Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
J1un7vGf29.exe

Overview

General Information

Sample name:J1un7vGf29.exe
renamed because original name is a hash value
Original sample name:40f68d8b1be0f31f4aaf28dccf2f94cb.exe
Analysis ID:1538242
MD5:40f68d8b1be0f31f4aaf28dccf2f94cb
SHA1:f5fbda24294289b81a77c12573ee33cea52ac408
SHA256:98373f6033f41eff577963ce2a8cde8f09394e63de31c866ef5d265b714a9ed9
Tags:64exetrojan
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • J1un7vGf29.exe (PID: 1080 cmdline: "C:\Users\user\Desktop\J1un7vGf29.exe" MD5: 40F68D8B1BE0F31F4AAF28DCCF2F94CB)
    • conhost.exe (PID: 2000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1576 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1784 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1088 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6660 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4464 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6580 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5760 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2884 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1480 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2944 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5972 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3528 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4996 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7096 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5552 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7108 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1264 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • WerFault.exe (PID: 5428 cmdline: C:\Windows\system32\WerFault.exe -pss -s 476 -p 1080 -ip 1080 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • cmd.exe (PID: 528 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 432 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1216 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6468 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6604 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 4768 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5760 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6276 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2860 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6780 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3496 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3652 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1396 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5720 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1784 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 1264 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 5960 cmdline: C:\Windows\system32\WerFault.exe -u -p 1080 -s 996 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: J1un7vGf29.exeReversingLabs: Detection: 39%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
Source: J1un7vGf29.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D909F3D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF63D909F3D
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92EF30 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF63D92EF30
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF63D92CE40
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D925AD0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF63D925AD0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D909300 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF63D909300
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D90C1C0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF63D90C1C0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D90C220 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF63D90C220
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D909230 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF63D909230
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D90C210 CryptHashData,0_2_00007FF63D90C210
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9263F0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF63D9263F0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF63D8EF0E0
Source: J1un7vGf29.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF63D918B00
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: J1un7vGf29.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Plus\x64\Release\EpicGames.pdb source: J1un7vGf29.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F5ED0 malloc,recv,send,WSAGetLastError,0_2_00007FF63D8F5ED0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: J1un7vGf29.exeString found in binary or memory: http://185.101.104.122/plushvciforabronkz.exe
Source: J1un7vGf29.exeString found in binary or memory: http://185.101.104.122/plushvciforabronkz.exeC:
Source: J1un7vGf29.exeString found in binary or memory: http://185.101.104.122/plushvcionbronkz.exe
Source: J1un7vGf29.exeString found in binary or memory: http://185.101.104.122/plushvcionbronkz.exeC:
Source: Amcache.hve.38.drString found in binary or memory: http://upx.sf.net
Source: J1un7vGf29.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: J1un7vGf29.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: J1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: J1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/emNU
Source: J1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF63D92CE40
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D909F3D0_2_00007FF63D909F3D
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F69800_2_00007FF63D8F6980
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F89800_2_00007FF63D8F8980
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F7CC00_2_00007FF63D8F7CC0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8FF5900_2_00007FF63D8FF590
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8E15300_2_00007FF63D8E1530
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92EEC00_2_00007FF63D92EEC0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92CE400_2_00007FF63D92CE40
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8DDDE00_2_00007FF63D8DDDE0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8D10000_2_00007FF63D8D1000
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D909FFC0_2_00007FF63D909FFC
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D90A0050_2_00007FF63D90A005
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D925AD00_2_00007FF63D925AD0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9149F00_2_00007FF63D9149F0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8E89900_2_00007FF63D8E8990
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D907CC00_2_00007FF63D907CC0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8DABFD0_2_00007FF63D8DABFD
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8DEB700_2_00007FF63D8DEB70
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D90C5D00_2_00007FF63D90C5D0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F06000_2_00007FF63D8F0600
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8D955D0_2_00007FF63D8D955D
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9215B00_2_00007FF63D9215B0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9205800_2_00007FF63D920580
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F98400_2_00007FF63D8F9840
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9028900_2_00007FF63D902890
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8D973B0_2_00007FF63D8D973B
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F33300_2_00007FF63D8F3330
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8DD2500_2_00007FF63D8DD250
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D91D2200_2_00007FF63D91D220
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9195200_2_00007FF63D919520
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9053E00_2_00007FF63D9053E0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8F8E80 appears 35 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8FA2A0 appears 37 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8FA410 appears 34 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8F5970 appears 378 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D930236 appears 47 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8F5AF0 appears 323 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8F8DB0 appears 46 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8E3030 appears 49 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8FA330 appears 33 times
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: String function: 00007FF63D8F0240 appears 70 times
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 1080 -ip 1080
Source: classification engineClassification label: mal56.evad.winEXE@71/22@2/2
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8E1E4E FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF63D8E1E4E
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1080
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2000:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5428:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7631b105-76b9-49a4-ac54-849ab36e09e5Jump to behavior
Source: J1un7vGf29.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\J1un7vGf29.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: J1un7vGf29.exeReversingLabs: Detection: 39%
Source: J1un7vGf29.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\J1un7vGf29.exe "C:\Users\user\Desktop\J1un7vGf29.exe"
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 1080 -ip 1080
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1080 -s 996
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: J1un7vGf29.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: J1un7vGf29.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: J1un7vGf29.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Plus\x64\Release\EpicGames.pdb source: J1un7vGf29.exe
Source: J1un7vGf29.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: J1un7vGf29.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: J1un7vGf29.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: J1un7vGf29.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: J1un7vGf29.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F8980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF63D8F8980
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeAPI coverage: 4.3 %
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: Amcache.hve.38.drBinary or memory string: VMware
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.38.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.38.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.38.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.38.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.38.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: vmci.sys
Source: Amcache.hve.38.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.38.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.38.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: VMware20,1
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.38.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.38.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.38.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.38.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.38.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: J1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWbl
Source: Amcache.hve.38.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63D92FD4C
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9300E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF63D9300E8
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F8980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF63D8F8980
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92FEF4 SetUnhandledExceptionFilter,0_2_00007FF63D92FEF4
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63D92FD4C
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92F9F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63D92F9F4
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\J1un7vGf29.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D92FF64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF63D92FF64
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D904A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF63D904A60
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D9149F0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF63D9149F0
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D8F7630 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF63D8F7630
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D91B750 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF63D91B750
Source: C:\Users\user\Desktop\J1un7vGf29.exeCode function: 0_2_00007FF63D91B4F1 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF63D91B4F1
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
2
Virtualization/Sandbox Evasion
LSASS Memory51
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538242 Sample: J1un7vGf29.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 56 36 keyauth.win 2->36 38 241.42.69.40.in-addr.arpa 2->38 44 Multi AV Scanner detection for submitted file 2->44 46 Machine Learning detection for sample 2->46 48 AI detected suspicious sample 2->48 8 J1un7vGf29.exe 1 2->8         started        signatures3 process4 dnsIp5 40 keyauth.win 104.26.0.5, 443, 49710 CLOUDFLARENETUS United States 8->40 42 127.0.0.1 unknown unknown 8->42 11 WerFault.exe 19 16 8->11         started        14 cmd.exe 8->14         started        16 cmd.exe 1 8->16         started        18 17 other processes 8->18 process6 file7 34 C:\ProgramData\Microsoft\...\Report.wer, Unicode 11->34 dropped 20 taskkill.exe 1 14->20         started        22 WerFault.exe 2 14->22         started        24 taskkill.exe 1 16->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 taskkill.exe 1 18->30         started        32 10 other processes 18->32 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
J1un7vGf29.exe39%ReversingLabsWin64.Trojan.Generic
J1un7vGf29.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    241.42.69.40.in-addr.arpa
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.1/false
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://185.101.104.122/plushvcionbronkz.exeJ1un7vGf29.exefalse
          unknown
          http://upx.sf.netAmcache.hve.38.drfalse
          • URL Reputation: safe
          unknown
          http://185.101.104.122/plushvciforabronkz.exeC:J1un7vGf29.exefalse
            unknown
            http://185.101.104.122/plushvciforabronkz.exeJ1un7vGf29.exefalse
              unknown
              https://curl.haxx.se/docs/http-cookies.htmlJ1un7vGf29.exefalse
              • URL Reputation: safe
              unknown
              https://curl.haxx.se/docs/http-cookies.html#J1un7vGf29.exefalse
                unknown
                https://keyauth.win/api/1.2/J1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://185.101.104.122/plushvcionbronkz.exeC:J1un7vGf29.exefalse
                    unknown
                    https://keyauth.win/api/1.1/emNUJ1un7vGf29.exe, 00000000.00000002.2277194844.00000269A19BC000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.0.5
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1538242
                      Start date and time:2024-10-20 21:20:09 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 53s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:42
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:J1un7vGf29.exe
                      renamed because original name is a hash value
                      Original Sample Name:40f68d8b1be0f31f4aaf28dccf2f94cb.exe
                      Detection:MAL
                      Classification:mal56.evad.winEXE@71/22@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 42
                      • Number of non-executed functions: 232
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 52.168.117.173, 13.85.23.206, 20.242.39.171, 20.189.173.21
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • VT rate limit hit for: J1un7vGf29.exe
                      TimeTypeDescription
                      15:21:25API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.0.5G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.MalwareX-gen.7929.18094.exeGet hashmaliciousUnknownBrowse
                                        FREE TEST.exeGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          keyauth.winG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          sims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.75.40
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.206.204
                                          RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                          • 104.26.12.205
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                          • 104.26.0.5
                                          gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          ojSv9FmOwn.lnkGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          a1OueQJq4d.exeGet hashmaliciousDCRatBrowse
                                          • 104.26.0.5
                                          oIDX88LpSs.exeGet hashmaliciousXWormBrowse
                                          • 104.26.0.5
                                          hKWBNgRd7p.exeGet hashmaliciousXWormBrowse
                                          • 104.26.0.5
                                          No context
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9985976635316371
                                          Encrypted:false
                                          SSDEEP:96:ZiFVKm6JsmhL1c7L4faQXIDcQlc6bcEocw3M+HbHg/8BRTf3o8Fa9KUNsPQHdfmO:Y/d6Jz0bfy5jvVmczuiFVZ24lO8L0
                                          MD5:1E8E7D8D6D6538850E095ED57EA165A6
                                          SHA1:9EA5007283243809310C8AD874F297A3C3DCD82B
                                          SHA-256:0F0DDB8B0954E86C6A461085753F49D22509E9A63EAB4442EB55F39BE2637149
                                          SHA-512:6A704EF475E0E060EDD4B95C36836176112D0ADD7AED91FAA02229A131B348FC7788A1C994F086C093E0B8D56A3B063C86110F0C59EC920E86704D2422B15F80
                                          Malicious:true
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.5.6.7.4.5.4.5.5.9.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.5.6.7.5.5.1.4.3.5.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.0.7.5.f.3.1.e.-.8.a.7.5.-.4.9.5.8.-.b.a.a.0.-.2.5.e.b.9.d.c.9.6.c.5.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.d.7.2.3.8.9.7.-.6.7.4.d.-.4.0.3.4.-.9.5.2.4.-.7.b.7.9.e.3.c.b.9.0.7.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.J.1.u.n.7.v.G.f.2.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.3.8.-.0.0.0.1.-.0.0.1.4.-.5.6.5.d.-.8.e.3.6.2.5.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.6.1.e.e.8.b.b.2.3.b.c.7.9.4.c.6.f.7.a.4.2.4.2.f.6.2.2.6.0.3.f.0.0.0.0.f.f.f.f.!.0.0.0.0.f.5.f.b.d.a.2.4.2.9.4.2.8.9.b.8.1.a.7.7.c.1.2.5.7.3.e.e.3.3.c.e.a.5.2.a.c.4.0.8.!.J.1.u.n.7.v.G.f.2.9...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.6.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:21:15 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):102636
