb4bb07be998ef2b03a86c
                                          • Instruction ID: 8f7077a976bf7fe23d08282dd51eead74f421ff225cc9f9cd81f42b0f0394ba5
                                          • Opcode Fuzzy Hash: 434231671a3d3562615c89ba28fcd0375854ad9688cb4bb07be998ef2b03a86c
                                          • Instruction Fuzzy Hash: 9731A221708A8186EB54DB22E5067AA7390FB88FF4F440631DAAE977C6EF7DE105C740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                          • Instruction ID: e46a749966b037b764c8ab92c928366c681e31bc807a96f4df785d7f54cf3088
                                          • Opcode Fuzzy Hash: 9185cdd294420f20cdc6d51fd5518084f5bb34101a95b3ad8653fbf82a5b9ae8
                                          • Instruction Fuzzy Hash: 27217F22609F868AEB62CF14E5423A977A0FB44FA4F884531DF9EA6785EF3CD4548700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                          • Instruction ID: 12a1fc5cd7b4fddc5574f3e0868dde03a5303a758069a48d2595cae98c3c8f73
                                          • Opcode Fuzzy Hash: 7e334ca8de8e4567ccf13a3d1ed7df33fb9ad007e5fdceb3d50289511dc5c3dd
                                          • Instruction Fuzzy Hash: 65116F22709F8589EB66CF14A6023A977A0AB44BB4F884531DF9EA2795EF3CD4548700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: SENT$Sending data failed (%d)
                                          • API String ID: 1802528911-3459338696
                                          • Opcode ID: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                          • Instruction ID: 94b990948a0c277fb9f61f2d28e11e5fdebb7660a4e6f00e63957b2744f29621
                                          • Opcode Fuzzy Hash: b305d28b117c5390196270bb9271faa1f7ae2e309369d4ece08cc852aadb9171
                                          • Instruction Fuzzy Hash: C3019E22B08F92C1EB108B2AE8424997B60FB89FE4B495131CB5E93722EE29D501C780
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3985033223-2389359183
                                          • Opcode ID: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                          • Instruction ID: fdcccd3d1343dbd0df17203bab29d90bc6275168b7de338a7654e4c281c21154
                                          • Opcode Fuzzy Hash: 0e1e215d465bdb65dc11ec78cd6772c2a7b85769cfe06162245f5a7cea0827dc
                                          • Instruction Fuzzy Hash: AC017152F0DFC242EB158B1194465F92B56BF05FA4F884C71D90FAA657FF3CA5488301
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139B19B5), ref: 00007FF6139B15D8
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139B19B5), ref: 00007FF6139B15E1
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139B19B5), ref: 00007FF6139B165A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139B19B5), ref: 00007FF6139B166B
                                          • memcpy.VCRUNTIME140(?,?,00000000,00007FF6139B19B5), ref: 00007FF6139B1694
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID:
                                          • API String ID: 3401966785-0
                                          • Opcode ID: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                          • Instruction ID: 8e181fe9225ba73c1cbccd37a87d33b5eecadb5b3da6ccc6cd03d1a311b37ab6
                                          • Opcode Fuzzy Hash: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                          • Instruction Fuzzy Hash: 39316162A08F45C2EB509F11E5016A96794EB05FF4F484A31DE6FAB7CAEF3CD4508300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42B6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42D7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D42F2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D4300
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D0D25), ref: 00007FF6139D4312
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                          • Instruction ID: 9f30a05b31acc366489706e6c372d8ac5d0f63cfc08606b9fc9e244bdce39253
                                          • Opcode Fuzzy Hash: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                          • Instruction Fuzzy Hash: B2111536618F4182DB449F25E98217C7BA8FF84FA8B040831DE8E9B729DF38D895C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: calloc$free
                                          • String ID: chunked
                                          • API String ID: 171065143-1066005980
                                          • Opcode ID: 1f55bf3cc2ceb97599b1b13bb89cd2425dee7cbd92ad9f3b9547d39331e686ba
                                          • Instruction ID: ffbae8bbf008d34904249aa1757aca47a42f8da9a93186a061cbf1013837af8e
                                          • Opcode Fuzzy Hash: 1f55bf3cc2ceb97599b1b13bb89cd2425dee7cbd92ad9f3b9547d39331e686ba
                                          • Instruction Fuzzy Hash: 7751C931E08F9286FB558B1695013797791AF04FE4F494935DE5EA77A6FF2CE8428300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 1294909896-910067264
                                          • Opcode ID: 2314223a42b02a56667362992ea725fa1a111eb4508a0bdd26f329100ff1f141
                                          • Instruction ID: e5d5ded4d82a96657672411ab3a2879350c5bc1eb80e32940df745fa28cafde7