                                          Entropy (8bit):1.653538048175926
                                          Encrypted:false
                                          SSDEEP:384:F6JCtgaH20g/fBRuKMsTdpCkOOdiK7ckYjTB5mUuxgF:FPt20KfBRuKMsTdskOOdiNkYJ3
                                          MD5:881CEA93A0A608DB18D8DB0157112E82
                                          SHA1:0399DCB9182F46AB2B63E6966F80C77D1FBC45B3
                                          SHA-256:15BD528A05548B90164CAFE9D41E136B48B36ECDF2A23A087C7780B0D90BA3E4
                                          SHA-512:C6E77F98D373D8B114FB79A8259849723FF16699243F6DFCC6537732D53C4D4BD7D9F19D14489F5F0CF9101E9E185B907CEF54240EB1A685924400FA7913350D
                                          Malicious:false
                                          Preview:MDMP..a..... .......+X.g............$...............,............J..........T.......8...........T...........p'..|i.......................!..............................................................................eJ......T"......Lw......................T.......8...#X.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):10136
                                          Entropy (8bit):3.71624672543535
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJMyqt6YEIBiMEODgmfJeprH89bCvVLfCQ/m:R6lXJMHt6YEeDEODgmfJTq5fS
                                          MD5:7AB169485CB65513706652EC64C711E0
                                          SHA1:C2C97F5854F080103A0E0F629296D2D8970A8332
                                          SHA-256:37158833005BC87B876012EDE47369F79924C9E5D3333D6EE303E8E6523CB346
                                          SHA-512:5E37D81770B67A2AB0CEA77A2BEAFCD57B1C9E6D52E8887F818CA1D5954D60066FC290B74F3AF2D43276EFA4F2EC4BD071789DD51D71BEBFA6E76EC219273D4D
                                          Malicious:false
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.0.8.0.<./.P.i.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4645
                                          Entropy (8bit):4.463614685231288
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zskJg771I9B/KWpW8VYFYm8M4J1u3A0FwQyq85BcApbCPXtSbFSbSeBd:uIjfiI7c/r7VVJ1uwwKcQiXtSRoSMd
                                          MD5:13BD4C9BFF4503371342F382AB1CF18B
                                          SHA1:29DC6BA814E3FFEA443C66D3A01BE4E94679BEF9
                                          SHA-256:7348F61128AC9AD0DB778C42A7F5626EBBDCA74BB425B798A948D13DD1C6A3ED
                                          SHA-512:9399456CC65BD724A68F87C88343289476C93E95ED3634F79E9420CE61226CEE872957306E841F51A3710E99B9104E2DFCD18ABCB66C1C4C1A636975D743F3DA
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552143" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.421643162156298
                                          Encrypted:false
                                          SSDEEP:6144:ESvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN/0uhiTw:PvloTMW+EZMM6DFyt03w
                                          MD5:0B6AA841D7B4F51C2AE43CAFFBBD0F4B
                                          SHA1:0C6B6AC2FA3C80B3337420D3106427BCEDEEDBCB
                                          SHA-256:354F2C8197EE1FE6C2C19A022596CAC0C97A61C23965D8964927D3A8B46D8958
                                          SHA-512:3D3D4DDF6662596E98EC04CF09D67C3E2AE9554BED98675AB556837D1DE0A341D9C2A2D43F0737CE5A72AC2D8279F6726F4DE6093BE7AA0565AF73333D2131CB
                                          Malicious:false
                                          Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmV^.:%#.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\cmd.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):44
                                          Entropy (8bit):4.003997527334849
                                          Encrypted:false
                                          SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                          MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                          SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                          SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                          SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                          Malicious:false
                                          Preview:The system cannot find the file specified...
                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                          Entropy (8bit):6.423311038978997
                                          TrID:
                                          • Win64 Executable Console (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:J1un7vGf29.exe
                                          File size:506'368 bytes
                                          MD5:40f68d8b1be0f31f4aaf28dccf2f94cb
                                          SHA1:f5fbda24294289b81a77c12573ee33cea52ac408
                                          SHA256:98373f6033f41eff577963ce2a8cde8f09394e63de31c866ef5d265b714a9ed9
                                          SHA512:1205819096ac09cd4b72071bf263281801810be3384ddea79e1290c572d09aeb44c9975441fe86c2a7c0a99d69381436909c3cd2056ecdaad9bf7860bacee614
                                          SSDEEP:6144:Fi8fZ/nLeOlMAiyTI+BS6oIC2Dbe/MZWdLpID+RMcA2dHDad2m2+yFMCPaf1:FTfFOf8IyS4LDb6dlIDuzAIOboMCif1
                                          TLSH:C8B46D56A7A807E9D1A7D03CC547C603E7B6B4991311DBDB43A0CA791F63BE12E3A720
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x14005f9d8
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows cui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x670FDA3D [Wed Oct 16 15:22:37 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          call 00007F58FCB87EE8h
                                          dec eax
                                          add esp, 28h
                                          jmp 00007F58FCB877D7h
                                          int3
                                          int3
                                          jmp 00007F58FCB88198h
                                          int3
                                          int3
                                          int3
                                          inc eax
                                          push ebx
                                          dec eax
                                          sub esp, 20h
                                          dec eax
                                          mov ebx, ecx
                                          xor ecx, ecx
                                          call dword ptr [0000178Bh]
                                          dec eax
                                          mov ecx, ebx
                                          call dword ptr [000016F2h]
                                          call dword ptr [00001774h]
                                          dec eax
                                          mov ecx, eax
                                          mov edx, C0000409h
                                          dec eax
                                          add esp, 20h
                                          pop ebx
                                          dec eax
                                          jmp dword ptr [00001770h]
                                          dec eax
                                          mov dword ptr [esp+08h], ecx
                                          dec eax
                                          sub esp, 38h
                                          mov ecx, 00000017h
                                          call dword ptr [00001764h]
                                          test eax, eax
                                          je 00007F58FCB87969h
                                          mov ecx, 00000002h
                                          int 29h
                                          dec eax
                                          lea ecx, dword ptr [00018E12h]
                                          call 00007F58FCB87B2Eh
                                          dec eax
                                          mov eax, dword ptr [esp+38h]
                                          dec eax
                                          mov dword ptr [00018EF9h], eax
                                          dec eax
                                          lea eax, dword ptr [esp+38h]
                                          dec eax
                                          add eax, 08h
                                          dec eax
                                          mov dword ptr [00018E89h], eax
                                          dec eax
                                          mov eax, dword ptr [00018EE2h]
                                          dec eax
                                          mov dword ptr [00018D53h], eax
                                          dec eax
                                          mov eax, dword ptr [esp+40h]
                                          dec eax
                                          mov dword ptr [00018E57h], eax
                                          mov dword ptr [00018D2Dh], C0000409h
                                          mov dword ptr [00018D27h], 00000001h
                                          mov dword ptr [00000031h], 00000000h
                                          Programming Language:
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffd00x70.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe900x140.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5fda80x5fe00e35c1164add83fd7293b483158519475False0.5326963820078227data6.336155931731169IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x610000x16b920x16c007f349d336d6f386b2fdcc2d10122a56bFalse0.3797862293956044data5.57889875441676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x780000xdf80x4003cfa1d3706d13e34002335316e18545cFalse0.212890625data2.4386708342051575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x790000x3f840x400050e902fb009b515c9924ff6238b5e51dFalse0.48175048828125data5.776998787420237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x7e0000x4e40x6000fffa779ce3f96440fc92f1aa0c636a8False0.5123697916666666data4.824092949506385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                          DLLImport
                                          KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                          USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                          ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                          SHELL32.dllShellExecuteA
                                          MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                          urlmon.dllURLDownloadToFileA
                                          Normaliz.dllIdnToAscii
                                          WLDAP32.dll
                                          CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                          WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                          VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                          VCRUNTIME140_1.dll__CxxFrameHandler4
                                          api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                          api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                          api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                          api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                          api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                          api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                          api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                          api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                          api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 21:21:11.296596050 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:11.296649933 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:11.296747923 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:11.332803011 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:11.332844019 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.112807989 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.112900972 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:12.117033005 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:12.117046118 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.117392063 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.124320030 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:12.171403885 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.312694073 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.312757015 CEST44349710104.26.0.5192.168.2.5
                                          Oct 20, 2024 21:21:12.312839985 CEST49710443192.168.2.5104.26.0.5
                                          Oct 20, 2024 21:21:26.396496058 CEST49710443192.168.2.5104.26.0.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 21:21:11.266422033 CEST6353553192.168.2.51.1.1.1
                                          Oct 20, 2024 21:21:11.280337095 CEST53635351.1.1.1192.168.2.5
                                          Oct 20, 2024 21:21:40.517637014 CEST5361325162.159.36.2192.168.2.5
                                          Oct 20, 2024 21:21:41.290982008 CEST5359553192.168.2.51.1.1.1
                                          Oct 20, 2024 21:21:41.298002958 CEST53535951.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 20, 2024 21:21:11.266422033 CEST192.168.2.51.1.1.10xd514Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:21:41.290982008 CEST192.168.2.51.1.1.10x8865Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 20, 2024 21:21:11.280337095 CEST1.1.1.1192.168.2.50xd514No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:21:11.280337095 CEST1.1.1.1192.168.2.50xd514No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:21:11.280337095 CEST1.1.1.1192.168.2.50xd514No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                          Oct 20, 2024 21:21:41.298002958 CEST1.1.1.1192.168.2.50x8865Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                          • keyauth.win
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549710104.26.0.54431080C:\Users\user\Desktop\J1un7vGf29.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-20 19:21:12 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                          Host: keyauth.win
                                          Accept: */*
                                          Content-Length: 58
                                          Content-Type: application/x-www-form-urlencoded
                                          2024-10-20 19:21:12 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 31 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                          Data Ascii: type=init&ver=8.1&name=loader principal&ownerid=9WIvTVJa9m


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Users\user\Desktop\J1un7vGf29.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\J1un7vGf29.exe"
                                          Imagebase:0x7ff63d8d0000
                                          File size:506'368 bytes
                                          MD5 hash:40F68D8B1BE0F31F4AAF28DCCF2F94CB
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:5
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:15:21:07
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:7
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:9
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:11
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:13
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:14
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6d64d0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:15
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:16
                                          Start time:15:21:08
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:15:21:09
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:15:21:09
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:15:21:09
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:15:21:09
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:21
                                          Start time:15:21:10
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:22
                                          Start time:15:21:10
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:23
                                          Start time:15:21:10
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:15:21:10
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:25
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:26
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:27
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:28
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:29
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:30
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\taskkill.exe
                                          Wow64 process (32bit):false
                                          Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          Imagebase:0x7ff7427d0000
                                          File size:101'376 bytes
                                          MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:31
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:32
                                          Start time:15:21:13
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerPro
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:33
                                          Start time:15:21:14
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:34
                                          Start time:15:21:14
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\sc.exe
                                          Wow64 process (32bit):false
                                          Commandline:sc stop HTTPDebuggerProSdk
                                          Imagebase:0x7ff726570000
                                          File size:72'192 bytes
                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:35
                                          Start time:15:21:14
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                          Imagebase:0x7ff6b2150000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:37