                                          • Opcode Fuzzy Hash: 2314223a42b02a56667362992ea725fa1a111eb4508a0bdd26f329100ff1f141
                                          • Instruction Fuzzy Hash: 8851E462E0CE9644EB119F65A5472B97BA6FB02BA0F444832DA4FA7756EF3CE445C300
                                          APIs
                                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61398D198), ref: 00007FF61398D5AE
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61398D198), ref: 00007FF61398D5DC
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61398D198), ref: 00007FF61398D645
                                            • Part of subcall function 00007FF6139DF1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6139843EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF613981B49), ref: 00007FF6139DF20A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF61398D652
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                          • String ID:
                                          • API String ID: 2942768764-0
                                          • Opcode ID: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                          • Instruction ID: 945f971187cc0dfe2817dfb50880d1d1d93b675d16d8fd4923c841fff106eb2e
                                          • Opcode Fuzzy Hash: f485f46759ee3c819f91b3d763993f9dcf21cbb8076185c2af80993c6419b380
                                          • Instruction Fuzzy Hash: DC41C272716E4985EE149F25D0462BD6361BB84FB4F548A72CB2E977CAEF3CE0519300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF6139BC9DB), ref: 00007FF6139DA88E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: 0d9a4fbca350a2b51e1a3a6bd17f6e341b6717d5cc9ad04e110af83e92be828a
                                          • Instruction ID: 7c1c6a4fae7140ed73d63e443330b9c9ef9e2b50dc42fea0ec828abe61f36f7a
                                          • Opcode Fuzzy Hash: 0d9a4fbca350a2b51e1a3a6bd17f6e341b6717d5cc9ad04e110af83e92be828a
                                          • Instruction Fuzzy Hash: B4417F32A18F4582EB508B16B4411AAB7A4FB84FB0F144635DF9F57BA2EF3CE4958340
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF6139BE220,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF6139DACC3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139DAD4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: 1a2af4c6437707a263c2e04b6871f1d6755b0c65e1c6e58b2568f2a7d7757bd0
                                          • Instruction ID: e227c9a519940a0f92c510f51e61742bc130303c265e2f5e55faf569667d3a45
                                          • Opcode Fuzzy Hash: 1a2af4c6437707a263c2e04b6871f1d6755b0c65e1c6e58b2568f2a7d7757bd0
                                          • Instruction Fuzzy Hash: 17418532A08F4582EB519B26F4411AAB7A4FB45FB0F044534DF8E57BA6EF3CE4958700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                          • API String ID: 1294909896-918878739
                                          • Opcode ID: cf2825dc601f22ed468ee35b6bb29dedeb88632c42a2c12affe150d9ed24460d
                                          • Instruction ID: 5365574cda0775d99bf027e2c8694b8d7d0bc1da7cc197ca04744bc9f5ea80fb
                                          • Opcode Fuzzy Hash: cf2825dc601f22ed468ee35b6bb29dedeb88632c42a2c12affe150d9ed24460d
                                          • Instruction Fuzzy Hash: D831D362A09F8684EB10DB65E5422A97763FB45FE4F484832CA4FA7786EF3CE545C300
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139C6204
                                            • Part of subcall function 00007FF6139A5AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6139A5C15
                                            • Part of subcall function 00007FF6139A5AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6139A5C30
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: fwrite$free
                                          • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                          • API String ID: 3468156532-1133524294
                                          • Opcode ID: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                          • Instruction ID: 730300065a3281d7add7d2887da70800ad0b31b738da322ac2c20e9964c615a2
                                          • Opcode Fuzzy Hash: 8299427a5ad266f79722ea9ef5ffcf9a9fc35c8886571f6f63a6ff16aa18c0a4
                                          • Instruction Fuzzy Hash: 69411972A08E82C5E7109F1AD4451A933A0EB84FB5F594936DE4FAB396EE3CE445C380
                                          APIs
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF6139811FA), ref: 00007FF6139905B8
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF6139811FA), ref: 00007FF613990659
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF613990677
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 326894585-0
                                          • Opcode ID: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                          • Instruction ID: 5f63bbda0199327106ff49f1e05231c91ccb2b9568ef9e06a7a35e67ef68a6b4
                                          • Opcode Fuzzy Hash: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                          • Instruction Fuzzy Hash: 1621A662A0AF5649E915AF52A5023792254AB44FF5F180F30DE7EA77C3FF7CA4928300