                                          Start time:15:21:14
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -pss -s 476 -p 1080 -ip 1080
                                          Imagebase:0x7ff73b510000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:38
                                          Start time:15:21:14
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 1080 -s 996
                                          Imagebase:0x7ff73b510000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.3%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:23.4%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:90
                                            execution_graph 47062 7ff63d8e80b5 47063 7ff63d8e80c4 47062->47063 47067 7ff63d8e80e3 47062->47067 47064 7ff63d8e80d5 47063->47064 47123 7ff63d8e84a0 47063->47123 47082 7ff63d8e6d00 47064->47082 47080 7ff63d8e727b 47067->47080 47127 7ff63d8e5a20 15 API calls 47067->47127 47069 7ff63d8e84a0 17 API calls 47069->47080 47071 7ff63d8e8322 47072 7ff63d8e8313 47131 7ff63d8f5970 19 API calls 47072->47131 47077 7ff63d8f5970 19 API calls 47078 7ff63d8e731e 47077->47078 47078->47077 47078->47080 47080->47069 47080->47071 47080->47072 47080->47078 47081 7ff63d8e6d00 292 API calls 47080->47081 47116 7ff63d8f71f0 47080->47116 47122 7ff63d8f5970 19 API calls 47080->47122 47128 7ff63d8f1430 90 API calls 47080->47128 47129 7ff63d8e5a20 15 API calls 47080->47129 47130 7ff63d9051e0 22 API calls 47080->47130 47081->47080 47083 7ff63d8e6e12 47082->47083 47084 7ff63d8e6d3c 47082->47084 47157 7ff63d92f580 47083->47157 47132 7ff63d8eaf50 47084->47132 47087 7ff63d8e6d47 free free 47089 7ff63d8e6d77 47087->47089 47090 7ff63d8e6db5 47089->47090 47156 7ff63d904cc0 22 API calls 47089->47156 47092 7ff63d8e84a0 17 API calls 47090->47092 47094 7ff63d8e6dcf 47092->47094 47093 7ff63d8e6e7c 47150 7ff63d8fe520 47093->47150 47094->47083 47094->47093 47166 7ff63d8feee0 free free free free 47094->47166 47098 7ff63d8e6eab 47099 7ff63d8e6eb0 free 47098->47099 47099->47099 47100 7ff63d8e6ece 47099->47100 47101 7ff63d8e6ffb 47100->47101 47104 7ff63d8e6f37 47100->47104 47183 7ff63d8f1430 90 API calls 47101->47183 47167 7ff63d8f8e80 47104->47167 47105 7ff63d8e6f96 47170 7ff63d8ee740 92 API calls 47105->47170 47106 7ff63d8e702d 47184 7ff63d8f15b0 292 API calls 47106->47184 47109 7ff63d8e6fb7 47110 7ff63d8e6fe5 47109->47110 47111 7ff63d8e6fbb 47109->47111 47182 7ff63d8f15b0 292 API calls 47110->47182 47171 7ff63d8f5af0 47111->47171 47117 7ff63d8f723a 47116->47117 47118 7ff63d8f725a 47117->47118 47193 7ff63d8fd7b0 47117->47193 47120 7ff63d92f580 8 API calls 47118->47120 47121 7ff63d8f72ee 47120->47121 47121->47080 47122->47080 47124 7ff63d8e84b7 47123->47124 47126 7ff63d8e84f0 47123->47126 47196 7ff63d8e57f0 17 API calls 47124->47196 47126->47064 47127->47080 47128->47080 47129->47080 47130->47080 47131->47071 47133 7ff63d8eaf65 47132->47133 47134 7ff63d8eaf77 47132->47134 47133->47134 47135 7ff63d8eaf6b 47133->47135 47136 7ff63d8eb114 free 47134->47136 47137 7ff63d8eb088 EnterCriticalSection LeaveCriticalSection 47134->47137 47185 7ff63d908da0 WaitForSingleObjectEx CloseHandle 47135->47185 47136->47087 47139 7ff63d8eb0c1 CloseHandle 47137->47139 47140 7ff63d8eb0cb 47137->47140 47147 7ff63d8eb0ec 47139->47147 47142 7ff63d8eb0d1 47140->47142 47143 7ff63d8eb0d9 47140->47143 47141 7ff63d8eaf70 47141->47134 47186 7ff63d908da0 WaitForSingleObjectEx CloseHandle 47142->47186 47187 7ff63d8eb130 7 API calls 47143->47187 47146 7ff63d8eb101 closesocket 47146->47136 47147->47146 47188 7ff63d8e5b00 free 47147->47188 47148 7ff63d8eb0e2 free 47148->47147 47151 7ff63d8fe59a 47150->47151 47155 7ff63d8fe541 47150->47155 47152 7ff63d92f580 8 API calls 47151->47152 47153 7ff63d8e6e8b free 47152->47153 47153->47098 47153->47100 47154 7ff63d8fe563 _time64 47154->47151 47155->47151 47155->47154 47156->47090 47158 7ff63d92f589 47157->47158 47159 7ff63d8e6e47 47158->47159 47160 7ff63d92fa28 IsProcessorFeaturePresent 47158->47160 47159->47067 47161 7ff63d92fa40 47160->47161 47189 7ff63d92fc1c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47161->47189 47163 7ff63d92fa53 47190 7ff63d92f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47163->47190 47166->47093 47191 7ff63d8f9840 13 API calls 47167->47191 47169 7ff63d8f8eb3 47169->47105 47170->47109 47172 7ff63d8f5af9 47171->47172 47173 7ff63d8e6fd6 47171->47173 47180 7ff63d8f5bc9 47172->47180 47192 7ff63d8f8f80 13 API calls 47172->47192 47181 7ff63d8f15b0 292 API calls 47173->47181 47175 7ff63d92f580 8 API calls 47175->47173 47176 7ff63d8f5b4c 47177 7ff63d8f5bb1 47176->47177 47179 7ff63d8f8e80 13 API calls 47176->47179 47178 7ff63d8f5bfe fwrite fwrite 47177->47178 47177->47180 47178->47180 47179->47177 47180->47175 47183->47106 47185->47141 47186->47143 47187->47148 47188->47146 47189->47163 47191->47169 47192->47176 47194 7ff63d8fd7c2 QueryPerformanceCounter 47193->47194 47195 7ff63d8fd7fd GetTickCount 47193->47195 47194->47118 47195->47118 47196->47126 47197 7ff63d8eac10 47198 7ff63d8eac54 47197->47198 47201 7ff63d8eac64 47197->47201 47242 7ff63d8fe0f0 47198->47242 47200 7ff63d8fd7b0 2 API calls 47202 7ff63d8eaca6 47200->47202 47201->47200 47208 7ff63d8eb2b0 calloc 47202->47208 47205 7ff63d8eacc5 47206 7ff63d8eacce 47249 7ff63d8f5970 19 API calls 47206->47249 47209 7ff63d8eb301 malloc 47208->47209 47210 7ff63d8eb43e _errno 47208->47210 47211 7ff63d8eb38c InitializeCriticalSectionEx 47209->47211 47222 7ff63d8eb3b7 47209->47222 47235 7ff63d8eacc1 47210->47235 47250 7ff63d904a60 socket 47211->47250 47212 7ff63d8eb3e0 free 47215 7ff63d8eb3f3 47212->47215 47216 7ff63d8eb3f8 47212->47216 47213 7ff63d8eb3d0 DeleteCriticalSection free 47213->47212 47270 7ff63d908680 free free free 47215->47270 47219 7ff63d8eb402 closesocket 47216->47219 47220 7ff63d8eb408 free 47216->47220 47219->47220 47220->47210 47221 7ff63d8eb466 _strdup 47221->47222 47223 7ff63d8eb480 free _strdup 47221->47223 47222->47212 47222->47213 47224 7ff63d8eb4a2 47223->47224 47225 7ff63d8eb4ce 47223->47225 47269 7ff63d908d50 _beginthreadex 47224->47269 47226 7ff63d8eb551 free 47225->47226 47227 7ff63d8eb4da EnterCriticalSection LeaveCriticalSection 47225->47227 47226->47210 47229 7ff63d8eb504 CloseHandle 47227->47229 47230 7ff63d8eb515 47227->47230 47232 7ff63d8eb538 47229->47232 47233 7ff63d8eb522 47230->47233 47234 7ff63d8eb51a 47230->47234 47231 7ff63d8eb4b6 47231->47235 47236 7ff63d8eb4be _errno 47231->47236 47239 7ff63d8eb548 closesocket 47232->47239 47273 7ff63d8e5b00 free 47232->47273 47272 7ff63d8eb130 7 API calls 47233->47272 47271 7ff63d908da0 WaitForSingleObjectEx CloseHandle 47234->47271 47235->47205 47235->47206 47236->47225 47239->47226 47240 7ff63d8eb52b free 47240->47232 47243 7ff63d8fe10f socket 47242->47243 47244 7ff63d8fe0f9 47242->47244 47245 7ff63d8fe125 47243->47245 47246 7ff63d8fe12c 47243->47246 47244->47201 47245->47201 47274 7ff63d8f65d0 47246->47274 47248 7ff63d8fe136 47248->47201 47249->47205 47251 7ff63d904ab5 htonl setsockopt 47250->47251 47252 7ff63d904ab0 47250->47252 47253 7ff63d904b14 bind 47251->47253 47254 7ff63d904c3b closesocket closesocket closesocket 47251->47254 47255 7ff63d92f580 8 API calls 47252->47255 47253->47254 47256 7ff63d904b2f getsockname 47253->47256 47254->47252 47257 7ff63d8eb3af 47255->47257 47256->47254 47258 7ff63d904b4b listen 47256->47258 47257->47221 47257->47222 47258->47254 47259 7ff63d904b60 socket 47258->47259 47259->47254 47260 7ff63d904b7b connect 47259->47260 47260->47254 47261 7ff63d904b96 accept 47260->47261 47261->47254 47262 7ff63d904bb2 47261->47262 47263 7ff63d8f8e80 13 API calls 47262->47263 47264 7ff63d904bc9 send 47263->47264 47264->47254 47266 7ff63d904bfa recv 47264->47266 47266->47254 47267 7ff63d904c18 memcmp 47266->47267 47267->47254 47268 7ff63d904c2e closesocket 47267->47268 47268->47252 47269->47231 47270->47216 47271->47233 47272->47240 47273->47239 47275 7ff63d8f65e5 47274->47275 47276 7ff63d8f6610 closesocket 47274->47276 47277 7ff63d8f6601 47275->47277 47278 7ff63d8f6626 47275->47278 47276->47248 47282 7ff63d8e5b00 free 47277->47282 47283 7ff63d8e5b00 free 47278->47283 47281 7ff63d8f662e 47281->47248 47282->47276 47283->47281 47284 7ff63d92f85c 47285 7ff63d92f875 47284->47285 47286 7ff63d92f87d 47285->47286 47287 7ff63d92f9b3 47285->47287 47289 7ff63d92f9bd 47286->47289 47295 7ff63d92f89b __scrt_release_startup_lock 47286->47295 47370 7ff63d92fd4c 9 API calls 47287->47370 47371 7ff63d92fd4c 9 API calls 47289->47371 47291 7ff63d92f9c8 47293 7ff63d92f9d0 _exit 47291->47293 47292 7ff63d92f8c0 47294 7ff63d92f946 _get_initial_narrow_environment __p___argv __p___argc 47304 7ff63d8e1530 rand 47294->47304 47295->47292 47295->47294 47298 7ff63d92f93e _register_thread_local_exe_atexit_callback 47295->47298 47298->47294 47305 7ff63d8e1583 47304->47305 47305->47305 47372 7ff63d8e0580 47305->47372 47307 7ff63d8e1595 rand 47308 7ff63d8e1633 SetConsoleTitleA 47307->47308 47309 7ff63d8e15c0 47307->47309 47311 7ff63d8e1685 8 API calls 47308->47311 47312 7ff63d8e1651 47308->47312 47310 7ff63d8e15c2 rand 47309->47310 47319 7ff63d8e162f 47309->47319 47476 7ff63d8e0680 7 API calls Concurrency::cancel_current_task 47309->47476 47310->47309 47391 7ff63d8d2aa0 47311->47391 47313 7ff63d8e1680 47312->47313 47316 7ff63d8e1679 _invalid_parameter_noinfo_noreturn 47312->47316 47313->47311 47316->47313 47319->47308 47370->47289 47371->47291 47373 7ff63d8e0671 47372->47373 47374 7ff63d8e05a6 47372->47374 47499 7ff63d8d1a90 ?_Xlength_error@std@@YAXPEBD 47373->47499 47375 7ff63d8e05b4 memcpy 47374->47375 47376 7ff63d8e05cc 47374->47376 47375->47307 47378 7ff63d8e05dd 47376->47378 47379 7ff63d8e0676 47376->47379 47380 7ff63d8e0634 47376->47380 47497 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47378->47497 47500 7ff63d8d19f0 __std_exception_copy Concurrency::cancel_current_task 47379->47500 47381 7ff63d8e0643 47380->47381 47382 7ff63d8e0639 47380->47382 47386 7ff63d8e0645 memcpy 47381->47386 47498 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47382->47498 47386->47307 47387 7ff63d8e05f3 47389 7ff63d8e05f8 47387->47389 47390 7ff63d8e062d _invalid_parameter_noinfo_noreturn 47387->47390 47388 7ff63d8e067c 47389->47386 47390->47380 47501 7ff63d8d2840 47391->47501 47393 7ff63d8d2aea 47394 7ff63d8d30a8 47393->47394 47514 7ff63d8d3160 47393->47514 47576 7ff63d8d3120 7 API calls 47394->47576 47397 7ff63d8d3104 Sleep exit 47399 7ff63d8d3118 47397->47399 47398 7ff63d8d2b6f 47526 7ff63d8d3c30 47398->47526 47577 7ff63d8d19f0 __std_exception_copy Concurrency::cancel_current_task 47399->47577 47402 7ff63d8d2b7c 47533 7ff63d8d32d0 47402->47533 47403 7ff63d8d311d 47405 7ff63d8d2bac 47406 7ff63d8d3c30 10 API calls 47405->47406 47407 7ff63d8d2bb8 47406->47407 47541 7ff63d8d33d0 47407->47541 47409 7ff63d8d2beb 47410 7ff63d8d3c30 10 API calls 47409->47410 47411 7ff63d8d2bf8 47410->47411 47412 7ff63d8d2c4f 47411->47412 47415 7ff63d8d2c48 _invalid_parameter_noinfo_noreturn 47411->47415 47413 7ff63d8d2c9f 47412->47413 47416 7ff63d8d2c98 _invalid_parameter_noinfo_noreturn 47412->47416 47414 7ff63d8d2cde 47413->47414 47419 7ff63d8d2cd7 _invalid_parameter_noinfo_noreturn 47413->47419 47417 7ff63d8d2d2c 47414->47417 47420 7ff63d8d2d25 _invalid_parameter_noinfo_noreturn 47414->47420 47415->47412 47416->47413 47418 7ff63d8d2d6b 47417->47418 47422 7ff63d8d2d64 _invalid_parameter_noinfo_noreturn 47417->47422 47418->47399 47421 7ff63d8d2db9 47418->47421 47423 7ff63d8d2e1f 47418->47423 47427 7ff63d8d2dfa 47418->47427 47419->47414 47420->47417 47549 7ff63d8d3550 47421->47549 47422->47418 47424 7ff63d8d2e24 47423->47424 47425 7ff63d8d2e2b 47423->47425 47566 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47424->47566 47430 7ff63d8d2e2e memcpy 47425->47430 47565 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47427->47565 47430->47421 47432 7ff63d8d2e02 47433 7ff63d8d2e0a 47432->47433 47435 7ff63d8d2e18 _invalid_parameter_noinfo_noreturn 47432->47435 47433->47430 47435->47423 47476->47309 47497->47387 47498->47389 47500->47388 47502 7ff63d8d2890 47501->47502 47502->47502 47503 7ff63d8d28a0 system 47502->47503 47504 7ff63d8d2900 47503->47504 47504->47504 47505 7ff63d8d2910 system 47504->47505 47506 7ff63d8d2960 47505->47506 47506->47506 47507 7ff63d8d2970 system 47506->47507 47508 7ff63d8d29b0 47507->47508 47508->47508 47509 7ff63d8d29c0 system 47508->47509 47510 7ff63d8d2a00 47509->47510 47510->47510 47511 7ff63d8d2a10 system 47510->47511 47512 7ff63d8d2a70 47511->47512 47512->47512 47513 7ff63d8d2a80 system 47512->47513 47513->47393 47515 7ff63d8d317e 47514->47515 47516 7ff63d8d31c8 47515->47516 47605 7ff63d8d4310 7 API calls Concurrency::cancel_current_task 47515->47605 47518 7ff63d8d3227 47516->47518 47606 7ff63d8d4310 7 API calls Concurrency::cancel_current_task 47516->47606 47578 7ff63d8d5dd0 47518->47578 47522 7ff63d8d3276 47523 7ff63d8d32b7 47522->47523 47525 7ff63d8d32b0 _invalid_parameter_noinfo_noreturn 47522->47525 47523->47398 47524 7ff63d8d326f _invalid_parameter_noinfo_noreturn 47524->47522 47525->47523 47527 7ff63d8d3c4d 47526->47527 47528 7ff63d8d3c63 memcpy 47527->47528 47529 7ff63d8d3ca8 47527->47529 47528->47402 47611 7ff63d8d4eb0 9 API calls Concurrency::cancel_current_task 47529->47611 47532 7ff63d8d3cbb 47532->47402 47534 7ff63d8d32ee 47533->47534 47535 7ff63d8d3338 47534->47535 47618 7ff63d8d4310 7 API calls Concurrency::cancel_current_task 47534->47618 47612 7ff63d8d6dd0 47535->47612 47538 7ff63d8d3354 47539 7ff63d8d33b7 47538->47539 47540 7ff63d8d33b0 _invalid_parameter_noinfo_noreturn 47538->47540 47539->47405 47540->47539 47542 7ff63d8d33ee 47541->47542 47543 7ff63d8d3438 47542->47543 47620 7ff63d8d4310 7 API calls Concurrency::cancel_current_task 47542->47620 47545 7ff63d8d6dd0 12 API calls 47543->47545 47546 7ff63d8d3454 47545->47546 47547 7ff63d8d34b7 47546->47547 47548 7ff63d8d34b0 _invalid_parameter_noinfo_noreturn 47546->47548 47547->47409 47548->47547 47550 7ff63d8d2840 6 API calls 47549->47550 47551 7ff63d8d358c 47550->47551 47621 7ff63d8e1ad0 47551->47621 47553 7ff63d8d3591 47554 7ff63d8d359d 47553->47554 47560 7ff63d8d3632 47553->47560 47650 7ff63d8d4310 7 API calls Concurrency::cancel_current_task 47554->47650 47556 7ff63d8d35c1 47629 7ff63d8e1b90 47560->47629 47565->47432 47566->47433 47576->47397 47577->47403 47579 7ff63d8d5e6f 47578->47579 47580 7ff63d8d5e1a 47578->47580 47581 7ff63d8d5e77 memcpy 47579->47581 47587 7ff63d8d5ecb 47579->47587 47580->47579 47590 7ff63d8d5e1f memcpy 47580->47590 47582 7ff63d8d5eb4 memcpy 47581->47582 47583 7ff63d8d5eb1 47581->47583 47586 7ff63d8d323a 47582->47586 47583->47582 47584 7ff63d8d5fb1 47610 7ff63d8d1a90 ?_Xlength_error@std@@YAXPEBD 47584->47610 47586->47522 47586->47524 47587->47584 47588 7ff63d8d5f49 47587->47588 47592 7ff63d8d5fac 47587->47592 47593 7ff63d8d5f27 47587->47593 47594 7ff63d8d5f4e 47588->47594 47595 7ff63d8d5f56 memcpy 47588->47595 47590->47586 47609 7ff63d8d19f0 __std_exception_copy Concurrency::cancel_current_task 47592->47609 47607 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47593->47607 47608 7ff63d92f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47594->47608 47602 7ff63d8d5f83 memcpy 47595->47602 47603 7ff63d8d5f80 47595->47603 47600 7ff63d8d5f2f 47601 7ff63d8d5f34 47600->47601 47604 7ff63d8d5f42 _invalid_parameter_noinfo_noreturn 47600->47604 47601->47595 47602->47586 47603->47602 47604->47588 47605->47516 47606->47518 47607->47600 47608->47601 47609->47584 47611->47532 47613 7ff63d8d6e95 47612->47613 47614 7ff63d8d6e00 memcpy memcpy memcpy 47612->47614 47619 7ff63d8dc600 9 API calls Concurrency::cancel_current_task 47613->47619 47614->47538 47616 7ff63d8d6eaa 47616->47538 47618->47535 47619->47616 47620->47543 47622 7ff63d8e1add calloc 47621->47622 47628 7ff63d8e1b40 47621->47628 47624 7ff63d8e1b32 47622->47624 47626 7ff63d8e1b6c 47624->47626 47651 7ff63d8f8980 47624->47651 47625 7ff63d8e1b61 47625->47553 47626->47553 47628->47626 47682 7ff63d8f18b0 calloc 47628->47682 47650->47556 47652 7ff63d8f899e WSAStartup 47651->47652 47653 7ff63d8f89e6 47651->47653 47655 7ff63d8f89b2 47652->47655 47656 7ff63d8f89c9 47652->47656 47702 7ff63d922480 47653->47702 47655->47653 47683 7ff63d8f18e5 47682->47683 47684 7ff63d8f18d6 47682->47684 47736 7ff63d8eadd0 calloc 47683->47736 47684->47625 47686 7ff63d8f1908 47703 7ff63d92248e 47702->47703 47709 7ff63d8f89eb 47702->47709 47736->47686 47925 7ff63d901490 47928 7ff63d8efb70 47925->47928 47927 7ff63d9014a7 47929 7ff63d8efb9e 47928->47929 47930 7ff63d8efb97 47928->47930 47931 7ff63d8efbc4 47929->47931 47933 7ff63d8efbcd 47929->47933 47934 7ff63d8efc07 47929->47934 48054 7ff63d8f0550 memset 47930->48054 48058 7ff63d8f5970 19 API calls 47931->48058 47942 7ff63d908df0 47933->47942 47960 7ff63d909430 strchr 47933->47960 48036 7ff63d909a80 47933->48036 47934->47927 47936 7ff63d8efbf2 47936->47934 48055 7ff63d905090 47936->48055 47937 7ff63d8efc17 47937->47934 47943 7ff63d909a80 47942->47943 47944 7ff63d8f71f0 10 API calls 47943->47944 47955 7ff63d909afb 47943->47955 47959 7ff63d909ac9 47943->47959 47946 7ff63d909ae7 47944->47946 47945 7ff63d909bf2 47945->47959 48205 7ff63d90b1e0 69 API calls 47945->48205 47949 7ff63d909bdc 47946->47949 48059 7ff63d909c70 47946->48059 47947 7ff63d8f71f0 10 API calls 47947->47955 48204 7ff63d8f5970 19 API calls 47949->48204 47952 7ff63d909bd5 47952->47959 47955->47945 47955->47947 47955->47949 47956 7ff63d909bbd WSAGetLastError 47955->47956 47957 7ff63d909bac 47955->47957 47955->47959 48113 7ff63d905fe0 47955->48113 48137 7ff63d90aa50 47955->48137 48203 7ff63d8f5970 19 API calls 47956->48203 47957->47949 47957->47959 47959->47936 47961 7ff63d909470 47960->47961 47962 7ff63d909479 strncpy 47961->47962 47963 7ff63d9094ca strncpy 47961->47963 47967 7ff63d9094c5 47961->47967 47968 7ff63d909a6c 47962->47968 47969 7ff63d9094c3 47962->47969 47965 7ff63d9094da strcmp 47963->47965 47966 7ff63d9094fd strcmp 47965->47966 48019 7ff63d9094f3 47965->48019 47970 7ff63d90951b strcmp 47966->47970 47966->48019 47967->47963 48272 7ff63d92fafc 47968->48272 47969->47965 47973 7ff63d909539 strcmp 47970->47973 47970->48019 47975 7ff63d909551 strcmp 47973->47975 47973->48019 47974 7ff63d92f580 8 API calls 47976 7ff63d909a5c 47974->47976 47977 7ff63d909569 strcmp 47975->47977 47975->48019 47976->47936 47979 7ff63d909587 strcmp 47977->47979 47977->48019 47983 7ff63d9095a5 strcmp 47979->47983 47979->48019 47987 7ff63d9095c3 strcmp 47983->47987 47983->48019 47990 7ff63d9095e1 strcmp 47987->47990 47987->48019 47991 7ff63d9095ff strcmp 47990->47991 47990->48019 47993 7ff63d90961d strcmp 47991->47993 47991->48019 47996 7ff63d90963b strcmp 47993->47996 47993->48019 47999 7ff63d909659 strcmp 47996->47999 47996->48019 48001 7ff63d909677 strcmp 47999->48001 47999->48019 48003 7ff63d909695 strcmp 48001->48003 48001->48019 48004 7ff63d9096b3 strcmp 48003->48004 48003->48019 48005 7ff63d9096d1 strcmp 48004->48005 48004->48019 48006 7ff63d9096ef strcmp 48005->48006 48005->48019 48007 7ff63d90970d strcmp 48006->48007 48006->48019 48008 7ff63d90972b strcmp 48007->48008 48007->48019 48009 7ff63d909749 strcmp 48008->48009 48008->48019 48010 7ff63d909767 strcmp 48009->48010 48009->48019 48011 7ff63d909785 strcmp 48010->48011 48010->48019 48012 7ff63d9097a3 strcmp 48011->48012 48011->48019 48013 7ff63d9097c1 strcmp 48012->48013 48012->48019 48014 7ff63d9097df strcmp 48013->48014 48013->48019 48015 7ff63d9097fd strcmp 48014->48015 48014->48019 48016 7ff63d90981b strcmp 48015->48016 48015->48019 48017 7ff63d909839 strcmp 48016->48017 48016->48019 48018 7ff63d909857 strcmp 48017->48018 48017->48019 48018->48019 48020 7ff63d909875 strcmp 48018->48020 48019->47974 48020->48019 48021 7ff63d909893 strcmp 48020->48021 48021->48019 48022 7ff63d9098b1 strcmp 48021->48022 48022->48019 48023 7ff63d9098cf strcmp 48022->48023 48023->48019 48024 7ff63d9098ed strcmp 48023->48024 48024->48019 48025 7ff63d90990b strcmp 48024->48025 48025->48019 48026 7ff63d909929 strcmp 48025->48026 48026->48019 48027 7ff63d909947 strcmp 48026->48027 48027->48019 48028 7ff63d909965 strcmp 48027->48028 48028->48019 48029 7ff63d909983 strcmp 48028->48029 48029->48019 48030 7ff63d9099a1 strcmp 48029->48030 48030->48019 48031 7ff63d9099bf strcmp 48030->48031 48031->48019 48032 7ff63d9099da strcmp 48031->48032 48032->48019 48033 7ff63d9099f5 strcmp 48032->48033 48033->48019 48034 7ff63d909a10 strcmp 48033->48034 48034->48019 48035 7ff63d909a2b strcmp 48034->48035 48035->48019 48037 7ff63d909ad4 48036->48037 48040 7ff63d909ac9 48036->48040 48038 7ff63d8f71f0 10 API calls 48037->48038 48049 7ff63d909afb 48037->48049 48041 7ff63d909ae7 48038->48041 48039 7ff63d909bf2 48039->48040 48290 7ff63d90b1e0 69 API calls 48039->48290 48040->47936 48044 7ff63d909bdc 48041->48044 48046 7ff63d909c70 74 API calls 48041->48046 48042 7ff63d8f71f0 10 API calls 48042->48049 48289 7ff63d8f5970 19 API calls 48044->48289 48046->48049 48047 7ff63d905fe0 19 API calls 48047->48049 48048 7ff63d90aa50 305 API calls 48048->48049 48049->48039 48049->48040 48049->48042 48049->48044 48049->48047 48049->48048 48050 7ff63d909bbd WSAGetLastError 48049->48050 48051 7ff63d909bac 48049->48051 48288 7ff63d8f5970 19 API calls 48050->48288 48051->48040 48051->48044 48053 7ff63d909bd5 48053->48040 48054->47929 48056 7ff63d8fd7b0 2 API calls 48055->48056 48057 7ff63d9050aa 48056->48057 48057->47934 48058->47937 48060 7ff63d909ce2 48059->48060 48061 7ff63d8f8800 14 API calls 48060->48061 48063 7ff63d909d1e 48061->48063 48062 7ff63d909d31 48065 7ff63d909d3a GetModuleHandleA GetProcAddress 48062->48065 48069 7ff63d909d78 48062->48069 48063->48062 48064 7ff63d8f5af0 15 API calls 48063->48064 48064->48062 48066 7ff63d909d5c 48065->48066 48065->48069 48067 7ff63d8f8800 14 API calls 48066->48067 48068 7ff63d909d70 48067->48068 48068->48069 48070 7ff63d8f8800 14 API calls 48069->48070 48083 7ff63d909dd5 48069->48083 48071 7ff63d909dd1 48070->48071 48072 7ff63d909de2 48071->48072 48071->48083 48223 7ff63d8f5970 19 API calls 48072->48223 48074 7ff63d90a707 48206 7ff63d907900 48074->48206 48075 7ff63d90a856 48078 7ff63d92f580 8 API calls 48075->48078 48077 7ff63d90a71c 48079 7ff63d90a72f 48077->48079 48082 7ff63d907900 13 API calls 48077->48082 48080 7ff63d90aa0c 48078->48080 48084 7ff63d8f5af0 15 API calls 48079->48084 48086 7ff63d90a742 48079->48086 48080->47955 48081 7ff63d909f23 48224 7ff63d8f5970 19 API calls 48081->48224 48082->48079 48083->48074 48083->48081 48084->48086 48089 7ff63d8f5af0 15 API calls 48086->48089 48090 7ff63d90a78b 48086->48090 48087 7ff63d90a6fe 48087->48074 48087->48075 48088 7ff63d90a7ed calloc 48091 7ff63d90a847 48088->48091 48092 7ff63d90a860 48088->48092 48089->48090 48090->48088 48225 7ff63d8f5970 19 API calls 48091->48225 48092->48075 48094 7ff63d90a8c9 free 48092->48094 48095 7ff63d90a96c 48092->48095 48096 7ff63d90a946 48094->48096 48097 7ff63d90a8fa 48094->48097 48220 7ff63d8f6230 48095->48220 48230 7ff63d8e1d10 22 API calls 48096->48230 48100 7ff63d90a920 48097->48100 48101 7ff63d90a902 48097->48101 48228 7ff63d8e1d10 22 API calls 48100->48228 48226 7ff63d8e1d10 22 API calls 48101->48226 48104 7ff63d90a950 48231 7ff63d8f5970 19 API calls 48104->48231 48106 7ff63d90a909 48227 7ff63d8f5970 19 API calls 48106->48227 48107 7ff63d90a92a 48229 7ff63d8f5970 19 API calls 48107->48229 48111 7ff63d909df1 48111->48075 48114 7ff63d906027 48113->48114 48118 7ff63d90605b 48113->48118 48115 7ff63d906031 48114->48115 48114->48118 48116 7ff63d90604b Sleep 48115->48116 48117 7ff63d906038 WSASetLastError 48115->48117 48126 7ff63d906054 48115->48126 48116->48126 48117->48126 48120 7ff63d9061a5 48118->48120 48123 7ff63d9061d3 select 48118->48123 48119 7ff63d92f580 8 API calls 48122 7ff63d90630e 48119->48122 48124 7ff63d9061b3 WSASetLastError 48120->48124 48125 7ff63d9061c6 Sleep 48120->48125 48127 7ff63d9061aa 48120->48127 48122->47955 48123->48127 48124->48127 48125->48127 48126->48119 48127->48126 48128 7ff63d906272 __WSAFDIsSet __WSAFDIsSet 48127->48128 48129 7ff63d90629c 48127->48129 48128->48129 48130 7ff63d9062a4 __WSAFDIsSet 48129->48130 48131 7ff63d9062cb 48129->48131 48132 7ff63d9062ba __WSAFDIsSet 48130->48132 48133 7ff63d9062b7 48130->48133 48131->48126 48134 7ff63d9062d3 __WSAFDIsSet 48131->48134 48132->48131 48133->48132 48135 7ff63d9062e9 __WSAFDIsSet 48134->48135 48136 7ff63d9062e6 48134->48136 48135->48126 48136->48135 48139 7ff63d90aac0 48137->48139 48138 7ff63d90b1bf 48139->48138 48140 7ff63d90ab62 48139->48140 48141 7ff63d90ab22 malloc 48139->48141 48142 7ff63d90ab68 malloc 48140->48142 48143 7ff63d90abb3 48140->48143 48141->48138 48141->48140 48142->48138 48142->48143 48144 7ff63d90abc6 realloc 48143->48144 48145 7ff63d90ac20 48143->48145 48144->48145 48146 7ff63d90abe2 48144->48146 48149 7ff63d90ac65 48145->48149 48254 7ff63d8f5cf0 recv 48145->48254 48257 7ff63d8f5970 19 API calls 48146->48257 48150 7ff63d90acaa malloc 48149->48150 48158 7ff63d90abf1 48149->48158 48181 7ff63d90aeba 48149->48181 48150->48138 48151 7ff63d90ad47 memcpy 48150->48151 48152 7ff63d90ad67 free 48151->48152 48151->48158 48157 7ff63d90add9 48152->48157 48152->48158 48153 7ff63d92f580 8 API calls 48155 7ff63d90ac0d 48153->48155 48155->47955 48159 7ff63d90b14c 48157->48159 48161 7ff63d90aefd 48157->48161 48168 7ff63d90adf8 48157->48168 48158->48153 48159->48158 48160 7ff63d90b15a 48159->48160 48270 7ff63d8e1d10 22 API calls 48160->48270 48164 7ff63d90af06 48161->48164 48165 7ff63d90af44 48161->48165 48163 7ff63d90b16f 48271 7ff63d8f5970 19 API calls 48163->48271 48164->48160 48169 7ff63d90af13 48164->48169 48261 7ff63d8e1d10 22 API calls 48165->48261 48171 7ff63d8f6230 48 API calls 48168->48171 48174 7ff63d90ae64 48168->48174 48177 7ff63d90af72 48168->48177 48259 7ff63d8e1d10 22 API calls 48169->48259 48170 7ff63d90af5b 48262 7ff63d8f5970 19 API calls 48170->48262 48171->48168 48172 7ff63d90aed5 48172->48158 48179 7ff63d90ae90 memcpy 48174->48179 48184 7ff63d90af98 48174->48184 48176 7ff63d90af28 48260 7ff63d8f5970 19 API calls 48176->48260 48263 7ff63d8f5970 19 API calls 48177->48263 48179->48181 48179->48184 48258 7ff63d8f5970 19 API calls 48181->48258 48182 7ff63d90b120 48182->48158 48183 7ff63d90b13b 48182->48183 48269 7ff63d925ad0 91 API calls 48183->48269 48184->48158 48184->48182 48186 7ff63d90b0f3 48184->48186 48187 7ff63d90b049 48184->48187 48267 7ff63d8e1d10 22 API calls 48186->48267 48189 7ff63d90b0bb 48187->48189 48193 7ff63d90b057 memset 48187->48193 48191 7ff63d90b0ca CertFreeCertificateContext 48189->48191 48192 7ff63d90b0d0 48189->48192 48190 7ff63d90b107 48268 7ff63d8f5970 19 API calls 48190->48268 48191->48192 48192->48182 48195 7ff63d90b0d4 48192->48195 48196 7ff63d90b07c 48193->48196 48266 7ff63d8f5970 19 API calls 48195->48266 48196->48189 48199 7ff63d90b08c 48196->48199 48202 7ff63d90b0a6 48196->48202 48197 7ff63d90b119 48197->48189 48199->48202 48264 7ff63d8ef0e0 306 API calls 48199->48264 48202->48189 48265 7ff63d8f5970 19 API calls 48202->48265 48203->47952 48204->47952 48205->47959 48207 7ff63d90790c 48206->48207 48211 7ff63d907936 48206->48211 48208 7ff63d907911 _errno 48207->48208 48218 7ff63d907927 48207->48218 48208->48077 48209 7ff63d907990 strchr 48209->48211 48210 7ff63d907aa0 strchr 48212 7ff63d907ac0 strchr 48210->48212 48210->48218 48211->48209 48216 7ff63d9079f7 48211->48216 48212->48218 48213 7ff63d92f580 8 API calls 48214 7ff63d907c06 48213->48214 48214->48077 48215 7ff63d907bb5 48217 7ff63d907b4d 48215->48217 48233 7ff63d907950 strchr 48215->48233 48216->48077 48217->48213 48218->48210 48218->48215 48218->48217 48234 7ff63d8f5ed0 48220->48234 48223->48111 48224->48087 48225->48075 48226->48106 48227->48111 48228->48107 48229->48111 48230->48104 48231->48111 48232 7ff63d8f5970 19 API calls 48232->48075 48233->48217 48235 7ff63d8f5f3f 48234->48235 48236 7ff63d8f5fd7 send 48234->48236 48235->48236 48241 7ff63d905fe0 19 API calls 48235->48241 48237 7ff63d8f6004 48236->48237 48238 7ff63d8f5ff5 WSAGetLastError 48236->48238 48242 7ff63d92f580 8 API calls 48237->48242 48238->48237 48239 7ff63d8f6010 48238->48239 48252 7ff63d8e2500 27 API calls 48239->48252 48244 7ff63d8f5f73 48241->48244 48245 7ff63d8f6057 48242->48245 48243 7ff63d8f6022 48253 7ff63d8f5970 19 API calls 48243->48253 48244->48236 48248 7ff63d8f5f7c 48244->48248 48245->48075 48245->48232 48247 7ff63d8f6034 48247->48237 48249 7ff63d8f5f84 malloc 48248->48249 48250 7ff63d8f5fb0 recv 48248->48250 48249->48250 48251 7ff63d8f5fcd 48249->48251 48250->48236 48250->48251 48251->48236 48252->48243 48253->48247 48255 7ff63d8f5d32 48254->48255 48256 7ff63d8f5d0b WSAGetLastError 48254->48256 48255->48149 48256->48149 48257->48158 48258->48172 48259->48176 48260->48172 48261->48170 48262->48172 48263->48172 48264->48202 48265->48189 48266->48172 48267->48190 48268->48197 48269->48172 48270->48163 48271->48172 48278 7ff63d92fb10 IsProcessorFeaturePresent 48272->48278 48279 7ff63d92fb27 48278->48279 48284 7ff63d92fbac RtlCaptureContext RtlLookupFunctionEntry 48279->48284 48285 7ff63d92fbdc RtlVirtualUnwind 48284->48285 48286 7ff63d92fb3b 48284->48286 48285->48286 48287 7ff63d92f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48286->48287 48288->48053 48289->48053 48290->48040 48291 7ff63d8e7570 48292 7ff63d8e7581 48291->48292 48319 7ff63d8fe420 48292->48319 48294 7ff63d8e75b5 48295 7ff63d8e75e7 48294->48295 48296 7ff63d8f5af0 15 API calls 48294->48296 48347 7ff63d8fee70 314 API calls 48295->48347 48298 7ff63d8e75e1 48296->48298 48298->48295 48300 7ff63d8e75f7 48298->48300 48299 7ff63d8e75f4 48299->48300 48323 7ff63d8e8520 48300->48323 48304 7ff63d8e84a0 17 API calls 48316 7ff63d8e727b 48304->48316 48308 7ff63d8e8322 48309 7ff63d8e8313 48351 7ff63d8f5970 19 API calls 48309->48351 48313 7ff63d8f71f0 10 API calls 48313->48316 48314 7ff63d8f5970 19 API calls 48315 7ff63d8e731e 48314->48315 48315->48314 48315->48316 48316->48304 48316->48308 48316->48309 48316->48313 48316->48315 48318 7ff63d8e6d00 292 API calls 48316->48318 48345 7ff63d8f5970 19 API calls 48316->48345 48348 7ff63d8f1430 90 API calls 48316->48348 48349 7ff63d8e5a20 15 API calls 48316->48349 48350 7ff63d9051e0 22 API calls 48316->48350 48318->48316 48320 7ff63d8fe44a 48319->48320 48352 7ff63d8fef50 48320->48352 48322 7ff63d8fe469 48322->48294 48334 7ff63d8e8586 48323->48334 48324 7ff63d8e8908 memcpy memcpy 48325 7ff63d8e87f0 48324->48325 48326 7ff63d92f580 8 API calls 48325->48326 48327 7ff63d8e7602 48326->48327 48327->48316 48339 7ff63d8feb40 48327->48339 48328 7ff63d8e86ce calloc 48328->48325 48332 7ff63d8e86e8 48328->48332 48329 7ff63d8e8904 48329->48324 48330 7ff63d8fde40 malloc 48330->48332 48331 7ff63d8e87e7 free 48331->48325 48332->48325 48332->48330 48332->48331 48333 7ff63d8fdb00 malloc memcpy 48332->48333 48332->48334 48335 7ff63d8e87df 48332->48335 48333->48332 48334->48328 48334->48332 48336 7ff63d8e87fa 48334->48336 48367 7ff63d8fddd0 free 48335->48367 48336->48324 48336->48329 48368 7ff63d8fddd0 free 48336->48368 48340 7ff63d8feb59 48339->48340 48369 7ff63d8f1e90 48340->48369 48342 7ff63d8e750c 48342->48316 48346 7ff63d8fb580 free 48342->48346 48343 7ff63d8feb70 48343->48342 48393 7ff63d8f1430 90 API calls 48343->48393 48345->48316 48346->48316 48347->48299 48348->48316 48349->48316 48350->48316 48351->48308 48353 7ff63d8fef90 48352->48353 48354 7ff63d8fefcb 48353->48354 48356 7ff63d8fefb6 tolower 48353->48356 48355 7ff63d8f8e80 13 API calls 48354->48355 48357 7ff63d8fefe2 48355->48357 48356->48354 48356->48356 48358 7ff63d8ff0c1 48357->48358 48360 7ff63d8ff028 tolower 48357->48360 48366 7ff63d8ff04c 48357->48366 48361 7ff63d92f580 8 API calls 48358->48361 48359 7ff63d8ff086 _time64 48359->48358 48363 7ff63d8ff0a5 48359->48363 48362 7ff63d8f8e80 13 API calls 48360->48362 48364 7ff63d8ff0ec 48361->48364 48362->48366 48363->48358 48365 7ff63d8f5af0 15 API calls 48363->48365 48364->48322 48365->48358 48366->48358 48366->48359 48367->48331 48368->48336 48370 7ff63d905090 2 API calls 48369->48370 48371 7ff63d8f1eb5 48370->48371 48372 7ff63d8f1ec5 48371->48372 48373 7ff63d8f1eee free 48371->48373 48374 7ff63d8f1f19 48371->48374 48372->48343 48405 7ff63d8f8db0 15 API calls 48373->48405 48376 7ff63d8fd7b0 2 API calls 48374->48376 48378 7ff63d8f1f25 48374->48378 48377 7ff63d8f1f4f 48376->48377 48379 7ff63d8f1f63 48377->48379 48380 7ff63d8f1f91 48377->48380 48378->48343 48394 7ff63d8f6780 48379->48394 48381 7ff63d905090 2 API calls 48380->48381 48383 7ff63d8f1f9e 48381->48383 48387 7ff63d8f1fc1 48383->48387 48388 7ff63d905090 2 API calls 48383->48388 48384 7ff63d8f1f79 48385 7ff63d8f1f81 48384->48385 48386 7ff63d8fd7b0 2 API calls 48384->48386 48385->48343 48389 7ff63d8f2054 48386->48389 48406 7ff63d8f7300 48387->48406 48388->48387 48389->48343 48392 7ff63d8f5af0 15 API calls 48392->48384 48393->48342 48395 7ff63d8fd7b0 2 API calls 48394->48395 48396 7ff63d8f67a3 48395->48396 48397 7ff63d8f681b 48396->48397 48401 7ff63d8f6834 48396->48401 48501 7ff63d8f5970 19 API calls 48397->48501 48399 7ff63d8f682a 48400 7ff63d8f6941 48399->48400 48400->48384 48402 7ff63d8f693d 48401->48402 48436 7ff63d8f7cc0 48401->48436 48402->48400 48502 7ff63d8e57f0 17 API calls 48402->48502 48405->48374 48407 7ff63d8f7533 48406->48407 48408 7ff63d8f7337 48406->48408 48409 7ff63d92f580 8 API calls 48407->48409 48408->48407 48410 7ff63d8f7351 getpeername 48408->48410 48411 7ff63d8f1fda 48409->48411 48412 7ff63d8f73ad getsockname 48410->48412 48413 7ff63d8f7376 WSAGetLastError 48410->48413 48411->48384 48411->48392 48414 7ff63d8f7400 WSAGetLastError 48412->48414 48415 7ff63d8f7437 48412->48415 48531 7ff63d8e2500 27 API calls 48413->48531 48533 7ff63d8e2500 27 API calls 48414->48533 48535 7ff63d8f6530 19 API calls 48415->48535 48419 7ff63d8f7393 48532 7ff63d8f5970 19 API calls 48419->48532 48420 7ff63d8f741d 48534 7ff63d8f5970 19 API calls 48420->48534 48421 7ff63d8f7459 48424 7ff63d8f749d 48421->48424 48425 7ff63d8f745d _errno _errno 48421->48425 48538 7ff63d8f6530 19 API calls 48424->48538 48536 7ff63d8e2500 27 API calls 48425->48536 48426 7ff63d8f73a8 48426->48407 48429 7ff63d8f7483 48537 7ff63d8f5970 19 API calls 48429->48537 48430 7ff63d8f74ef 48430->48407 48431 7ff63d8f74f3 _errno _errno 48430->48431 48539 7ff63d8e2500 27 API calls 48431->48539 48434 7ff63d8f7519 48540 7ff63d8f5970 19 API calls 48434->48540 48437 7ff63d8f7d2f memcpy 48436->48437 48439 7ff63d8f7d98 socket 48437->48439 48442 7ff63d8f7d6b 48437->48442 48439->48442 48441 7ff63d92f580 8 API calls 48443 7ff63d8f826b 48441->48443 48444 7ff63d8f7dd7 48442->48444 48494 7ff63d8f80f4 48442->48494 48523 7ff63d904c90 ioctlsocket 48442->48523 48443->48401 48445 7ff63d8f81fa _errno _errno _errno 48444->48445 48503 7ff63d9211c0 48444->48503 48528 7ff63d8e2500 27 API calls 48445->48528 48448 7ff63d8f822b 48529 7ff63d8f5970 19 API calls 48448->48529 48449 7ff63d8f7e24 48449->48445 48451 7ff63d8f7e2d htons 48449->48451 48452 7ff63d8f5af0 15 API calls 48451->48452 48454 7ff63d8f7e4e 48452->48454 48453 7ff63d8f8240 48455 7ff63d8f65d0 2 API calls 48453->48455 48456 7ff63d8f7ec9 48454->48456 48457 7ff63d8f7e6f setsockopt 48454->48457 48489 7ff63d8f80d5 48455->48489 48462 7ff63d8f8800 14 API calls 48456->48462 48466 7ff63d8f7f01 48456->48466 48457->48456 48458 7ff63d8f7e9d WSAGetLastError 48457->48458 48524 7ff63d8e2500 27 API calls 48458->48524 48459 7ff63d8f7f05 48467 7ff63d8f7f8a setsockopt 48459->48467 48486 7ff63d8f7fc9 48459->48486 48460 7ff63d8f7f22 getsockopt 48463 7ff63d8f7f53 setsockopt 48460->48463 48464 7ff63d8f7f49 48460->48464 48462->48466 48463->48459 48464->48459 48464->48463 48465 7ff63d8f7eb7 48468 7ff63d8f5af0 15 API calls 48465->48468 48466->48459 48466->48460 48469 7ff63d8f7fb7 48467->48469 48471 7ff63d8f7fce 48467->48471 48468->48456 48470 7ff63d8f5af0 15 API calls 48469->48470 48470->48486 48477 7ff63d8f7ffc WSAIoctl 48471->48477 48472 7ff63d8f80fe 48522 7ff63d904c90 ioctlsocket 48472->48522 48473 7ff63d8f80a8 48525 7ff63d8f7630 647 API calls 48473->48525 48476 7ff63d8f810b 48479 7ff63d8fd7b0 2 API calls 48476->48479 48480 7ff63d8f8044 WSAGetLastError 48477->48480 48477->48486 48478 7ff63d8f80c4 48478->48472 48481 7ff63d8f80ca 48478->48481 48482 7ff63d8f8115 48479->48482 48484 7ff63d8f5af0 15 API calls 48480->48484 48485 7ff63d8f65d0 2 API calls 48481->48485 48483 7ff63d8f813f 48482->48483 48526 7ff63d8e57f0 17 API calls 48482->48526 48492 7ff63d8f815f connect 48483->48492 48493 7ff63d8f8188 WSAGetLastError 48483->48493 48483->48494 48484->48486 48485->48489 48487 7ff63d8f8097 48486->48487 48490 7ff63d8f80e9 48486->48490 48487->48472 48487->48473 48489->48494 48491 7ff63d8f65d0 2 API calls 48490->48491 48491->48494 48492->48493 48492->48494 48493->48494 48495 7ff63d8f8195 48493->48495 48494->48441 48495->48494 48527 7ff63d8e2500 27 API calls 48495->48527 48497 7ff63d8f81b1 48498 7ff63d8f5af0 15 API calls 48497->48498 48499 7ff63d8f81c7 48498->48499 48500 7ff63d8f65d0 2 API calls 48499->48500 48500->48494 48501->48399 48502->48400 48504 7ff63d9211f9 48503->48504 48505 7ff63d9211cf 48503->48505 48507 7ff63d8f8e80 13 API calls 48504->48507 48506 7ff63d9211d4 _errno 48505->48506 48514 7ff63d9211e7 48505->48514 48506->48449 48508 7ff63d921268 48507->48508 48509 7ff63d9212b4 _errno 48508->48509 48510 7ff63d921287 48508->48510 48509->48510 48511 7ff63d92f580 8 API calls 48510->48511 48512 7ff63d9212cf 48511->48512 48512->48449 48513 7ff63d8f8e80 13 API calls 48513->48514 48514->48513 48515 7ff63d92155a 48514->48515 48517 7ff63d9214e0 48514->48517 48530 7ff63d921210 14 API calls 48515->48530 48518 7ff63d921509 48517->48518 48519 7ff63d921573 _errno 48517->48519 48520 7ff63d92f580 8 API calls 48518->48520 48519->48518 48521 7ff63d921547 48520->48521 48521->48449 48522->48476 48523->48444 48524->48465 48525->48478 48526->48483 48527->48497 48528->48448 48529->48453 48530->48517 48531->48419 48532->48426 48533->48420 48534->48426 48535->48421 48536->48429 48537->48426 48538->48430 48539->48434 48540->48426 48541 7ff63d8e792b 48542 7ff63d8e7972 48541->48542 48543 7ff63d8e7941 48541->48543 48544 7ff63d8e7a1a 48542->48544 48549 7ff63d8e7970 48542->48549 48578 7ff63d8ff590 48543->48578 48546 7ff63d8e7a34 48544->48546 48550 7ff63d8e7ad4 48544->48550 48825 7ff63d8fc810 24 API calls 48546->48825 48547 