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A0292
                                          • memcpy.VCRUNTIME140 ref: 00007FF6139A02CD
                                            • Part of subcall function 00007FF613995620: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF613995635
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139A0302
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995757
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995763
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: %s:
                                          • API String ID: 901724546-64597662
                                          • Opcode ID: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                          • Instruction ID: 639ed3389d1a61966b9b5bce0173c09ddfd89e8da9acf00ef1d2e2ed5c72c562
                                          • Opcode Fuzzy Hash: 1b73f9cfeb138da4e2e179966cb669f2fdf5ab84fc2fa84ad0d24e29dda246a4
                                          • Instruction Fuzzy Hash: C221D626A08F9581DB00CF12E9411AA77A4FB54FF4F480A31EE5E977A6EF3CD5458340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: isupper$_strdupfree
                                          • String ID:
                                          • API String ID: 3359907120-0
                                          • Opcode ID: 733391f2657efa35da2d8d8438dedb358714d88d68be73f8003184230d9818b7
                                          • Instruction ID: 6a0024cb10849ce481a3972b95bc6b1e8e5730869219ee326240d9ffc2e236df
                                          • Opcode Fuzzy Hash: 733391f2657efa35da2d8d8438dedb358714d88d68be73f8003184230d9818b7
                                          • Instruction Fuzzy Hash: F221F111E0DEA645FB12DB2984473786FA29B11FA0F480D30C6CFE5A87EF2C9981C310
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6139A8FA8), ref: 00007FF6139A90F5
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6139A8FA8), ref: 00007FF6139A910F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                          • Instruction ID: 9a6ec7f63476d7a568bd849622befcf09484ef072386a40cd1c4931ff27e7269
                                          • Opcode Fuzzy Hash: 43a352a892712fe73208679e218960c350d0e5422f0842123306e9b92ba5ab5c
                                          • Instruction Fuzzy Hash: AE21A436E0DE5786EB214B21D4512BD7BA4BB05F98F4A8630CB5BE22E6FE1CD504C750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strstr$calloc
                                          • String ID: ;type=
                                          • API String ID: 3224321581-3507045495
                                          • Opcode ID: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                          • Instruction ID: d021147563c91c795fb6ae964e63329d6dd0b0e3cd6f231d57fed5c9d7c6c03a
                                          • Opcode Fuzzy Hash: 0222ecf549d9eab6eeb32d814db4a0ad4109cacb1d6406b327078b4eadc27f5b
                                          • Instruction Fuzzy Hash: 8B219531908BC181EB558B15E0413A937A0FB54FA4F484575DAAF9B7C7EF3CE5918300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$freemalloc
                                          • String ID:
                                          • API String ID: 2605342592-0
                                          • Opcode ID: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                          • Instruction ID: d50ea639fc91a822065ae3638e9a53e6d3d26196fa083cedef5f12712d724a6c
                                          • Opcode Fuzzy Hash: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                          • Instruction Fuzzy Hash: 73115E31B09B5186E7148F62F90216DBBA4FF88FD0B494438EB8A97B15EF38E5118740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Proxy-Connection: Keep-Alive
                                          • API String ID: 1294909896-2835282938
                                          • Opcode ID: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                          • Instruction ID: d77e5c0dd7897cbca05780bce8d96348ff742655738208ca3e216d9f4a217fad
                                          • Opcode Fuzzy Hash: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                          • Instruction Fuzzy Hash: F101A562F08F4142FA155B55B8417B96654AF84FF0F088630DEAE5A7D6EF3C98858300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree$strchr
                                          • String ID:
                                          • API String ID: 1739957132-0
                                          • Opcode ID: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                          • Instruction ID: 75d226319c0d8118fa907d4757901d196411726415c7720a07e01f9b8d1bc019
                                          • Opcode Fuzzy Hash: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                          • Instruction Fuzzy Hash: 3D019E61B0DF8143FF998B5A65521385690AF48FE4F480834FE4F97B8AFE2CD8958200
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                          • Instruction ID: 29f24cd519500bb38fdb77dfca74b236ad141dbbbc1ddb1a364fc1072657c446
                                          • Opcode Fuzzy Hash: a47212c89471e80574d32abf2d57b142d35ca8e7c22bef0864889be9cf398db5