7ff63d8e795a 48551 7ff63d905090 2 API calls 48547->48551 48552 7ff63d8e6d00 292 API calls 48549->48552 48573 7ff63d8e727b 48549->48573 48553 7ff63d8e6d00 292 API calls 48550->48553 48550->48573 48551->48549 48552->48573 48553->48573 48554 7ff63d8e7a41 48555 7ff63d8e6d00 292 API calls 48554->48555 48557 7ff63d8e7a61 48555->48557 48559 7ff63d8e7a6a 48557->48559 48560 7ff63d8e7ac6 free 48557->48560 48558 7ff63d8e8322 48562 7ff63d8e7a81 48559->48562 48565 7ff63d8e7a73 free 48559->48565 48560->48573 48561 7ff63d8e8313 48830 7ff63d8f5970 19 API calls 48561->48830 48826 7ff63d8fbdd0 28 API calls 48562->48826 48564 7ff63d8e84a0 17 API calls 48564->48573 48565->48573 48569 7ff63d8f71f0 10 API calls 48569->48573 48570 7ff63d8e7ab7 free 48570->48573 48571 7ff63d8e7a92 48571->48570 48572 7ff63d8e731e 48572->48573 48575 7ff63d8f5970 19 API calls 48572->48575 48573->48558 48573->48561 48573->48564 48573->48569 48573->48572 48576 7ff63d8e6d00 292 API calls 48573->48576 48824 7ff63d8f5970 19 API calls 48573->48824 48827 7ff63d8f1430 90 API calls 48573->48827 48828 7ff63d8e5a20 15 API calls 48573->48828 48829 7ff63d9051e0 22 API calls 48573->48829 48575->48572 48576->48573 48579 7ff63d8ff628 48578->48579 48580 7ff63d8ff661 free _strdup 48579->48580 48583 7ff63d8ff68b 48579->48583 48811 7ff63d8ff63e 48579->48811 48580->48583 48580->48811 48581 7ff63d92f580 8 API calls 48582 7ff63d8e794b 48581->48582 48582->48542 48582->48547 48584 7ff63d8ff755 48583->48584 48585 7ff63d8ff741 free 48583->48585 48586 7ff63d8ff774 48584->48586 48871 7ff63d8f8db0 15 API calls 48584->48871 48585->48584 48588 7ff63d8ff7bf free 48586->48588 48589 7ff63d8ff81d 48586->48589 48586->48811 48591 7ff63d8ff7d2 free 48588->48591 48598 7ff63d8ff881 48589->48598 48872 7ff63d904480 388 API calls 48589->48872 48599 7ff63d8ff923 48591->48599 48600 7ff63d8ff94a 48591->48600 48593 7ff63d8ff869 48596 7ff63d8ff870 free 48593->48596 48593->48598 48595 7ff63d8ff8be free 48595->48591 48595->48811 48596->48811 48598->48595 48873 7ff63d904480 388 API calls 48598->48873 48599->48600 48874 7ff63d8f8db0 15 API calls 48599->48874 48602 7ff63d8ffa06 free 48600->48602 48604 7ff63d8ff9ce free 48600->48604 48600->48811 48603 7ff63d8ff9f5 48602->48603 48605 7ff63d8ffa3d 48603->48605 48611 7ff63d8ffa26 48603->48611 48603->48811 48875 7ff63d8f8db0 15 API calls 48604->48875 48876 7ff63d8ebc00 6 API calls 48605->48876 48608 7ff63d8ffa49 48877 7ff63d923f20 59 API calls 48608->48877 48610 7ff63d8ffa62 48610->48611 48610->48811 48611->48611 48642 7ff63d8ffa2b 48611->48642 48878 7ff63d8ecb70 free free 48611->48878 48612 7ff63d8ffcac free 48623 7ff63d8ffccf 48612->48623 48614 7ff63d8ffb38 48616 7ff63d8ffb7f strchr 48614->48616 48633 7ff63d8ffb51 48614->48633 48615 7ff63d8ffad0 48879 7ff63d8ebe00 26 API calls 48615->48879 48619 7ff63d8ffb94 strchr 48616->48619 48616->48633 48617 7ff63d8ffc8c 48881 7ff63d8f5970 19 API calls 48617->48881 48621 7ff63d8ffba7 strchr 48619->48621 48619->48633 48620 7ff63d8ffdd7 48630 7ff63d8ffe00 48620->48630 48631 7ff63d8ffe3b 48620->48631 48621->48633 48622 7ff63d8ffd05 48882 7ff63d902090 strchr strchr strchr malloc memcpy 48622->48882 48623->48620 48623->48622 48624 7ff63d8ffc05 48624->48617 48624->48633 48626 7ff63d8ffae5 48880 7ff63d8ecb70 free free 48626->48880 48628 7ff63d8ffc9b 48628->48811 48884 7ff63d8f8db0 15 API calls 48630->48884 48885 7ff63d8f8db0 15 API calls 48631->48885 48633->48612 48634 7ff63d8ffd0d 48636 7ff63d8ffd20 free 48634->48636 48637 7ff63d8ffd2b 48634->48637 48634->48811 48638 7ff63d8ffd7f 48636->48638 48639 7ff63d8ffd56 48637->48639 48644 7ff63d8ffd40 memcpy 48637->48644 48643 7ff63d8ffda3 48638->48643 48883 7ff63d8f8db0 15 API calls 48638->48883 48641 7ff63d8ffd5b strchr 48639->48641 48640 7ff63d8ffe39 48640->48643 48670 7ff63d90005f 48640->48670 48640->48811 48645 7ff63d8ffd6b free 48641->48645 48646 7ff63d8ffd68 48641->48646 48642->48614 48642->48624 48642->48811 48643->48628 48643->48640 48886 7ff63d91e540 23 API calls 48643->48886 48644->48641 48645->48638 48646->48645 48649 7ff63d90009e 48657 7ff63d9000da free 48649->48657 48660 7ff63d90022e 48649->48660 48661 7ff63d9000fa 48649->48661 48650 7ff63d9002f0 calloc 48653 7ff63d90031f 48650->48653 48650->48811 48651 7ff63d900052 48652 7ff63d91e510 13 API calls 48651->48652 48652->48628 48831 7ff63d901960 48653->48831 48654 7ff63d900158 48894 7ff63d8f5970 19 API calls 48654->48894 48656 7ff63d8ffeb7 48656->48651 48656->48811 48887 7ff63d91e680 8 API calls 48656->48887 48893 7ff63d8f8db0 15 API calls 48657->48893 48660->48661 48665 7ff63d900252 free 48660->48665 48661->48650 48661->48811 48662 7ff63d900333 48666 7ff63d9003a0 48662->48666 48671 7ff63d900367 48662->48671 48662->48811 48663 7ff63d900171 48674 7ff63d900212 48663->48674 48682 7ff63d9001cf 48663->48682 48668 7ff63d900270 48665->48668 48669 7ff63d90027d 48665->48669 48672 7ff63d9003a5 48666->48672 48673 7ff63d9003ce 48666->48673 48667 7ff63d8fff62 48667->48651 48675 7ff63d8fff6a 48667->48675 48898 7ff63d8f8db0 15 API calls 48668->48898 48669->48668 48676 7ff63d900290 48669->48676 48670->48649 48670->48654 48670->48663 48670->48682 48899 7ff63d9015a0 7 API calls 48671->48899 48679 7ff63d901960 25 API calls 48672->48679 48900 7ff63d9015a0 7 API calls 48673->48900 48896 7ff63d8f5970 19 API calls 48674->48896 48888 7ff63d91e510 48675->48888 48897 7ff63d8f8db0 15 API calls 48676->48897 48697 7ff63d9003cc 48679->48697 48682->48649 48687 7ff63d9001f9 48682->48687 48895 7ff63d8f5970 19 API calls 48687->48895 48689 7ff63d900388 free 48689->48697 48690 7ff63d9003eb 48694 7ff63d901960 25 API calls 48690->48694 48690->48697 48690->48811 48691 7ff63d8fff72 48691->48670 48692 7ff63d90002f 48691->48692 48693 7ff63d8fff9a strstr 48691->48693 48692->48670 48695 7ff63d8fffb2 48693->48695 48694->48697 48695->48692 48696 7ff63d8f8e80 13 API calls 48695->48696 48696->48692 48698 7ff63d901960 25 API calls 48697->48698 48697->48811 48699 7ff63d9005e0 free free free 48698->48699 48701 7ff63d90061e 48699->48701 48699->48811 48700 7ff63d9007db 48702 7ff63d900921 48700->48702 48700->48811 48904 7ff63d907c70 _gmtime64 48700->48904 48701->48700 48704 7ff63d900681 48701->48704 48709 7ff63d900765 48701->48709 48701->48811 48841 7ff63d901a00 48702->48841 48703 7ff63d9007b0 48703->48700 48707 7ff63d9007c4 48703->48707 48703->48811 48901 7ff63d8e9a20 62 API calls 48704->48901 48903 7ff63d9015a0 7 API calls 48707->48903 48708 7ff63d90080d 48713 7ff63d900813 48708->48713 48727 7ff63d900829 48708->48727 48709->48703 48710 7ff63d900784 48709->48710 48714 7ff63d901960 25 API calls 48709->48714 48715 7ff63d901960 25 API calls 48710->48715 48710->48811 48905 7ff63d8f5970 19 API calls 48713->48905 48714->48710 48715->48703 48716 7ff63d9007d8 48716->48700 48718 7ff63d90092f 48719 7ff63d900960 48718->48719 48725 7ff63d900d4c 48718->48725 48718->48811 48721 7ff63d900cf3 48719->48721 48723 7ff63d900970 48719->48723 48724 7ff63d900a57 48719->48724 48720 7ff63d900756 48720->48709 48915 7ff63d9015a0 7 API calls 48721->48915 48723->48721 48747 7ff63d90097a 48723->48747 48726 7ff63d900a60 48724->48726 48742 7ff63d900ad1 48724->48742 48733 7ff63d901960 25 API calls 48725->48733 48736 7ff63d900da5 48725->48736 48730 7ff63d901960 25 API calls 48726->48730 48727->48702 48734 7ff63d8f8e80 13 API calls 48727->48734 48727->48811 48728 7ff63d900d09 48740 7ff63d901710 62 API calls 48728->48740 48728->48811 48729 7ff63d90074e 48902 7ff63d8e9990 9 API calls 48729->48902 48738 7ff63d900a70 48730->48738 48731 7ff63d9006c8 48731->48720 48731->48729 48739 7ff63d901960 25 API calls 48731->48739 48733->48736 48744 7ff63d9008f5 48734->48744 48735 7ff63d900b64 48759 7ff63d900c41 48735->48759 48774 7ff63d900b7f 48735->48774 48737 7ff63d900dd1 48736->48737 48745 7ff63d901960 25 API calls 48736->48745 48736->48811 48760 7ff63d900ec1 48737->48760 48787 7ff63d900df4 48737->48787 48737->48811 48752 7ff63d901710 62 API calls 48738->48752 48738->48811 48739->48731 48746 7ff63d900d2c 48740->48746 48741 7ff63d9009cb 48743 7ff63d9009ef 48741->48743 48741->48811 48907 7ff63d903f90 28 API calls 48741->48907 48749 7ff63d901960 25 API calls 48742->48749 48758 7ff63d900b20 48742->48758 48908 7ff63d9015a0 7 API calls 48743->48908 48906 7ff63d9015a0 7 API calls 48744->48906 48745->48737 48753 7ff63d900aaf 48746->48753 48754 7ff63d900d36 48746->48754 48747->48741 48755 7ff63d901960 25 API calls 48747->48755 48749->48758 48751 7ff63d901960 25 API calls 48751->48758 48761 7ff63d900a93 48752->48761 48911 7ff63d8fc9a0 17 API calls 48753->48911 48916 7ff63d8f5970 19 API calls 48754->48916 48755->48741 48756 7ff63d9009e7 48756->48743 48756->48811 48758->48735 48758->48751 48758->48811 48789 7ff63d900c25 48759->48789 48912 7ff63d903f90 28 API calls 48759->48912 48797 7ff63d900e6c 48760->48797 48917 7ff63d903f90 28 API calls 48760->48917 48761->48753 48765 7ff63d900a99 48761->48765 48910 7ff63d8f5970 19 API calls 48765->48910 48768 7ff63d900917 48768->48702 48768->48811 48771 7ff63d900a05 48776 7ff63d901710 62 API calls 48771->48776 48771->48811 48772 7ff63d901081 48925 7ff63d9015a0 7 API calls 48772->48925 48773 7ff63d900ef7 48781 7ff63d900f11 48773->48781 48792 7ff63d900fe8 48773->48792 48777 7ff63d900bbf strchr 48774->48777 48774->48789 48775 7ff63d900ac8 48775->48811 48927 7ff63d9051e0 22 API calls 48775->48927 48780 7ff63d900a33 48776->48780 48782 7ff63d900bd4 strchr 48777->48782 48796 7ff63d900bf4 48777->48796 48778 7ff63d900e37 strchr 48783 7ff63d900e4c strchr 48778->48783 48778->48797 48784 7ff63d900a4f 48780->48784 48785 7ff63d900a39 48780->48785 48786 7ff63d900f1e 48781->48786 48781->48792 48788 7ff63d900be7 strchr 48782->48788 48782->48796 48790 7ff63d900e5f strchr 48783->48790 48783->48797 48926 7ff63d8fc9a0 17 API calls 48784->48926 48909 7ff63d8f5970 19 API calls 48785->48909 48918 7ff63d9015a0 7 API calls 48786->48918 48787->48778 48787->48797 48788->48796 48913 7ff63d9015a0 7 API calls 48789->48913 48790->48797 48805 7ff63d900f58 48792->48805 48792->48811 48923 7ff63d9015a0 7 API calls 48792->48923 48793 7ff63d900c80 48801 7ff63d901710 62 API calls 48793->48801 48793->48811 48796->48789 48796->48811 48797->48772 48797->48773 48797->48811 48799 7ff63d901155 48806 7ff63d8f5af0 15 API calls 48799->48806 48799->48811 48804 7ff63d900cd3 48801->48804 48802 7ff63d900f34 48809 7ff63d900f45 48802->48809 48810 7ff63d900f5d 48802->48810 48802->48811 48803 7ff63d901043 48851 7ff63d901710 48803->48851 48804->48784 48808 7ff63d900cdd 48804->48808 48805->48803 48805->48811 48806->48811 48914 7ff63d8f5970 19 API calls 48808->48914 48919 7ff63d9015a0 7 API calls 48809->48919 48815 7ff63d900fa4 48810->48815 48818 7ff63d901960 25 API calls 48810->48818 48811->48581 48815->48805 48922 7ff63d9015a0 7 API calls 48815->48922 48817 7ff63d90106b 48924 7ff63d8f5970 19 API calls 48817->48924 48820 7ff63d900f75 48818->48820 48820->48805 48920 7ff63d9015a0 7 API calls 48820->48920 48822 7ff63d900f8c 48822->48815 48921 7ff63d9015a0 7 API calls 48822->48921 48824->48573 48825->48554 48826->48571 48827->48573 48828->48573 48829->48573 48830->48558 48928 7ff63d8f8ef0 15 API calls 48831->48928 48833 7ff63d901989 48834 7ff63d9019ca 48833->48834 48835 7ff63d901991 48833->48835 48836 7ff63d9019e9 48834->48836 48838 7ff63d9019d7 free free 48834->48838 48835->48835 48837 7ff63d9019aa 48835->48837 48836->48662 48929 7ff63d9015a0 7 API calls 48837->48929 48838->48836 48840 7ff63d9019b5 free 48840->48662 48844 7ff63d901a2b 48841->48844 48842 7ff63d901ab0 strchr 48843 7ff63d901ac9 strchr 48842->48843 48842->48844 48843->48844 48844->48842 48845 7ff63d901b18 _strdup 48844->48845 48848 7ff63d901ce4 free 48844->48848 48849 7ff63d901d0a 48844->48849 48850 7ff63d901960 25 API calls 48844->48850 48845->48844 48846 7ff63d901d29 48845->48846 48847 7ff63d901d33 free free 48846->48847 48846->48849 48847->48849 48848->48844 48849->48718 48850->48844 48852 7ff63d901772 48851->48852 48853 7ff63d9017da 48852->48853 48854 7ff63d901784 48852->48854 48930 7ff63d8f61c0 48853->48930 48933 7ff63d8fc080 malloc 48854->48933 48856 7ff63d901799 48858 7ff63d9017a0 48856->48858 48859 7ff63d9017bf memcpy 48856->48859 48861 7ff63d9017a5 free free 48858->48861 48862 7ff63d9017b7 48858->48862 48859->48853 48861->48862 48863 7ff63d901061 48862->48863 48863->48784 48863->48817 48864 7ff63d901929 free free 48864->48863 48865 7ff63d90183c 48934 7ff63d8f58b0 fwrite fwrite 48865->48934 48866 7ff63d90186e 48866->48863 48866->48864 48868 7ff63d90184d 48869 7ff63d901866 48868->48869 48935 7ff63d8f58b0 fwrite fwrite 48868->48935 48869->48866 48871->48586 48872->48593 48873->48595 48874->48600 48875->48603 48876->48608 48877->48610 48878->48615 48879->48626 48880->48642 48881->48628 48882->48634 48883->48643 48884->48640 48885->48640 48886->48656 48887->48667 48889 7ff63d91e530 48888->48889 48890 7ff63d91e515 48888->48890 48889->48691 48958 7ff63d91f4f0 12 API calls 48890->48958 48893->48661 48894->48628 48895->48628 48896->48628 48897->48661 48898->48661 48899->48689 48900->48690 48901->48731 48902->48720 48903->48716 48904->48708 48905->48628 48906->48768 48907->48756 48908->48771 48909->48811 48910->48628 48911->48775 48912->48796 48913->48793 48914->48628 48915->48728 48916->48628 48917->48797 48918->48802 48919->48805 48920->48822 48921->48815 48922->48805 48923->48805 48924->48628 48925->48792 48926->48775 48927->48799 48928->48833 48929->48840 48936 7ff63d90bc90 48930->48936 48933->48856 48934->48868 48935->48869 48937 7ff63d90bd09 malloc 48936->48937 48938 7ff63d90bce2 48936->48938 48939 7ff63d90bd49 48937->48939 48940 7ff63d90bcfc 48937->48940 48938->48937 48938->48940 48941 7ff63d90bd69 memcpy 48939->48941 48942 7ff63d92f580 8 API calls 48940->48942 48950 7ff63d90bdec 48941->48950 48943 7ff63d8f61f0 48942->48943 48943->48865 48943->48866 48944 7ff63d90bef9 free 48944->48940 48945 7ff63d8f71f0 10 API calls 48945->48950 48946 7ff63d90bec1 48957 7ff63d8f5970 19 API calls 48946->48957 48948 7ff63d905fe0 19 API calls 48948->48950 48949 7ff63d90bed3 48949->48944 48950->48944 48950->48945 48950->48946 48950->48948 48951 7ff63d90be9b WSAGetLastError 48950->48951 48953 7ff63d8f6230 48 API calls 48950->48953 48955 7ff63d90be8d 48950->48955 48956 7ff63d8f5970 19 API calls 48951->48956 48953->48950 48954 7ff63d90beb3 48954->48955 48955->48944 48956->48954 48957->48949 48959 7ff63d9091e0 48960 7ff63d922480 26 API calls 48959->48960 48961 7ff63d9091e9 48960->48961 48962 7ff63d90a005 48997 7ff63d90a009 48962->48997 48963 7ff63d90a0d7 48964 7ff63d90a0f6 strchr 48963->48964 48965 7ff63d90a595 calloc 48963->48965 48966 7ff63d90a25b 48964->48966 48967 7ff63d90a10f strncmp 48964->48967 48968 7ff63d90a638 48965->48968 48969 7ff63d90a5bc 48965->48969 48975 7ff63d90a61b 48966->48975 48976 7ff63d90a36e fopen 48966->48976 48970 7ff63d90a150 strncmp 48967->48970 49001 7ff63d90a12c 48967->49001 48978 7ff63d90a69a 48968->48978 48979 7ff63d90a694 CertFreeCertificateContext 48968->48979 49073 7ff63d8f5970 19 API calls 48969->49073 48972 7ff63d90a172 strncmp 48970->48972 48970->49001 48980 7ff63d90a194 strncmp 48972->48980 48972->49001 48973 7ff63d90a229 strchr 48973->48966 48981 7ff63d90a243 _strdup 48973->48981 48974 7ff63d90a5cb 48982 7ff63d90a5d9 CertFreeCertificateContext 48974->48982 49033 7ff63d90a856 48974->49033 49075 7ff63d8f5970 19 API calls 48975->49075 48976->48975 48983 7ff63d90a387 fseek 48976->48983 48984 7ff63d90a69e 48978->48984 48994 7ff63d90a703 48978->48994 48979->48978 48985 7ff63d90a1b3 strncmp 48980->48985 48980->49001 48981->48966 48989 7ff63d90a263 48981->48989 48982->49033 48987 7ff63d90a3bd 48983->48987 48988 7ff63d90a3b1 ftell 48983->48988 49076 7ff63d8e1d10 22 API calls 48984->49076 48985->48973 48991 7ff63d90a1ca strncmp 48985->48991 48986 7ff63d90a090 strtol 48992 7ff63d90a0b2 strchr 48986->48992 48986->48997 48995 7ff63d90a5e9 fclose 48987->48995 48996 7ff63d90a3ce fseek 48987->48996 48988->48987 48989->48966 48989->48989 49008 7ff63d90a284 CertOpenStore 48989->49008 49000 7ff63d90a1e9 strncmp 48991->49000 48991->49001 48992->48963 48992->48997 48993 7ff63d92f580 8 API calls 49004 7ff63d90aa0c 48993->49004 49005 7ff63d907900 13 API calls 48994->49005 49074 7ff63d8f5970 19 API calls 48995->49074 48996->48995 48998 7ff63d90a3eb malloc 48996->48998 48997->48963 48997->48986 48997->48992 49002 7ff63d909430 306 API calls 48997->49002 49017 7ff63d90a137 48997->49017 48998->48995 49007 7ff63d90a404 fread 48998->49007 48999 7ff63d90a6b2 49077 7ff63d8f5970 19 API calls 48999->49077 49000->49001 49010 7ff63d90a208 strncmp 49000->49010 49001->48973 49002->48997 49006 7ff63d90a71c 49005->49006 49012 7ff63d90a72f 49006->49012 49019 7ff63d907900 13 API calls 49006->49019 49007->48995 49013 7ff63d90a422 fclose 49007->49013 49014 7ff63d90a2d7 free CryptStringToBinaryA 49008->49014 49015 7ff63d90a2a7 GetLastError 49008->49015 49010->48966 49010->49001 49011 7ff63d90a608 free 49011->49033 49022 7ff63d8f5af0 15 API calls 49012->49022 49029 7ff63d90a742 49012->49029 49020 7ff63d90a44f malloc 49013->49020 49021 7ff63d90a43f 49013->49021 49024 7ff63d90a561 CertCloseStore 49014->49024 49025 7ff63d90a322 CertFindCertificateInStore 49014->49025 49069 7ff63d8f5970 19 API calls 49015->49069 49016 7ff63d90a6c4 free 49026 7ff63d90a146 49016->49026 49016->49033 49068 7ff63d8f5970 19 API calls 49017->49068 49019->49012 49027 7ff63d90a469 MultiByteToWideChar 49020->49027 49028 7ff63d90a493 PFXImportCertStore free free 49020->49028 49021->49020 49022->49029 49024->49033 49031 7ff63d90a57a CertCloseStore 49025->49031 49032 7ff63d90a354 49025->49032 49026->49033 49027->49028 49037 7ff63d90a51a CertFindCertificateInStore 49028->49037 49038 7ff63d90a4c4 GetLastError 49028->49038 49036 7ff63d8f5af0 15 API calls 49029->49036 49039 7ff63d90a78b 49029->49039 49030 7ff63d90a2c6 free 49030->49033 49031->48965 49032->49024 49033->48993 49034 7ff63d90a7ed calloc 49040 7ff63d90a847 49034->49040 49041 7ff63d90a860 49034->49041 49036->49039 49042 7ff63d90a576 49037->49042 49043 7ff63d90a542 GetLastError 49037->49043 49044 7ff63d90a4d9 49038->49044 49045 7ff63d90a501 49038->49045 49039->49034 49078 7ff63d8f5970 19 API calls 49040->49078 49041->49033 49050 7ff63d90a8c9 free 49041->49050 49051 7ff63d90a96c 49041->49051 49042->49031 49072 7ff63d8f5970 19 API calls 49043->49072 49070 7ff63d8f5970 19 API calls 49044->49070 49071 7ff63d8f5970 19 API calls 49045->49071 49052 7ff63d90a946 49050->49052 49053 7ff63d90a8fa 49050->49053 49054 7ff63d8f6230 48 API calls 49051->49054 49083 7ff63d8e1d10 22 API calls 49052->49083 49056 7ff63d90a920 49053->49056 49057 7ff63d90a902 49053->49057 49058 7ff63d90a98d 49054->49058 49081 7ff63d8e1d10 22 API calls 49056->49081 49079 7ff63d8e1d10 22 API calls 49057->49079 49058->49033 49085 7ff63d8f5970 19 API calls 49058->49085 49060 7ff63d90a950 49084 7ff63d8f5970 19 API calls 49060->49084 49062 7ff63d90a909 49080 7ff63d8f5970 19 API calls 49062->49080 49063 7ff63d90a92a 49082 7ff63d8f5970 19 API calls 49063->49082 49068->49026 49069->49030 49070->49026 49071->49026 49072->49024 49073->48974 49074->49011 49075->49026 49076->48999 49077->49016 49078->49033 49079->49062 49080->49026 49081->49063 