                                          • Instruction Fuzzy Hash: 8CF08225B1DE4381EB104B26D85577A3A98BF4AFE4F095A31C91FD62E6EE1CD204C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                          • Instruction ID: b0e335bbfc29e8da0d39b404b4bcee4ca68a9bcdb40c4232001c345e17c0fa73
                                          • Opcode Fuzzy Hash: 99a124b7da873222bd242a2a80f7ee9b642aaf26a40535330719751bb5e961a6
                                          • Instruction Fuzzy Hash: F2F08225B1DE4381EB104B26D8557793A98BF4AFE4F095A31C91FD62E6EE1DD204C310
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6139A6576), ref: 00007FF6139D11D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _errno
                                          • String ID: %lx
                                          • API String ID: 2918714741-1448181948
                                          • Opcode ID: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                          • Instruction ID: ac9170b032581e6f522e3f7361587a1a345a5a107f4db82d3d8eae859d0c7e24
                                          • Opcode Fuzzy Hash: c18ae29bb276a8ad680b31d530baec24a6480b71590a79a41d77ef7598f730cd
                                          • Instruction Fuzzy Hash: 5E814FA3A1C5D145EBA88A25945327D7BD0FB85BA4F184636E69FE27C2FE3CD441C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %ld
                                          • API String ID: 1865132094-1112595699
                                          • Opcode ID: ac70dd28215ecf0eaff7103c99b32800d312326dd7842514aad38126b35053d6
                                          • Instruction ID: 5cf6a5e4df9eff481888a84c6e2a3ed62c1f2366144ce4840a2e541c8c4b7575
                                          • Opcode Fuzzy Hash: ac70dd28215ecf0eaff7103c99b32800d312326dd7842514aad38126b35053d6
                                          • Instruction Fuzzy Hash: 08318D22E09E8281FB65CB5491623BA36A0AF44F65F480835DA4FA7696FF3CE8448750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupmalloc
                                          • String ID: identity
                                          • API String ID: 3515966317-1788209604
                                          • Opcode ID: f93b67b2edb0c97d754ad6eb4325252d7f86d04025bba17c1a817ce8625e0f09
                                          • Instruction ID: 8c559082f78f431d226c09472c3085838f132dd84805e9730ab3a2899e4e0eb9
                                          • Opcode Fuzzy Hash: f93b67b2edb0c97d754ad6eb4325252d7f86d04025bba17c1a817ce8625e0f09
                                          • Instruction Fuzzy Hash: BD318D25E09F42C2FB518B169941279B7A0EF54FB4F095A31CE2EA77E6FE2CE4518300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: mallocrealloc
                                          • String ID:
                                          • API String ID: 948496778-3916222277
                                          • Opcode ID: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                          • Instruction ID: 80a7cb0d3c89b63d6f790a12dbda4fb6992321cbccb47e15522741910d94bcba
                                          • Opcode Fuzzy Hash: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                          • Instruction Fuzzy Hash: F111BE73A09F8182DB548F15F0002697BA0FB18FE4F484A35DA5E6B799EF38D891C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %I64d-
                                          • API String ID: 1865132094-19666937
                                          • Opcode ID: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                          • Instruction ID: 68b067c0f130b04ac363bfbe855257067fe3772de8cfff3c22562424cb2694d2
                                          • Opcode Fuzzy Hash: 1b09a0f9ec2cdcf79c216dadba7648dfc26f4f2795125d582cdf8d7fb230f003
                                          • Instruction Fuzzy Hash: 3211E972F0AE82C1EB548B6994063F427E1FB54F65F1C5535C94E8E263EF2C94968310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: TRUE
                                          • API String ID: 1865132094-3412697401
                                          • Opcode ID: ad9779da957951eca70e867832938f9a96f8dab6fd6b606cbe80922ad7a3ef30
                                          • Instruction ID: 430c028688ef4f63717f20fb90fa9652c13eb03fa26f2f5f7e0e60f36d72baeb
                                          • Opcode Fuzzy Hash: ad9779da957951eca70e867832938f9a96f8dab6fd6b606cbe80922ad7a3ef30
                                          • Instruction Fuzzy Hash: D5019266B09E5584EB429F56E5022782B62BB04FF8F444C32CE0FA6786EE3CD085C310
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6139987EA
                                          • memcpy.VCRUNTIME140 ref: 00007FF61399891C
                                          • memcpy.VCRUNTIME140 ref: 00007FF613998938
                                            • Part of subcall function 00007FF6139ADDD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139966F3,?,?,00000000,00007FF6139A0FC2,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139ADE0C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: freememcpy
                                          • String ID:
                                          • API String ID: 3223336191-0
                                          • Opcode ID: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                          • Instruction ID: ffcf0e78ab2bb231ceb165ca541487e7e4dc03a48e7f0075e6c33db806dfb01e
                                          • Opcode Fuzzy Hash: c4f4cead081543eee998664c6e26dde1d499f2edb648bd068f105d442ca860eb
                                          • Instruction Fuzzy Hash: C6C15132B18B028AE7149F65D4017AD3765BB44BB8F444A39CE2EAB7D9EF38D445C740
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6139D03A8), ref: 00007FF6139DD2A1
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6139D03A8), ref: 00007FF6139DD2B4
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6139D03A8), ref: 00007FF6139DD2DB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6139D03A8), ref: 00007FF6139DD2E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$freemalloc
                                          • String ID:
                                          • API String ID: 2605342592-0
                                          • Opcode ID: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                          • Instruction ID: 6fdfd3e5bc9e44bccf50680c17ec4b297250019536ad9cdb4a9d184a5b7b2f02
                                          • Opcode Fuzzy Hash: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                          • Instruction Fuzzy Hash: B5117325B08B4282E7208F1AF44107AA6A0FF88FE8B480935DB5E97B59EF3CD4408740
                                          APIs
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995757
                                            • Part of subcall function 00007FF613995730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF61399FD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF613991B61), ref: 00007FF613995763
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF61399BC36
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF61399BC46
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF61399BC54
                                          • memset.VCRUNTIME140 ref: 00007FF61399BC8F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID:
                                          • API String ID: 2717317152-0
                                          • Opcode ID: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                          • Instruction ID: 3ae9fc99f362fcd6b5318a395d15c6a64ac465f10d386010ecab2c363a8fc853
                                          • Opcode Fuzzy Hash: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                          • Instruction Fuzzy Hash: 5D213D32E18B9193E704CB22DA412AD6760F799B50F549225EB8D53A12EF74F1F1C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                          • Instruction ID: b2fd18f6674f84b766349f0389b90182f0d4e0af8d146df4e20726c43400840b
                                          • Opcode Fuzzy Hash: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                          • Instruction Fuzzy Hash: 5F114C36618F40C6DB808F25E5812A877A4F784F94F484075DF8EAB329CF38E899C340
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D093E), ref: 00007FF6139D4866
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D093E), ref: 00007FF6139D4887
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D093E), ref: 00007FF6139D48A2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139D093E), ref: 00007FF6139D48B0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                          • Instruction ID: 1a6dd1ad7c2a9baf51b96fc5103d7f34d41c39cadb125866dffbb03c7a02efb0
                                          • Opcode Fuzzy Hash: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                          • Instruction Fuzzy Hash: 5511FA36618F4182DB44DF25E99116C7BA8FF94FA87140426DE4E97769DF38D894C380
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A8405,?,?,00000000,00007FF6139A10C1,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139D21F0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A8405,?,?,00000000,00007FF6139A10C1,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139D2216
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A8405,?,?,00000000,00007FF6139A10C1,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139D2224
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6139A8405,?,?,00000000,00007FF6139A10C1,?,?,00000000,00007FF6139A15F5), ref: 00007FF6139D2232
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2250326138.00007FF613981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF613980000, based on PE: true
                                          • Associated: 00000000.00000002.2250309877.00007FF613980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250369486.00007FF6139E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250390465.00007FF6139F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2250405631.00007FF6139F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff613980000_bC7vK74a5a.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                          • Instruction ID: 111b19963bc83ff627cca31fd5a93aa27f7cc40198395bb62f28f080e90365ef
                                          • Opcode Fuzzy Hash: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                          • Instruction Fuzzy Hash: 87F03732618F0082DB448F22F8814287BB8FF98FA87144431DE9E8B729DF38C8A4C340