49082->49026 49083->49060 49084->49026 49085->49033 49086 7ff63d8eb1a0 49087 7ff63d8f8e80 13 API calls 49086->49087 49088 7ff63d8eb1df 49087->49088 49105 7ff63d9086d0 getaddrinfo 49088->49105 49091 7ff63d8eb21d EnterCriticalSection 49095 7ff63d8eb22c LeaveCriticalSection 49091->49095 49096 7ff63d8eb248 49091->49096 49092 7ff63d8eb1fb WSAGetLastError 49093 7ff63d8eb205 WSAGetLastError 49092->49093 49094 7ff63d8eb21a 49092->49094 49093->49091 49094->49091 49123 7ff63d8eb130 7 API calls 49095->49123 49097 7ff63d8eb252 send 49096->49097 49098 7ff63d8eb276 LeaveCriticalSection 49096->49098 49097->49098 49100 7ff63d8eb26d WSAGetLastError 49097->49100 49101 7ff63d8eb286 49098->49101 49100->49098 49103 7ff63d92f580 8 API calls 49101->49103 49102 7ff63d8eb23d free 49102->49101 49104 7ff63d8eb295 49103->49104 49106 7ff63d8eb1f5 49105->49106 49109 7ff63d908703 49105->49109 49106->49091 49106->49092 49107 7ff63d908874 WSASetLastError 49107->49106 49108 7ff63d9087ee 49110 7ff63d908837 49108->49110 49111 7ff63d908831 freeaddrinfo 49108->49111 49109->49107 49109->49108 49112 7ff63d908759 malloc 49109->49112 49113 7ff63d90883c 49110->49113 49114 7ff63d90886f 49110->49114 49111->49110 49115 7ff63d90881c 49112->49115 49116 7ff63d908770 malloc 49112->49116 49113->49106 49117 7ff63d908841 free free free 49113->49117 49114->49106 49114->49107 49115->49108 49118 7ff63d9087a7 memcpy 49116->49118 49119 7ff63d90880b free 49116->49119 49117->49106 49117->49117 49120 7ff63d9087bf _strdup 49118->49120 49122 7ff63d9087ce 49118->49122 49119->49108 49121 7ff63d9087f0 free free 49120->49121 49120->49122 49121->49108 49122->49109 49123->49102 49124 7ff63d8febe0 49125 7ff63d8fec2e 49124->49125 49126 7ff63d8fef50 18 API calls 49125->49126 49127 7ff63d8fec4b 49126->49127 49128 7ff63d8f5af0 15 API calls 49127->49128 49129 7ff63d8fec67 49127->49129 49128->49129 49131 7ff63d907900 13 API calls 49129->49131 49144 7ff63d8fedb5 49129->49144 49130 7ff63d92f580 8 API calls 49133 7ff63d8fede2 49130->49133 49132 7ff63d8fece6 49131->49132 49134 7ff63d8fed0b 49132->49134 49135 7ff63d8fecea 49132->49135 49137 7ff63d907900 13 API calls 49134->49137 49158 7ff63d9088b0 15 API calls 49135->49158 49139 7ff63d8fed1d 49137->49139 49138 7ff63d8fecff 49138->49134 49140 7ff63d8fedfa 49138->49140 49141 7ff63d8fed21 49139->49141 49148 7ff63d8fed42 49139->49148 49142 7ff63d8fee04 49140->49142 49159 7ff63d9088b0 15 API calls 49141->49159 49163 7ff63d8fe160 27 API calls 49142->49163 49144->49130 49146 7ff63d8fed36 49146->49140 49146->49148 49147 7ff63d8fee26 49149 7ff63d8fedae 49147->49149 49164 7ff63d908680 free free free 49147->49164 49148->49144 49152 7ff63d8fed73 49148->49152 49160 7ff63d9229b0 585 API calls 49148->49160 49149->49144 49152->49140 49153 7ff63d8fed90 49152->49153 49153->49144 49154 7ff63d8fedb0 49153->49154 49155 7ff63d8feda9 49153->49155 49162 7ff63d8eae00 51 API calls 49154->49162 49161 7ff63d922bb0 314 API calls 49155->49161 49158->49138 49159->49146 49160->49152 49161->49149 49162->49144 49163->49147 49164->49149 49165 7ff63d8e777b 49166 7ff63d8e778e 49165->49166 49167 7ff63d8e7847 49166->49167 49170 7ff63d8e7796 49166->49170 49188 7ff63d8fb6d0 49166->49188 49168 7ff63d8e77d3 49167->49168 49167->49170 49171 7ff63d8e6d00 292 API calls 49168->49171 49184 7ff63d8e727b 49170->49184 49227 7ff63d8fb580 free 49170->49227 49171->49184 49173 7ff63d8e77cd 49173->49167 49173->49168 49173->49170 49208 7ff63d9012d0 49173->49208 49174 7ff63d8e84a0 17 API calls 49174->49184 49176 7ff63d8e8322 49177 7ff63d8e8313 49231 7ff63d8f5970 19 API calls 49177->49231 49181 7ff63d8f71f0 10 API calls 49181->49184 49182 7ff63d8f5970 19 API calls 49183 7ff63d8e731e 49182->49183 49183->49182 49183->49184 49184->49174 49184->49176 49184->49177 49184->49181 49184->49183 49186 7ff63d8e6d00 292 API calls 49184->49186 49226 7ff63d8f5970 19 API calls 49184->49226 49228 7ff63d8f1430 90 API calls 49184->49228 49229 7ff63d8e5a20 15 API calls 49184->49229 49230 7ff63d9051e0 22 API calls 49184->49230 49186->49184 49189 7ff63d8fb704 49188->49189 49192 7ff63d8fb71f 49188->49192 49191 7ff63d8efb70 306 API calls 49189->49191 49189->49192 49190 7ff63d8fb761 memset 49196 7ff63d8fb793 49190->49196 49191->49192 49192->49190 49194 7ff63d8fb725 49192->49194 49193 7ff63d92f580 8 API calls 49195 7ff63d8fb8c5 49193->49195 49194->49193 49195->49173 49197 7ff63d8fb7ee calloc 49196->49197 49198 7ff63d8fb866 49196->49198 49200 7ff63d8fb81c 49197->49200 49201 7ff63d8fb806 49197->49201 49232 7ff63d8faa80 455 API calls 49198->49232 49203 7ff63d8f5af0 15 API calls 49200->49203 49201->49194 49202 7ff63d8fb876 49205 7ff63d8f5af0 15 API calls 49202->49205 49206 7ff63d8fb891 49202->49206 49204 7ff63d8fb82b 49203->49204 49204->49198 49205->49206 49206->49194 49207 7ff63d8fb89b free 49206->49207 49207->49194 49209 7ff63d9012fc 49208->49209 49210 7ff63d8fb6d0 458 API calls 49209->49210 49213 7ff63d901306 49210->49213 49211 7ff63d92f580 8 API calls 49212 7ff63d901462 49211->49212 49212->49167 49214 7ff63d90141c 49213->49214 49215 7ff63d901357 49213->49215 49218 7ff63d901436 49213->49218 49216 7ff63d8efb70 306 API calls 49214->49216 49214->49218 49217 7ff63d8f8e80 13 API calls 49215->49217 49216->49218 49219 7ff63d9013c8 calloc 49217->49219 49218->49211 49220 7ff63d9013e0 49219->49220 49221 7ff63d9013e7 49219->49221 49220->49218 49222 7ff63d901960 25 API calls 49221->49222 49223 7ff63d9013f6 49222->49223 49223->49218 49224 7ff63d901710 62 API calls 49223->49224 49225 7ff63d901418 49224->49225 49225->49214 49225->49218 49226->49184 49227->49184 49228->49184 49229->49184 49230->49184 49231->49176 49232->49202 49233 7ff63d9120b0 49234 7ff63d9120d9 49233->49234 49235 7ff63d912140 49233->49235 49237 7ff63d9120ea 49234->49237 49238 7ff63d912100 49234->49238 49236 7ff63d8fb6d0 458 API calls 49235->49236 49241 7ff63d91214d 49236->49241 49307 7ff63d8fb5d0 456 API calls 49237->49307 49268 7ff63d8f6980 49238->49268 49251 7ff63d9121b1 49241->49251 49254 7ff63d91222a 49241->49254 49309 7ff63d92aa80 35 API calls 49241->49309 49242 7ff63d9120f5 49244 7ff63d912111 49244->49254 49308 7ff63d912d30 65 API calls 49244->49308 49245 7ff63d9122de 49317 7ff63d8fc9a0 17 API calls 49245->49317 49246 7ff63d9121e2 49248 7ff63d91223e 49246->49248 49249 7ff63d9121ee 49246->49249 49263 7ff63d912247 49248->49263 49313 7ff63d92cb10 _errno strtoll _errno 49248->49313 49310 7ff63d912a40 322 API calls 49249->49310 49251->49245 49251->49246 49251->49254 49255 7ff63d912135 49257 7ff63d9121f8 49257->49254 49311 7ff63d912590 26 API calls 49257->49311 49259 7ff63d91229e 49259->49254 49316 7ff63d92aa80 35 API calls 49259->49316 49262 7ff63d912263 49262->49259 49262->49263 49265 7ff63d912289 49262->49265 49263->49259 49315 7ff63d912dd0 72 API calls 49263->49315 49264 7ff63d912213 49264->49254 49312 7ff63d912980 32 API calls 49264->49312 49314 7ff63d912dd0 72 API calls 49265->49314 49269 7ff63d8f69d8 49268->49269 49284 7ff63d8f69cf 49268->49284 49270 7ff63d8fd7b0 2 API calls 49269->49270 49273 7ff63d8f69f2 49270->49273 49271 7ff63d92f580 8 API calls 49272 7ff63d8f6f05 49271->49272 49272->49235 49272->49244 49274 7ff63d8f6a82 49273->49274 49275 7ff63d8f6a69 49273->49275 49277 7ff63d8f6a8c 49274->49277 49288 7ff63d8f6ab9 49274->49288 49339 7ff63d8f5970 19 API calls 49275->49339 49279 7ff63d8f7b50 662 API calls 49277->49279 49278 7ff63d8f6a78 49278->49284 49280 7ff63d8f6a9a 49279->49280 49283 7ff63d8f7c60 51 API calls 49280->49283 49280->49284 49281 7ff63d905fe0 19 API calls 49281->49288 49282 7ff63d8f6d95 49282->49284 49341 7ff63d8f8280 667 API calls 49282->49341 49283->49284 49284->49271 49285 7ff63d8f6d04 SleepEx getsockopt 49287 7ff63d8f6d4c WSAGetLastError 49285->49287 49285->49288 49287->49288 49288->49281 49288->49282 49288->49285 49289 7ff63d8f6ca6 SleepEx getsockopt 49288->49289 49290 7ff63d8f6dd3 49288->49290 49291 7ff63d8f6bb7 WSASetLastError 49288->49291 49305 7ff63d8f5af0 15 API calls 49288->49305 49306 7ff63d8f8280 667 API calls 49288->49306 49340 7ff63d8e2500 27 API calls 49288->49340 49289->49288 49292 7ff63d8f6cee WSAGetLastError 49289->49292 49295 7ff63d8f65d0 2 API calls 49290->49295 49299 7ff63d8f6e2b 49290->49299 49291->49288 49292->49288 49293 7ff63d8f6dae 49293->49284 49297 7ff63d8f6dc7 49293->49297 49295->49299 49342 7ff63d8e2500 27 API calls 49297->49342 49298 7ff63d8f6ea7 49343 7ff63d8f5970 19 API calls 49298->49343 49318 7ff63d8f7b50 49299->49318 49300 7ff63d8f6e49 49300->49284 49331 7ff63d8f7c60 49300->49331 49303 7ff63d8f6ec5 49303->49284 49305->49288 49306->49288 49307->49242 49308->49255 49309->49251 49310->49257 49311->49264 49312->49254 49313->49262 49314->49259 49315->49259 49316->49254 49317->49254 49319 7ff63d8f7c55 49318->49319 49323 7ff63d8f7b67 49318->49323 49319->49300 49320 7ff63d8f7c37 49346 7ff63d906440 634 API calls 49320->49346 49322 7ff63d8f7c0a 49345 7ff63d906a90 661 API calls 49322->49345 49323->49320 49323->49322 49326 7ff63d8f7bec 49323->49326 49325 7ff63d8f7c50 49325->49300 49326->49322 49328 7ff63d8f7bf1 49326->49328 49327 7ff63d8f7c32 49327->49300 49344 7ff63d8f5970 19 API calls 49328->49344 49330 7ff63d8f7c00 49330->49300 49332 7ff63d8f7c80 49331->49332 49333 7ff63d8f7c8d 49331->49333 49334 7ff63d905090 2 API calls 49332->49334 49335 7ff63d8f7300 47 API calls 49333->49335 49334->49333 49336 7ff63d8f7c9d 49335->49336 49347 7ff63d8f20a0 15 API calls 49336->49347 49338 7ff63d8f7ca5 49338->49284 49339->49278 49340->49288 49341->49293 49342->49298 49343->49303 49344->49330 49345->49327 49346->49325 49347->49338 49348 7ff63d8e743c 49349 7ff63d905090 2 API calls 49348->49349 49350 7ff63d8e7449 49349->49350 49351 7ff63d8e7465 49350->49351 49406 7ff63d8e57f0 17 API calls 49350->49406 49353 7ff63d8e7481 49351->49353 49407 7ff63d8e57f0 17 API calls 49351->49407 49375 7ff63d8f1190 free free 49353->49375 49356 7ff63d8e7491 49357 7ff63d8f5af0 15 API calls 49356->49357 49360 7ff63d8e74e7 49356->49360 49365 7ff63d8e727b 49356->49365 49358 7ff63d8e74db 49357->49358 49359 7ff63d8e84a0 17 API calls 49358->49359 49359->49360 49360->49365 49408 7ff63d8fb580 free 49360->49408 49363 7ff63d8e8322 49364 7ff63d8e8313 49412 7ff63d8f5970 19 API calls 49364->49412 49365->49363 49365->49364 49367 7ff63d8e84a0 17 API calls 49365->49367 49370 7ff63d8f71f0 10 API calls 49365->49370 49371 7ff63d8e731e 49365->49371 49374 7ff63d8e6d00 292 API calls 49365->49374 49405 7ff63d8f5970 19 API calls 49365->49405 49409 7ff63d8f1430 90 API calls 49365->49409 49410 7ff63d8e5a20 15 API calls 49365->49410 49411 7ff63d9051e0 22 API calls 49365->49411 49367->49365 49370->49365 49371->49365 49373 7ff63d8f5970 19 API calls 49371->49373 49373->49371 49374->49365 49376 7ff63d8f0f70 292 API calls 49375->49376 49377 7ff63d8f11ea 49376->49377 49378 7ff63d8f0f70 292 API calls 49377->49378 49379 7ff63d8f11f6 memset 49378->49379 49413 7ff63d8f2920 49379->49413 49381 7ff63d8f12be 49386 7ff63d8f123d 49381->49386 49504 7ff63d8f1430 90 API calls 49381->49504 49383 7ff63d905090 2 API calls 49385 7ff63d8f125f 49383->49385 49385->49386 49387 7ff63d8f12b2 49385->49387 49388 7ff63d8f128b free 49385->49388 49386->49356 49387->49381 49390 7ff63d8fd7b0 2 API calls 49387->49390 49503 7ff63d8f8db0 15 API calls 49388->49503 49391 7ff63d8f1300 49390->49391 49392 7ff63d8f1314 49391->49392 49393 7ff63d8f133d 49391->49393 49394 7ff63d8f6780 667 API calls 49392->49394 49395 7ff63d905090 2 API calls 49393->49395 49396 7ff63d8f132a 49394->49396 49397 7ff63d8f134a 49395->49397 49396->49381 49398 7ff63d8f13f7 49396->49398 49400 7ff63d8f136d 49397->49400 49401 7ff63d905090 2 API calls 49397->49401 49399 7ff63d8fd7b0 2 API calls 49398->49399 49399->49386 49402 7ff63d8f7300 47 API calls 49400->49402 49401->49400 49403 7ff63d8f1387 49402->49403 49403->49398 49404 7ff63d8f5af0 15 API calls 49403->49404 49404->49398 49405->49365 49406->49351 49407->49353 49408->49365 49409->49365 49410->49365 49411->49365 49412->49363 49414 7ff63d8f2965 49413->49414 49502 7ff63d8f2989 49414->49502 49505 7ff63d8f2120 calloc 49414->49505 49416 7ff63d8f299b 49416->49502 49520 7ff63d8f4590 49416->49520 49417 7ff63d92f580 8 API calls 49418 7ff63d8f1225 49417->49418 49418->49381 49418->49383 49418->49386 49421 7ff63d8f29e4 49423 7ff63d8f29f0 _strdup 49421->49423 49424 7ff63d8f2a02 49421->49424 49422 7ff63d8f29d2 _strdup 49422->49421 49422->49502 49423->49424 49423->49502 49570 7ff63d8f3330 49424->49570 49428 7ff63d8f8e80 13 API calls 49429 7ff63d8f2a75 49428->49429 49429->49502 49629 7ff63d8f3b80 49429->49629 49430 7ff63d8f2ac7 49431 7ff63d8f2b22 49430->49431 49432 7ff63d8f2b0c _strdup 49430->49432 49430->49502 49433 7ff63d8f2b45 49431->49433 49434 7ff63d8f2b2c _strdup 49431->49434 49432->49431 49432->49502 49645 7ff63d8f3ff0 49433->49645 49434->49433 49434->49502 49439 7ff63d8f2b92 49441 7ff63d8f2bb4 49439->49441 49442 7ff63d8f16c0 38 API calls 49439->49442 49439->49502 49440 7ff63d8f16c0 38 API calls 49440->49439 49443 7ff63d8f16c0 38 API calls 49441->49443 49444 7ff63d8f2bd6 49441->49444 49441->49502 49442->49441 49443->49444 49445 7ff63d8f2d6f 49444->49445 49448 7ff63d8f2cd4 49444->49448 49444->49502 49667 7ff63d8eeea0 49445->49667 49447 7ff63d8f2f0a 49449 7ff63d8eeea0 8 API calls 49447->49449 49447->49502 49450 7ff63d8f2cf4 49448->49450 49451 7ff63d8f2d5f 49448->49451 49452 7ff63d8f2f21 49449->49452 49748 7ff63d8edde0 17 API calls 49450->49748 49453 7ff63d8f1790 2 API calls 49451->49453 49452->49502 49691 7ff63d8f4a50 49452->49691 49453->49502 49455 7ff63d8f2d0a 49458 7ff63d8f54c0 17 API calls 49455->49458 49455->49502 49467 7ff63d8f2d1c 49458->49467 49459 7ff63d8f3014 49463 7ff63d8f30c1 49459->49463 49752 7ff63d8ee380 13 API calls 49459->49752 49461 7ff63d8f2d22 49461->49502 49462 7ff63d8f2f79 49462->49459 49464 7ff63d8f2f81 49462->49464 49465 7ff63d8f5af0 15 API calls 49463->49465 49751 7ff63d8f5170 34 API calls 49464->49751 49470 7ff63d8f30d0 49465->49470 49467->49461 49749 7ff63d8fc9a0 17 API calls 49467->49749 49755 7ff63d8f25b0 44 API calls 49470->49755 49471 7ff63d8f2f91 free free 49473 7ff63d8f2fb8 49471->49473 49476 7ff63d8f5af0 15 API calls 49473->49476 49474 7ff63d8f3066 49481 7ff63d8f30ab 49474->49481 49753 7ff63d8ee130 QueryPerformanceCounter GetTickCount 49474->49753 49480 7ff63d8f300f 49476->49480 49477 7ff63d8f314c 49758 7ff63d8edde0 17 API calls 49477->49758 49479 7ff63d8f308d 49486 7ff63d8f30a0 49479->49486 49487 7ff63d8f30ad 49479->49487 49711 7ff63d8f1790 49480->49711 49481->49477 49756 7ff63d8ee200 QueryPerformanceCounter GetTickCount 49481->49756 49484 7ff63d8f31cb 49485 7ff63d8f3181 49485->49480 49497 7ff63d8f5af0 15 API calls 49485->49497 49754 7ff63d8f1430 90 API calls 49486->49754 49488 7ff63d8f5af0 15 API calls 49487->49488 49488->49463 49489 7ff63d8f3135 49493 7ff63d8f3141 49489->49493 49494 7ff63d8f331b 49489->49494 49491 7ff63d8f315b 49491->49485 49496 7ff63d8f5af0 15 API calls 49491->49496 49491->49502 49757 7ff63d8f1430 90 API calls 49493->49757 49499 7ff63d8f5af0 15 API calls 49494->49499 49496->49485 49500 7ff63d8f31af 49497->49500 49499->49463 49500->49480 49502->49417 49503->49387 49504->49386 49506 7ff63d8f2145 49505->49506 49507 7ff63d8f2150 calloc 49505->49507 49506->49416 49508 7ff63d8f23c1 free 49507->49508 49509 7ff63d8f217a 49507->49509 49508->49416 49510 7ff63d8fd7b0 2 API calls 49509->49510 49511 7ff63d8f2211 49510->49511 49512 7ff63d8fd7b0 2 API calls 49511->49512 49513 7ff63d8f2225 49512->49513 49514 7ff63d8f23fd 49513->49514 49515 7ff63d8f2387 _strdup 49513->49515 49516 7ff63d8fd7b0 2 API calls 49514->49516 49515->49514 49517 7ff63d8f2399 49515->49517 49518 7ff63d8f243d 49516->49518 49519 7ff63d8f23a7 free free 49517->49519 49518->49416 49519->49508 49759 7ff63d8f5570 8 API calls 49520->49759 49523 7ff63d8f45b0 49762 7ff63d91e540 23 API calls 49523->49762 49524 7ff63d8f45b7 49763 7ff63d91e500 calloc 49524->49763 49527 7ff63d8f45b5 49528 7ff63d8f45bc 49527->49528 49533 7ff63d8f4632 49528->49533 49541 7ff63d8f29bc 49528->49541 49764 7ff63d91e170 tolower 49528->49764 49529 7ff63d8f46f5 49767 7ff63d91e680 8 API calls 49529->49767 49532 7ff63d8f45ff 49532->49533 49534 7ff63d8f460b free 49532->49534 49535 7ff63d8f4618 49532->49535 49533->49529 49533->49541 49766 7ff63d91e680 8 API calls 49533->49766 49534->49535 49765 7ff63d8f8db0 15 API calls 49535->49765 49536 7ff63d8f475c 49768 7ff63d8f5970 19 API calls 49536->49768 49539 7ff63d8f46dc 49539->49529 49539->49541 49543 7ff63d8f46e8 free 49539->49543 49541->49421 49541->49422 49541->49502 49542 7ff63d8f476e 49542->49541 49543->49529 49544 7ff63d8f471e 49544->49536 49544->49541 49545 7ff63d8f4794 49544->49545 49769 7ff63d91e680 8 API calls 49545->49769 49547 7ff63d8f47bb 49548 7ff63d8f47c5 _strdup 49547->49548 49549 7ff63d8f47e2 49547->49549 49548->49541 49548->49549 49549->49541 49770 7ff63d91e680 8 API calls 49549->49770 49551 7ff63d8f4805 49552 7ff63d8f4828 49551->49552 49553 7ff63d8f480f _strdup 49551->49553 49552->49541 49771 7ff63d91e680 8 API calls 49552->49771 49553->49541 49553->49552 49555 7ff63d8f4848 49556 7ff63d8f4852 _strdup 49555->49556 49557 7ff63d8f48dd 49555->49557 49556->49541 49556->49557 49557->49541 49772 7ff63d91e680 8 API calls 49557->49772 49559 7ff63d8f48f8 49559->49541 49773 7ff63d91e680 8 API calls 49559->49773 49561 7ff63d8f492d 49561->49541 49774 7ff63d91e680 8 API calls 49561->49774 49563 7ff63d8f4971 49564 7ff63d8f4975 49563->49564 49565 7ff63d8f4991 strtoul 49563->49565 49564->49541 49775 7ff63d91e680 8 API calls 49564->49775 49565->49564 49567 7ff63d8f4a0d _strdup 49567->49541 49568 7ff63d8f49d0 49568->49567 49568->49568 49776 7ff63d8f5640 20 API calls 49568->49776 49571 7ff63d8f344d 49570->49571 49572 7ff63d8f337d memset memset 49570->49572 49573 7ff63d8f3480 49571->49573 49574 7ff63d8f3459 _strdup 49571->49574 49575 7ff63d8f33b0 strncpy 49572->49575 49576 7ff63d8f33c8 49572->49576 49578 7ff63d8f348c _strdup 49573->49578 49582 7ff63d8f349f 49573->49582 49574->49573 49577 7ff63d8f3467 49574->49577 49575->49576 49579 7ff63d8f33d4 strncpy 49576->49579 49580 7ff63d8f33ef 49576->49580 49779 7ff63d8f5970 19 API calls 49577->49779 49578->49577 49578->49582 49579->49580 49777 7ff63d90c080 malloc strtoul free 49580->49777 49608 7ff63d8f34fe 49582->49608 49780 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49582->49780 49584 7ff63d8f3476 49587 7ff63d8f39a7 free free 49584->49587 49586 7ff63d8f340f 49589 7ff63d8f343c 49586->49589 49778 7ff63d90c080 malloc strtoul free 49586->49778 49591 7ff63d92f580 8 API calls 49587->49591 49588 7ff63d8f34c0 49592 7ff63d8f34dc 49588->49592 49781 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49588->49781 49589->49571 49589->49587 49590 7ff63d8f3761 free 49596 7ff63d8f3771 49590->49596 49597 7ff63d8f379e 49590->49597 49595 7ff63d8f2a17 49591->49595 49594 7ff63d8f5af0 15 API calls 49592->49594 49592->49608 49594->49608 49595->49428 49595->49429 49595->49502 49596->49597 49602 7ff63d8f3792 free 49596->49602 49603 7ff63d8f37c8 49597->49603 49604 7ff63d8f37b8 free 49597->49604 49599 7ff63d8f3656 49599->49590 49600 7ff63d8f36a9 49599->49600 49605 7ff63d8f3690 tolower 49599->49605 49782 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49600->49782 49601 7ff63d8f37e4 free free free 49615 7ff63d8f37d7 49601->49615 49602->49597 49606 7ff63d8f37cd 49603->49606 49786 7ff63d8f4240 47 API calls 49603->49786 49604->49603 49605->49600 49605->49605 49606->49615 49625 7ff63d8f3881 49606->49625 49787 7ff63d8f4240 47 API calls 49606->49787 49608->49599 49608->49601 49608->49608 49612 7ff63d8f356e strchr 49608->49612 49628 7ff63d8f3587 49608->49628 49610 7ff63d8f370c 49614 7ff63d8f373f 49610->49614 49784 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49610->49784 49611 7ff63d8f382f free 49611->49606 49611->49615 49612->49599 49612->49628 49618 7ff63d8f5af0 15 API calls 49614->49618 49620 7ff63d8f375c 49614->49620 49615->49587 49616 7ff63d8f3863 free 49616->49615 49616->49625 49618->49620 49619 7ff63d8f3728 49619->49614 49785 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49619->49785 49620->49590 49621 7ff63d8f36d0 49621->49610 49783 7ff63d90bf40 realloc GetEnvironmentVariableA realloc free 49621->49783 49622 7ff63d8f35b0 strchr 49622->49628 49624 7ff63d8f35e0 strchr 49624->49628 49625->49615 49627 7ff63d8f38f7 free 49625->49627 49627->49615 49628->49599 49628->49601 49628->49622 49628->49624 49630 7ff63d8f3bb1 49629->49630 49631 7ff63d8f3be4 49629->49631 49630->49631 49634 7ff63d8f3bc4 free 49630->49634 49635 7ff63d8f3bd0 49630->49635 49632 7ff63d8f3c1b 49631->49632 49633 7ff63d8f3bf9 free _strdup 49631->49633 49636 7ff63d8f3c2f free _strdup 49632->49636 49637 7ff63d8f3c51 49632->49637 49633->49632 49642 7ff63d8f3d18 49633->49642 49634->49635 49635->49631 49639 7ff63d8f3bd8 free 49635->49639 49636->49637 49636->49642 49638 7ff63d8f3c65 free _strdup 49637->49638 49640 7ff63d8f3c8f 49637->49640 49638->49640 49638->49642 49639->49631 49640->49642 49788 7ff63d920430 36 API calls 49640->49788 49642->49430 49643 7ff63d8f3cfe 49643->49642 49644 7ff63d8f5af0 15 API calls 49643->49644 49644->49642 49651 7ff63d8f4020 49645->49651 49647 7ff63d8f40f8 strchr 49648 7ff63d8f410d strtol 49647->49648 49647->49651 49648->49651 49650 7ff63d8f2b57 49650->49502 49655 7ff63d8f16c0 49650->49655 49651->49647 49651->49650 49652 7ff63d8f419a free 49651->49652 49653 7ff63d8f5af0 15 API calls 49651->49653 49654 7ff63d8f40c7 free 49651->49654 49789 7ff63d8f8db0 15 API calls 49651->49789 49790 7ff63d8f3df0 22 API calls 49651->49790 49652->49651 49653->49651 49654->49651 49654->49652 49656 7ff63d8f170f 49655->49656 49657 7ff63d8f16f5 49655->49657 49658 7ff63d92f580 8 API calls 49656->49658 49657->49656 49791 7ff63d920380 18 API calls 49657->49791 49659 7ff63d8f1721 49658->49659 49659->49439 49659->49440 49659->49502 49661 7ff63d8f1748 49661->49656 49662 7ff63d8f175b GetLastError 49661->49662 49792 7ff63d8e2640 21 API calls 49662->49792 49664 7ff63d8f1773 49793 7ff63d8f5970 19 API calls 49664->49793 49666 7ff63d8f1789 49666->49656 49668 7ff63d8eef05 49667->49668 49669 7ff63d8eeee6 _strdup 49667->49669 49671 7ff63d8eef12 _strdup 49668->49671 49672 7ff63d8eef31 49668->49672 49669->49668 49670 7ff63d8eeef5 49669->49670 49670->49447 49671->49672 49673 7ff63d8eef21 49671->49673 49674 7ff63d8eef3e _strdup 49672->49674 49675 7ff63d8eef5d 49672->49675 49673->49447 49674->49675 49676 7ff63d8eef4d 49674->49676 49677 7ff63d8eef6a _strdup 49675->49677 49678 7ff63d8eef89 49675->49678 49676->49447 49677->49678 49679 7ff63d8eef79 49677->49679 49680 7ff63d8eef96 _strdup 49678->49680 49682 7ff63d8eefb5 49678->49682 49679->49447 49681 7ff63d8eefa5 49680->49681 49680->49682 49681->49447 49683 7ff63d8eefc2 _strdup 49682->49683 49684 7ff63d8eefe1 49682->49684 49683->49684 49685 7ff63d8eefd1 49683->49685 49686 7ff63d8eefee _strdup 49684->49686 49687 7ff63d8ef00d 49684->49687 49685->49447 49686->49687 49688 7ff63d8eeffd 49686->49688 49689 7ff63d8ef01a _strdup 49687->49689 49690 7ff63d8ef029 49687->49690 49688->49447 49689->49690 49690->49447 49692 7ff63d8fd7b0 2 API calls 49691->49692 49698 7ff63d8f4a63 49692->49698 49693 7ff63d8f2f37 49693->49459 49750 7ff63d8f0600 15 API calls 49693->49750 49695 7ff63d8fe520 9 API calls 49695->49698 49698->49693 49698->49695 49702 7ff63d8f4b37 49698->49702 49794 7ff63d8feee0 free free free free 49698->49794 49795 7ff63d920d10 8 API calls 49698->49795 49796 7ff63d920920 7 API calls 49698->49796 49699 7ff63d8f5af0 15 API calls 49699->49702 49701 7ff63d8f65d0 closesocket free 49701->49702 49702->49699 49702->49701 49703 7ff63d8f4bd6 30 API calls 49702->49703 49797 7ff63d8eac00 16 API calls 49702->49797 49798 7ff63d8f28a0 free free 49703->49798 49705 7ff63d8f4e36 49706 7ff63d8f4e44 free 49705->49706 49799 7ff63d8ef050 8 API calls 49706->49799 49708 7ff63d8f4e64 49800 7ff63d8ef050 8 API calls 49708->49800 49710 7ff63d8f4e70 free free free 49710->49698 49712 7ff63d8f179e 49711->49712 49713 7ff63d8fd7b0 2 API calls 49712->49713 49714 7ff63d8f1808 49713->49714 49714->49484 49748->49455 49749->49451 49750->49462 49751->49471 49752->49474 49753->49479 49754->49481 49755->49502 49756->49489 49757->49477 49758->49491 49760 7ff63d91e510 13 API calls 49759->49760 49761 7ff63d8f45a4 49760->49761 49761->49523 49761->49524 49762->49527 49764->49532 49765->49533 49766->49539 49767->49544 49768->49542 49769->49547 49770->49551 49771->49555 49772->49559 49773->49561 49774->49563 49775->49568 49776->49567 49777->49586 49778->49589 49779->49584 49780->49588 49781->49592 49782->49621 49783->49610 49784->49619 49785->49614 49786->49611 49787->49616 49788->49643 49789->49651 49790->49651 49791->49661 49792->49664 49793->49666 49794->49698 49797->49702 49798->49705 49799->49708 49800->49710 49806 7ff63d8e7df8 49807 7ff63d8e7e11 49806->49807 49808 7ff63d8e7e9f 49807->49808 49810 7ff63d8e8074 49807->49810 49847 7ff63d8fc510 49808->49847 49891 7ff63d8e57f0 17 API calls 49810->49891 49814 7ff63d8e7ec4 49815 7ff63d8e7f60 49814->49815 49820 7ff63d8e7ece 49814->49820 49823 7ff63d8e7ef5 49814->49823 49816 7ff63d8e8011 49815->49816 49822 7ff63d8e7f68 49815->49822 49818 7ff63d8e727b 49816->49818 49890 7ff63d8e57f0 17 API calls 49816->49890 49819 7ff63d8e84a0 17 API calls 49818->49819 49829 7ff63d8e8313 49818->49829 49831 7ff63d8e8322 49818->49831 49841 7ff63d8f71f0 10 API calls 49818->49841 49843 7ff63d8e731e 49818->49843 49846 7ff63d8e6d00 292 API calls 49818->49846 49886 7ff63d8f5970 19 API calls 49818->49886 49892 7ff63d8f1430 90 API calls 49818->49892 49893 7ff63d8e5a20 15 API calls 49818->49893 49894 7ff63d9051e0 22 API calls 49818->49894 49819->49818 49821 7ff63d8e6d00 292 API calls 49820->49821 49821->49818 49822->49823 49825 7ff63d8e7f7e 49822->49825 49826 7ff63d8e7feb free 49822->49826 49827 7ff63d8e6d00 292 API calls 49823->49827 49825->49818 49830 7ff63d8e7f8b free 49825->49830 49826->49823 49828 7ff63d8e7f13 49827->49828 49888 7ff63d8fbdd0 28 API calls 49828->49888 49895 7ff63d8f5970 19 API calls 49829->49895 49889 7ff63d8fbdd0 28 API calls 49830->49889 49835 7ff63d8e7fb3 free 49835->49818 49839 7ff63d8e7fc9 49835->49839 49838 7ff63d8e7f44 free 49838->49818 49840 7ff63d8e6d00 292 API calls 49839->49840 49840->49818 49841->49818 49842 7ff63d8e7f22 49842->49838 49843->49818 49844 7ff63d8f5970 19 API calls 49843->49844 49844->49843 49846->49818 49848 7ff63d8fc561 49847->49848 49849 7ff63d8fc5af 49848->49849 49850 7ff63d905fe0 19 API calls 49848->49850 49851 7ff63d8fc5cd 49849->49851 49852 7ff63d8fc5b6 49849->49852 49850->49849 49854 7ff63d8fc5f9 49851->49854 49896 7ff63d8fcc20 49851->49896 49929 7ff63d8f5970 19 API calls 49852->49929 49855 7ff63d8fc62e 49854->49855 49856 7ff63d8fc616 49854->49856 49863 7ff63d8e7eb3 49854->49863 49858 7ff63d8fd7b0 2 API calls 49855->49858 49930 7ff63d8fd370 90 API calls 49856->49930 49867 7ff63d8fc638 49858->49867 49860 7ff63d8fc626 49860->49855 49860->49863 49861 7ff63d8fc6a8 49931 7ff63d9051e0 22 API calls 49861->49931 49863->49814 49887 7ff63d8fc810 24 API calls 49863->49887 49864 7ff63d8fc6b0 49864->49863 49932 7ff63d906350 23 API calls 49864->49932 49866 7ff63d8fc6ce 49866->49863 49869 7ff63d8fc6e2 49866->49869 49875 7ff63d8fc762 49866->49875 49867->49861 49868 7ff63d8f5af0 15 API calls 49867->49868 49868->49861 49871 7ff63d8f71f0 10 API calls 49869->49871 49870 7ff63d8fc7c9 49937 7ff63d9051e0 22 API calls 49870->49937 49874 7ff63d8fc6f1 49871->49874 49873 7ff63d8fc7a0 49873->49870 49878 7ff63d8fc7b3 49873->49878 49874->49863 49876 7ff63d8fc6fa 49874->49876 49875->49870 49875->49873 49877 7ff63d8fc787 49875->49877 49882 7ff63d8fc731 49876->49882 49883 7ff63d8fc74c 49876->49883 49935 7ff63d8f5970 19 API calls 49877->49935 49936 7ff63d8f5970 19 API calls 49878->49936 49881 7ff63d8fc5c5 49881->49863 49933 7ff63d8f5970 19 API calls 49882->49933 49934 7ff63d8f5970 19 API calls 49883->49934 49886->49818 49887->49814 49888->49842 49889->49835 49890->49818 49891->49818 49892->49818 49893->49818 49894->49818 49895->49831 49899 7ff63d8fcc70 49896->49899 49898 7ff63d905090 2 API calls 49898->49899 49899->49898 49900 7ff63d8fd7b0 2 API calls 49899->49900 49903 7ff63d8fd1aa 49899->49903 49904 7ff63d8fd187 49899->49904 49905 7ff63d8fcf00 49899->49905 49910 7ff63d8fd241 49899->49910 49914 7ff63d8fd1af 49899->49914 49918 7ff63d8f5af0 15 API calls 49899->49918 49922 7ff63d8fcedc 49899->49922 49925 7ff63d8f5890 23 API calls 49899->49925 49928 7ff63d8fd1c3 49899->49928 49938 7ff63d8f5c60 49899->49938 49941 7ff63d902890 192 API calls 49899->49941 49944 7ff63d922590 23 API calls 49899->49944 49945 7ff63d90f0b0 23 API calls 49899->49945 49900->49899 49902 7ff63d8f5af0 15 API calls 49902->49928 49903->49902 49903->49928 49904->49903 49906 7ff63d8f5af0 15 API calls 49904->49906 49905->49899 49942 7ff63d8f58b0 fwrite fwrite 49905->49942 49943 7ff63d8f58b0 fwrite fwrite 49905->49943 49906->49903 49911 7ff63d8fd25d 49910->49911 49912 7ff63d8fd246 49910->49912 49948 7ff63d8f5970 19 API calls 49911->49948 49947 7ff63d8f5970 19 API calls 49912->49947 49915 7ff63d8fd1e3 49914->49915 49916 7ff63d8fd1b7 49914->49916 49946 7ff63d8f5970 19 API calls 49915->49946 49919 7ff63d8f5af0 15 API calls 49916->49919 49917 7ff63d8fd1ef 49917->49928 49918->49899 49919->49928 49923 7ff63d8f5af0 15 API calls 49922->49923 49924 7ff63d8fd208 49923->49924 49927 7ff63d8f5af0 15 API calls 49924->49927 49925->49899 49927->49928 49928->49854 49929->49881 49930->49860 49931->49864 49932->49866 49933->49881 49934->49881 49935->49881 49936->49881 49937->49863 49949 7ff63d90b5c0 49938->49949 49941->49899 49942->49905 49943->49899 49944->49899 49945->49899 49946->49917 49947->49917 49948->49917 49950 7ff63d90b65e 49949->49950 49951 7ff63d90b63f 49949->49951 49952 7ff63d90b682 49950->49952 49953 7ff63d90b665 49950->49953 49951->49950 49954 7ff63d90b645 49951->49954 49956 7ff63d90b688 49952->49956 49959 7ff63d90b6a1 49952->49959 49955 7ff63d8f5af0 15 API calls 49953->49955 49957 7ff63d8f5af0 15 API calls 49954->49957 49961 7ff63d90b654 49955->49961 49958 7ff63d8f5af0 15 API calls 49956->49958 49957->49961 49958->49961 49960 7ff63d90b6d0 realloc 49959->49960 49962 7ff63d90b71e 49959->49962 49985 7ff63d90b799 49959->49985 49960->49962 49963 7ff63d90b6fd 49960->49963 49965 7ff63d90baf6 49961->49965 49970 7ff63d8f8800 14 API calls 49961->49970 49964 7ff63d8f5cf0 2 API calls 49962->49964 49995 7ff63d8f5970 19 API calls 49963->49995 49973 7ff63d90b767 49964->49973 49966 7ff63d90bbf5 memcpy memcpy 49965->49966 49968 7ff63d90bc3b 49965->49968 49966->49968 49971 7ff63d92f580 8 API calls 49968->49971 49969 7ff63d90b714 49969->49961 49972 7ff63d90bae6 49970->49972 49974 7ff63d8f5cbb 49971->49974 49972->49965 49977 7ff63d8f5af0 15 API calls 49972->49977 49975 7ff63d90b78d 49973->49975 49976 7ff63d90b95e 49973->49976 49973->49985 49974->49899 49979 7ff63d8f5af0 15 API calls 49975->49979 49978 7ff63d8f5af0 15 API calls 49976->49978 49977->49965 49978->49985 49979->49985 49980 7ff63d8f5af0 15 API calls 49980->49961 49981 7ff63d909a80 306 API calls 49981->49985 49982 7ff63d90ba7e 49982->49961 49982->49980 49983 7ff63d8f5af0 15 API calls 49983->49985 49984 7ff63d90bb07 49984->49982 49988 7ff63d90bb36 49984->49988 49985->49961 49985->49981 49985->49982 49985->49983 49985->49984 49986 7ff63d90b8a0 realloc 49985->49986 49989 7ff63d90b93b memcpy 49985->49989 49991 7ff63d90b8eb memcpy 49985->49991 49986->49985 49987 7ff63d90bb66 49986->49987 49997 7ff63d8f5970 19 API calls 49987->49997 49996 7ff63d8e1d10 22 API calls 49988->49996 49989->49985 49991->49985 49993 7ff63d90bb4f 49994 7ff63d8f5af0 15 API calls 49993->49994 49994->49961 49995->49969 49996->49993 49997->49969
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdup$callocmemcpystrstr
                                            • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                            • API String ID: 2045874074-4264080130
                                            • Opcode ID: 7786becf68336d0054d3751eb5a69a9aec0b7b775e65eefc63fcc71cb1334378
                                            • Instruction ID: 228dca9ffb0023187ec483f8986550e9e5d97198161aa5480b1c26377f21eaa5
                                            • Opcode Fuzzy Hash: 7786becf68336d0054d3751eb5a69a9aec0b7b775e65eefc63fcc71cb1334378
                                            • Instruction Fuzzy Hash: D603AC21B08A8A95FB648BA5A8402B927E5AF45BC8F444035CE5DD77DAFF3CF459E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupstrncmpstrtol
                                            • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                            • API String ID: 707411602-3372543188
                                            • Opcode ID: f594f424c43ecc92778b926f78d702b8f711881766d09741b9e3cd8d16f4b1de
                                            • Instruction ID: 62470760add3514463eba4e51b728451438edd5ad499716e374cbc37d0e50eb1
                                            • Opcode Fuzzy Hash: f594f424c43ecc92778b926f78d702b8f711881766d09741b9e3cd8d16f4b1de
                                            • Instruction Fuzzy Hash: A142AB21B08B4A86EB248BA5F8506B927A4FF05BD4F444135CA5E877DAFF3CE548E740

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 870 7ff63d8e1530-7ff63d8e157c rand 871 7ff63d8e1583-7ff63d8e158a 870->871 871->871 872 7ff63d8e158c-7ff63d8e15be call 7ff63d8e0580 rand 871->872 875 7ff63d8e1633-7ff63d8e164f SetConsoleTitleA 872->875 876 7ff63d8e15c0 872->876 878 7ff63d8e1685-7ff63d8e1700 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff63d8d2aa0 875->878 879 7ff63d8e1651-7ff63d8e1662 875->879 877 7ff63d8e15c2-7ff63d8e15f7 rand 876->877 880 7ff63d8e1619-7ff63d8e1624 call 7ff63d8e0680 877->880 881 7ff63d8e15f9-7ff63d8e1617 877->881 889 7ff63d8e1705-7ff63d8e1907 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 GetStdHandle SetConsoleTextAttribute call 7ff63d8e1a70 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 878->889 882 7ff63d8e1664-7ff63d8e1677 879->882 883 7ff63d8e1680 call 7ff63d92f22c 879->883 885 7ff63d8e1629-7ff63d8e162d 880->885 881->885 882->883 887 7ff63d8e1679-7ff63d8e167f _invalid_parameter_noinfo_noreturn 882->887 883->878 885->877 891 7ff63d8e162f 885->891 887->883 923 7ff63d8e1982-7ff63d8e1985 889->923 924 7ff63d8e1909-7ff63d8e1981 call 7ff63d8d3d30 * 2 call 7ff63d8d3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 889->924 891->875 926 7ff63d8e1a00-7ff63d8e1a08 923->926 927 7ff63d8e1987-7ff63d8e19ff call 7ff63d8d3d30 * 2 call 7ff63d8d3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 923->927 924->923 929 7ff63d8e1a3e-7ff63d8e1a60 call 7ff63d92f580 926->929 930 7ff63d8e1a0a-7ff63d8e1a1b 926->930 927->926 933 7ff63d8e1a1d-7ff63d8e1a30 930->933 934 7ff63d8e1a39 call 7ff63d92f22c 930->934 933->934 938 7ff63d8e1a32-7ff63d8e1a38 _invalid_parameter_noinfo_noreturn 933->938 934->929 938->934
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                            • String ID: Iniciar Valorant Plus (HVCI DESLIGADO): $ Iniciar Valorant Plus (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SerHuStinsHostDialog.exe$C:\Windows\System32\ServceHubeinssDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/plushvciforabronkz.exe$http://185.101.104.122/plushvcionbronkz.exe$start C:\Windows\System32\SerHuStinsHostDialog.exe$start C:\Windows\System32\ServceHubeinssDialog.exe
                                            • API String ID: 2233566951-898826868
                                            • Opcode ID: cca2fb6546bf5152dfcd3de78e74697b6a2be117a40d1dc4766663ca32929257
                                            • Instruction ID: 15da8c0f5e53c2d5cd6a42096ed9990a2cee07ca28cfd721f4a0ee6b6fce5d2a
                                            • Opcode Fuzzy Hash: cca2fb6546bf5152dfcd3de78e74697b6a2be117a40d1dc4766663ca32929257
                                            • Instruction Fuzzy Hash: DBE15B21E08A4B85EB00ABE1EC541BC6361AF85B99F404235D91ED67FAFF7CA54DE700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 951 7ff63d8f8980-7ff63d8f899c 952 7ff63d8f899e-7ff63d8f89b0 WSAStartup 951->952 953 7ff63d8f89e6-7ff63d8f89ed call 7ff63d922480 951->953 955 7ff63d8f89b2-7ff63d8f89b9 952->955 956 7ff63d8f89c9-7ff63d8f89e5 call 7ff63d92f580 952->956 961 7ff63d8f89f3-7ff63d8f8a20 GetModuleHandleA 953->961 962 7ff63d8f8caf-7ff63d8f8cc6 call 7ff63d92f580 953->962 958 7ff63d8f89c3 WSACleanup 955->958 959 7ff63d8f89bb-7ff63d8f89c1 955->959 958->956 959->953 959->958 965 7ff63d8f8a22-7ff63d8f8a29 961->965 966 7ff63d8f8a2e-7ff63d8f8a63 GetProcAddress strpbrk 961->966 968 7ff63d8f8bb3-7ff63d8f8ca7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 965->968 969 7ff63d8f8a65-7ff63d8f8a6b 966->969 970 7ff63d8f8a8b-7ff63d8f8a8e 966->970 968->962 971 7ff63d8f8a7d-7ff63d8f8a86 LoadLibraryA 969->971 972 7ff63d8f8a6d-7ff63d8f8a78 969->972 973 7ff63d8f8a90-7ff63d8f8aa3 GetProcAddress 970->973 974 7ff63d8f8aba-7ff63d8f8ad1 GetSystemDirectoryA 970->974 975 7ff63d8f8b7a-7ff63d8f8b8c 971->975 972->975 973->974 976 7ff63d8f8aa5-7ff63d8f8ab5 LoadLibraryExA 973->976 977 7ff63d8f8b72 974->977 978 7ff63d8f8ad7-7ff63d8f8aea malloc 974->978 975->968 979 7ff63d8f8b8e-7ff63d8f8bac GetProcAddress 975->979 976->975 977->975 980 7ff63d8f8aec-7ff63d8f8afa GetSystemDirectoryA 978->980 981 7ff63d8f8b69-7ff63d8f8b6c free 978->981 979->968 980->981 983 7ff63d8f8afc-7ff63d8f8b06 980->983 981->977 984 7ff63d8f8b10-7ff63d8f8b19 983->984 984->984 985 7ff63d8f8b1b-7ff63d8f8b20 984->985 986 7ff63d8f8b24-7ff63d8f8b2b 985->986 986->986 987 7ff63d8f8b2d-7ff63d8f8b36 986->987 988 7ff63d8f8b40-7ff63d8f8b4c 987->988 988->988 989 7ff63d8f8b4e-7ff63d8f8b54 988->989 990 7ff63d8f8b60 LoadLibraryA 989->990 991 7ff63d8f8b56-7ff63d8f8b5e 989->991 992 7ff63d8f8b66 990->992 991->992 992->981
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                            • API String ID: 2612373469-2794540096
                                            • Opcode ID: dd8c520f1f9f42ea8cb78eec73e1dd8ca5308544d44c97ebf9fd234ba4bd7abd
                                            • Instruction ID: 6e88ec815bacfd1ccb0cae9b94ec2c937777b40af500d459e91335fd7d88bb13
                                            • Opcode Fuzzy Hash: dd8c520f1f9f42ea8cb78eec73e1dd8ca5308544d44c97ebf9fd234ba4bd7abd
                                            • Instruction Fuzzy Hash: 22919361A0D78A85EB60DB91E8043B973E1FF89B84F444635C94D877AAFF3CE0559710

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1248 7ff63d8f7cc0-7ff63d8f7d2d 1249 7ff63d8f7d32-7ff63d8f7d42 1248->1249 1250 7ff63d8f7d2f 1248->1250 1251 7ff63d8f7d44-7ff63d8f7d4c 1249->1251 1252 7ff63d8f7d51-7ff63d8f7d69 memcpy 1249->1252 1250->1249 1251->1252 1253 7ff63d8f7d6b-7ff63d8f7d96 call 7ff63d8e6290 * 2 1252->1253 1254 7ff63d8f7d98-7ff63d8f7dab socket 1252->1254 1255 7ff63d8f7dae-7ff63d8f7dba 1253->1255 1254->1255 1257 7ff63d8f7dc0-7ff63d8f7dc8 1255->1257 1258 7ff63d8f824f 1255->1258 1260 7ff63d8f7dca-7ff63d8f7dd2 call 7ff63d904c90 1257->1260 1261 7ff63d8f7dd7-7ff63d8f7de0 1257->1261 1262 7ff63d8f8254-7ff63d8f827d call 7ff63d92f580 1258->1262 1260->1261 1264 7ff63d8f7de2-7ff63d8f7ded 1261->1264 1265 7ff63d8f7df0-7ff63d8f7df9 1261->1265 1264->1265 1268 7ff63d8f7e0c-7ff63d8f7e10 1265->1268 1269 7ff63d8f7dfb-7ff63d8f7dfe 1265->1269 1275 7ff63d8f7e15-7ff63d8f7e27 call 7ff63d9211c0 1268->1275 1273 7ff63d8f7e04-7ff63d8f7e0a 1269->1273 1274 7ff63d8f81fa-7ff63d8f824d _errno * 3 call 7ff63d8e2500 call 7ff63d8f5970 call 7ff63d8f65d0 1269->1274 1273->1275 1274->1262 1275->1274 1281 7ff63d8f7e2d-7ff63d8f7e55 htons call 7ff63d8f5af0 1275->1281 1286 7ff63d8f7e5c-7ff63d8f7e61 1281->1286 1287 7ff63d8f7e57-7ff63d8f7e5a 1281->1287 1289 7ff63d8f7ece 1286->1289 1290 7ff63d8f7e63-7ff63d8f7e6d 1286->1290 1287->1286 1287->1289 1291 7ff63d8f7ed1-7ff63d8f7eed 1289->1291 1290->1291 1292 7ff63d8f7e6f-7ff63d8f7e9b setsockopt 1290->1292 1295 7ff63d8f7eef-7ff63d8f7f03 call 7ff63d8f8800 1291->1295 1296 7ff63d8f7f1d-7ff63d8f7f20 1291->1296 1293 7ff63d8f7e9d-7ff63d8f7ec4 WSAGetLastError call 7ff63d8e2500 call 7ff63d8f5af0 1292->1293 1294 7ff63d8f7ec9-7ff63d8f7ecc 1292->1294 1293->1294 1294->1291 1307 7ff63d8f7f05-7ff63d8f7f0f 1295->1307 1308 7ff63d8f7f11-7ff63d8f7f1b 1295->1308 1297 7ff63d8f7f74-7ff63d8f7f77 1296->1297 1298 7ff63d8f7f22-7ff63d8f7f47 getsockopt 1296->1298 1303 7ff63d8f805f-7ff63d8f8066 1297->1303 1304 7ff63d8f7f7d-7ff63d8f7f84 1297->1304 1301 7ff63d8f7f53-7ff63d8f7f6e setsockopt 1298->1301 1302 7ff63d8f7f49-7ff63d8f7f51 1298->1302 1301->1297 1302->1297 1302->1301 1309 7ff63d8f809a-7ff63d8f80a1 1303->1309 1310 7ff63d8f8068-7ff63d8f8095 call 7ff63d8e6290 * 2 1303->1310 1304->1303 1311 7ff63d8f7f8a-7ff63d8f7fb5 setsockopt 1304->1311 1307->1297 1308->1298 1316 7ff63d8f80a3-7ff63d8f80a6 1309->1316 1317 7ff63d8f80a8-7ff63d8f80c8 call 7ff63d921130 call 7ff63d8f7630 1309->1317 1343 7ff63d8f80e5-7ff63d8f80e7 1310->1343 1344 7ff63d8f8097 1310->1344 1314 7ff63d8f7fce-7ff63d8f8042 call 7ff63d8f8370 * 2 WSAIoctl 1311->1314 1315 7ff63d8f7fb7-7ff63d8f7fc9 call 7ff63d8f5af0 1311->1315 1314->1303 1335 7ff63d8f8044-7ff63d8f805a WSAGetLastError call 7ff63d8f5af0 1314->1335 1315->1303 1316->1317 1321 7ff63d8f80fe-7ff63d8f8128 call 7ff63d904c90 call 7ff63d8fd7b0 1316->1321 1317->1321 1336 7ff63d8f80ca-7ff63d8f80d8 call 7ff63d8f65d0 1317->1336 1339 7ff63d8f813f-7ff63d8f8142 1321->1339 1340 7ff63d8f812a-7ff63d8f813a call 7ff63d8e57f0 1321->1340 1335->1303 1336->1258 1351 7ff63d8f80de-7ff63d8f80e0 1336->1351 1346 7ff63d8f81ef-7ff63d8f81f8 1339->1346 1347 7ff63d8f8148-7ff63d8f8150 1339->1347 1340->1339 1343->1309 1349 7ff63d8f80e9-7ff63d8f80f9 call 7ff63d8f65d0 1343->1349 1344->1309 1346->1262 1347->1346 1350 7ff63d8f8156-7ff63d8f815d 1347->1350 1349->1262 1353 7ff63d8f815f-7ff63d8f8174 connect 1350->1353 1354 7ff63d8f8188-7ff63d8f8193 WSAGetLastError 1350->1354 1351->1262 1353->1354 1356 7ff63d8f8176-7ff63d8f8178 1353->1356 1357 7ff63d8f8195-7ff63d8f819e 1354->1357 1358 7ff63d8f81e2-7ff63d8f81e4 1354->1358 1359 7ff63d8f81eb-7ff63d8f81ed 1356->1359 1360 7ff63d8f817a-7ff63d8f8183 1356->1360 1357->1358 1361 7ff63d8f81a0-7ff63d8f81e0 call 7ff63d8e2500 call 7ff63d8f5af0 call 7ff63d8f65d0 1357->1361 1358->1359 1359->1262 1360->1262 1361->1262
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                            • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                            • API String ID: 3453287622-3868455274
                                            • Opcode ID: 524e2a3f228159df98a537b1cc84da59102175569ade2581dca429d6bfd9567f
                                            • Instruction ID: 34ebe02692522b4d10cd38c6af8fc9f548e2fac6aa9e0374b9e9c74bf85b0b87
                                            • Opcode Fuzzy Hash: 524e2a3f228159df98a537b1cc84da59102175569ade2581dca429d6bfd9567f
                                            • Instruction Fuzzy Hash: BDF1C271A0868A86F7509BA5E8442BD63E8FB84B88F404535EA4DC77D9EF3CF545EB00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1905 7ff63d904a60-7ff63d904aae socket 1906 7ff63d904ab5-7ff63d904b0e htonl setsockopt 1905->1906 1907 7ff63d904ab0 1905->1907 1909 7ff63d904b14-7ff63d904b29 bind 1906->1909 1910 7ff63d904c3b-7ff63d904c57 closesocket * 3 1906->1910 1908 7ff63d904c64-7ff63d904c82 call 7ff63d92f580 1907->1908 1909->1910 1913 7ff63d904b2f-7ff63d904b45 getsockname 1909->1913 1911 7ff63d904c5c 1910->1911 1911->1908 1913->1910 1915 7ff63d904b4b-7ff63d904b5a listen 1913->1915 1915->1910 1916 7ff63d904b60-7ff63d904b75 socket 1915->1916 1916->1910 1917 7ff63d904b7b-7ff63d904b90 connect 1916->1917 1917->1910 1918 7ff63d904b96-7ff63d904bac accept 1917->1918 1918->1910 1919 7ff63d904bb2-7ff63d904bce call 7ff63d8f8e80 1918->1919 1922 7ff63d904bd5-7ff63d904bdc 1919->1922 1922->1922 1923 7ff63d904bde-7ff63d904bf8 send 1922->1923 1923->1910 1924 7ff63d904bfa-7ff63d904c16 recv 1923->1924 1924->1910 1925 7ff63d904c18-7ff63d904c2c memcmp 1924->1925 1925->1910 1926 7ff63d904c2e-7ff63d904c39 closesocket 1925->1926 1926->1911
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                            • String ID:
                                            • API String ID: 3699910901-0
                                            • Opcode ID: 422b14c895b552d3fb477ae8a66caf64ac0e62345687c253540b9b0d801fd834
                                            • Instruction ID: 7048e7b26dccd9984b4872cdfb5aa8b8c88cc9f6fab7d824d8d1246adfc0ab78
                                            • Opcode Fuzzy Hash: 422b14c895b552d3fb477ae8a66caf64ac0e62345687c253540b9b0d801fd834
                                            • Instruction Fuzzy Hash: AE516331608A4A81D7549F65F8441A97361FB84BB4F504731EA7F877EAEF3CE8499B00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1927 7ff63d8f6980-7ff63d8f69cd 1928 7ff63d8f69cf-7ff63d8f69d3 1927->1928 1929 7ff63d8f69d8-7ff63d8f6a13 call 7ff63d8fd7b0 1927->1929 1930 7ff63d8f6ef6-7ff63d8f6f14 call 7ff63d92f580 1928->1930 1934 7ff63d8f6a15 1929->1934 1935 7ff63d8f6a18-7ff63d8f6a1b 1929->1935 1934->1935 1937 7ff63d8f6a1d-7ff63d8f6a20 1935->1937 1938 7ff63d8f6a38 1935->1938 1939 7ff63d8f6a22-7ff63d8f6a25 1937->1939 1940 7ff63d8f6a33-7ff63d8f6a36 1937->1940 1941 7ff63d8f6a3b-7ff63d8f6a67 call 7ff63d8fd840 1938->1941 1939->1941 1942 7ff63d8f6a27-7ff63d8f6a31 1939->1942 1940->1941 1945 7ff63d8f6a82-7ff63d8f6a8a 1941->1945 1946 7ff63d8f6a69-7ff63d8f6a7d call 7ff63d8f5970 1941->1946 1942->1941 1948 7ff63d8f6a8c-7ff63d8f6a9e call 7ff63d8f7b50 1945->1948 1949 7ff63d8f6ab9-7ff63d8f6ad7 1945->1949 1956 7ff63d8f6ee6-7ff63d8f6eee 1946->1956 1957 7ff63d8f6ab2-7ff63d8f6ab4 1948->1957 1958 7ff63d8f6aa0-7ff63d8f6aa2 1948->1958 1950 7ff63d8f6ae0-7ff63d8f6af5 1949->1950 1954 7ff63d8f6d7a 1950->1954 1955 7ff63d8f6afb-7ff63d8f6b0f call 7ff63d905fe0 1950->1955 1960 7ff63d8f6d7e-7ff63d8f6d8f 1954->1960 1965 7ff63d8f6b15-7ff63d8f6b40 call 7ff63d8fd840 1955->1965 1966 7ff63d8f6c90-7ff63d8f6c93 1955->1966 1956->1930 1957->1956 1958->1957 1961 7ff63d8f6aa4-7ff63d8f6aad call 7ff63d8f7c60 1958->1961 1960->1950 1963 7ff63d8f6d95-7ff63d8f6d97 1960->1963 1961->1957 1967 7ff63d8f6edc 1963->1967 1968 7ff63d8f6d9d-7ff63d8f6db4 call 7ff63d8f8280 1963->1968 1980 7ff63d8f6b42-7ff63d8f6b54 call 7ff63d8f5af0 1965->1980 1981 7ff63d8f6b59-7ff63d8f6b5c 1965->1981 1971 7ff63d8f6d04-7ff63d8f6d4a SleepEx getsockopt 1966->1971 1972 7ff63d8f6c95-7ff63d8f6c9c 1966->1972 1969 7ff63d8f6ede 1967->1969 1984 7ff63d8f6dba-7ff63d8f6dc1 1968->1984 1985 7ff63d8f6e67-7ff63d8f6e69 1968->1985 1969->1956 1974 7ff63d8f6d4c-7ff63d8f6d54 WSAGetLastError 1971->1974 1975 7ff63d8f6d56 1971->1975 1972->1971 1977 7ff63d8f6c9e-7ff63d8f6ca0 1972->1977 1979 7ff63d8f6d5a-7ff63d8f6d5c 1974->1979 1975->1979 1982 7ff63d8f6baf-7ff63d8f6bb1 1977->1982 1983 7ff63d8f6ca6-7ff63d8f6cec SleepEx getsockopt 1977->1983 1990 7ff63d8f6dd3-7ff63d8f6e21 1979->1990 1991 7ff63d8f6d5e-7ff63d8f6d64 1979->1991 1980->1981 1988 7ff63d8f6b5e-7ff63d8f6b65 1981->1988 1989 7ff63d8f6bab 1981->1989 1982->1954 1992 7ff63d8f6bb7-7ff63d8f6bcc WSASetLastError 1982->1992 1994 7ff63d8f6cee-7ff63d8f6cf6 WSAGetLastError 1983->1994 1995 7ff63d8f6cfb-7ff63d8f6cff 1983->1995 1986 7ff63d8f6e6b-7ff63d8f6e72 1984->1986 1987 7ff63d8f6dc7-7ff63d8f6dce 1984->1987 1985->1969 2002 7ff63d8f6e74-7ff63d8f6e7b 1986->2002 2003 7ff63d8f6e7d-7ff63d8f6e84 1986->2003 1996 7ff63d8f6e96-7ff63d8f6ed9 call 7ff63d8e2500 call 7ff63d8f5970 1987->1996 1988->1989 1997 7ff63d8f6b67-7ff63d8f6b93 call 7ff63d8fd840 1988->1997 1989->1982 1998 7ff63d8f6e23-7ff63d8f6e2b call 7ff63d8f65d0 1990->1998 1999 7ff63d8f6e36-7ff63d8f6e4b call 7ff63d8f7b50 1990->1999 1991->1990 2000 7ff63d8f6d66-7ff63d8f6d75 call 7ff63d8f5af0 1991->2000 1992->1954 2001 7ff63d8f6bd2-7ff63d8f6c3c call 7ff63d8feba0 call 7ff63d8e2500 call 7ff63d8f5af0 1992->2001 1994->1982 1995->1982 1996->1967 1997->1989 2020 7ff63d8f6b95-7ff63d8f6ba6 call 7ff63d8f8280 1997->2020 1998->1999 1999->1969 2021 7ff63d8f6e51-7ff63d8f6e53 1999->2021 2000->1954 2030 7ff63d8f6c5e-7ff63d8f6c74 call 7ff63d8f8280 2001->2030 2031 7ff63d8f6c3e-7ff63d8f6c45 2001->2031 2002->1996 2011 7ff63d8f6e8f 2003->2011 2012 7ff63d8f6e86-7ff63d8f6e8d 2003->2012 2011->1996 2012->1996 2020->1989 2021->1969 2025 7ff63d8f6e59-7ff63d8f6e62 call 7ff63d8f7c60 2021->2025 2025->1985 2037 7ff63d8f6c76-7ff63d8f6c81 2030->2037 2038 7ff63d8f6c87-7ff63d8f6c8b 2030->2038 2031->2030 2032 7ff63d8f6c47-7ff63d8f6c4e 2031->2032 2034 7ff63d8f6c50-7ff63d8f6c53 2032->2034 2034->2030 2036 7ff63d8f6c55-7ff63d8f6c5c 2034->2036 2036->2030 2036->2034 2037->1954 2037->2038 2038->1960
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                            • API String ID: 0-3307081561
                                            • Opcode ID: c984adc69863b23597ee44e5849417d0b12463cb17c0a570fc6a8fad10e15d38
                                            • Instruction ID: bb9d16acc810e33c42ef0c98e75a723410aad01f1eb0ba00bc805465ee9615da
                                            • Opcode Fuzzy Hash: c984adc69863b23597ee44e5849417d0b12463cb17c0a570fc6a8fad10e15d38
                                            • Instruction Fuzzy Hash: 14E1FF22B0868A82EB548FA5E5413BD27E9FB89794F044236DA5D877D6EF3CF451D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastmallocrecvsend
                                            • String ID: Send failure: %s
                                            • API String ID: 25851408-857917747
                                            • Opcode ID: b92a6bb485e119d2f1aaef0e347f2c5486e0f84e16fca4288dd7042815cbceb7
                                            • Instruction ID: cf2cb62bb26af674a7e45a384d1741e66feb325a0962c109762e52f815bbd7a8
                                            • Opcode Fuzzy Hash: b92a6bb485e119d2f1aaef0e347f2c5486e0f84e16fca4288dd7042815cbceb7
                                            • Instruction Fuzzy Hash: FA41AD22706B8985EB648FA5F80077967A4EB49BE8F144275CE6D87BD9EF3CE440D700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 994 7ff63d8d2aa0-7ff63d8d2aef call 7ff63d8d2840 997 7ff63d8d2af5-7ff63d8d2afa 994->997 998 7ff63d8d30a8-7ff63d8d3117 call 7ff63d8d3120 Sleep exit 994->998 997->998 1000 7ff63d8d2b00-7ff63d8d2c1e call 7ff63d8d3160 call 7ff63d8d3c30 call 7ff63d8d32d0 call 7ff63d8d3c30 call 7ff63d8d33d0 call 7ff63d8d3c30 997->1000 1004 7ff63d8d3118-7ff63d8d311f call 7ff63d8d19f0 998->1004 1017 7ff63d8d2c54-7ff63d8d2c6d 1000->1017 1018 7ff63d8d2c20-7ff63d8d2c31 1000->1018 1019 7ff63d8d2ca5-7ff63d8d2cad 1017->1019 1020 7ff63d8d2c6f-7ff63d8d2c81 1017->1020 1021 7ff63d8d2c33-7ff63d8d2c46 1018->1021 1022 7ff63d8d2c4f call 7ff63d92f22c 1018->1022 1026 7ff63d8d2ce3-7ff63d8d2cfb 1019->1026 1027 7ff63d8d2caf-7ff63d8d2cc0 1019->1027 1024 7ff63d8d2c83-7ff63d8d2c96 1020->1024 1025 7ff63d8d2c9f-7ff63d8d2ca4 call 7ff63d92f22c 1020->1025 1021->1022 1028 7ff63d8d2c48-7ff63d8d2c4e _invalid_parameter_noinfo_noreturn 1021->1028 1022->1017 1024->1025 1029 7ff63d8d2c98-7ff63d8d2c9e _invalid_parameter_noinfo_noreturn 1024->1029 1025->1019 1033 7ff63d8d2d32-7ff63d8d2d3a 1026->1033 1034 7ff63d8d2cfd-7ff63d8d2d0e 1026->1034 1031 7ff63d8d2cc2-7ff63d8d2cd5 1027->1031 1032 7ff63d8d2cde call 7ff63d92f22c 1027->1032 1028->1022 1029->1025 1031->1032 1040 7ff63d8d2cd7-7ff63d8d2cdd _invalid_parameter_noinfo_noreturn 1031->1040 1032->1026 1037 7ff63d8d2d70-7ff63d8d2db7 1033->1037 1038 7ff63d8d2d3c-7ff63d8d2d4d 1033->1038 1035 7ff63d8d2d10-7ff63d8d2d23 1034->1035 1036 7ff63d8d2d2c-7ff63d8d2d31 call 7ff63d92f22c 1034->1036 1035->1036 1042 7ff63d8d2d25-7ff63d8d2d2b _invalid_parameter_noinfo_noreturn 1035->1042 1036->1033 1046 7ff63d8d2dc8-7ff63d8d2deb 1037->1046 1047 7ff63d8d2db9-7ff63d8d2dc6 1037->1047 1044 7ff63d8d2d4f-7ff63d8d2d62 1038->1044 1045 7ff63d8d2d6b call 7ff63d92f22c 1038->1045 1040->1032 1042->1036 1044->1045 1049 7ff63d8d2d64-7ff63d8d2d6a _invalid_parameter_noinfo_noreturn 1044->1049 1045->1037 1052 7ff63d8d2e1f-7ff63d8d2e22 1046->1052 1053 7ff63d8d2ded-7ff63d8d2df4 1046->1053 1051 7ff63d8d2e42-7ff63d8d2e5b call 7ff63d8d3550 call 7ff63d8d2840 1047->1051 1049->1045 1067 7ff63d8d2e60-7ff63d8d2e98 call 7ff63d8d4bd0 call 7ff63d8d48c0 1051->1067 1054 7ff63d8d2e24-7ff63d8d2e29 call 7ff63d92f1f0 1052->1054 1055 7ff63d8d2e2b 1052->1055 1053->1004 1057 7ff63d8d2dfa-7ff63d8d2e08 call 7ff63d92f1f0 1053->1057 1060 7ff63d8d2e2e-7ff63d8d2e3d memcpy 1054->1060 1055->1060 1065 7ff63d8d2e0a-7ff63d8d2e16 1057->1065 1066 7ff63d8d2e18-7ff63d8d2e1e _invalid_parameter_noinfo_noreturn 1057->1066 1060->1051 1065->1060 1066->1052 1072 7ff63d8d2fa3-7ff63d8d3013 call 7ff63d8d48c0 call 7ff63d92f1f0 call 7ff63d8d4310 call 7ff63d8d5a00 call 7ff63d8d3e50 1067->1072 1073 7ff63d8d2e9e-7ff63d8d2ead call 7ff63d8d48c0 1067->1073 1101 7ff63d8d3015-7ff63d8d3060 call 7ff63d8d48c0 call 7ff63d8d49a0 call 7ff63d8d3b10 ShellExecuteA exit 1072->1101 1102 7ff63d8d3061-7ff63d8d30a7 call 7ff63d8d48c0 call 7ff63d8d4d00 call 7ff63d8d3b10 MessageBoxA call 7ff63d8d3cd0 exit 1072->1102 1079 7ff63d8d2eb5 1073->1079 1080 7ff63d8d2eaf-7ff63d8d2eb3 1073->1080 1082 7ff63d8d2eb8-7ff63d8d2ec1 1079->1082 1080->1082 1084 7ff63d8d2ec3 1082->1084 1085 7ff63d8d2ec6-7ff63d8d2ee9 call 7ff63d8d4310 call 7ff63d8d3e50 1082->1085 1084->1085 1095 7ff63d8d2f1f-7ff63d8d2f33 1085->1095 1096 7ff63d8d2eeb-7ff63d8d2efc 1085->1096 1099 7ff63d8d2f35-7ff63d8d2f43 1095->1099 1100 7ff63d8d2f69-7ff63d8d2fa2 call 7ff63d92f580 1095->1100 1097 7ff63d8d2efe-7ff63d8d2f11 1096->1097 1098 7ff63d8d2f1a call 7ff63d92f22c 1096->1098 1097->1098 1104 7ff63d8d2f13-7ff63d8d2f19 _invalid_parameter_noinfo_noreturn 1097->1104 1098->1095 1106 7ff63d8d2f45-7ff63d8d2f58 1099->1106 1107 7ff63d8d2f61-7ff63d8d2f64 call 7ff63d92f22c 1099->1107 1101->1102 1102->998 1104->1098 1106->1107 1111 7ff63d8d2f5a-7ff63d8d2f60 _invalid_parameter_noinfo_noreturn 1106->1111 1107->1100 1111->1107
                                            APIs
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D28A7
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2917
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2977
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D29C7
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2A17
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2C48
                                              • Part of subcall function 00007FF63D8D48C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D4980
                                              • Part of subcall function 00007FF63D92F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF63D8D43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D92F20A
                                              • Part of subcall function 00007FF63D8D4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D8D4341
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2C98
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2CD7
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2D25
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2D64
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2E18
                                            • memcpy.VCRUNTIME140 ref: 00007FF63D8D2E3D
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2F13
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2F5A
                                            • ShellExecuteA.SHELL32 ref: 00007FF63D8D3052
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D305A
                                            • MessageBoxA.USER32 ref: 00007FF63D8D3090
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D30A1
                                            • Sleep.KERNEL32 ref: 00007FF63D8D3109
                                            • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D3111
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8D3118
                                              • Part of subcall function 00007FF63D8D3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D326F
                                              • Part of subcall function 00007FF63D8D3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D32B0
                                              • Part of subcall function 00007FF63D8D3C30: memcpy.VCRUNTIME140 ref: 00007FF63D8D3C83
                                              • Part of subcall function 00007FF63D8D32D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D33B0
                                              • Part of subcall function 00007FF63D8D33D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D34B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                            • String ID: Failure$download$invalidver$message$open$sessionid$success
                                            • API String ID: 3283070336-3881042241
                                            • Opcode ID: b06a594ced616a058355541c90b444d98ffa0c964cb55d9bc3ecd19065b6951b
                                            • Instruction ID: 4da64c614513c8d3fbcc5dfe82ada50220247ef45ccd088dc0fed05435ab4ade
                                            • Opcode Fuzzy Hash: b06a594ced616a058355541c90b444d98ffa0c964cb55d9bc3ecd19065b6951b
                                            • Instruction Fuzzy Hash: A702D762E08B8A85EB10DFA4E4443AD2761FF45798F405236DA6D877DAEF3CE584D340

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1125 7ff63d90b5c0-7ff63d90b63d 1126 7ff63d90b65e-7ff63d90b663 1125->1126 1127 7ff63d90b63f-7ff63d90b643 1125->1127 1128 7ff63d90b682-7ff63d90b686 1126->1128 1129 7ff63d90b665-7ff63d90b67d call 7ff63d8f5af0 1126->1129 1127->1126 1130 7ff63d90b645-7ff63d90b659 call 7ff63d8f5af0 1127->1130 1132 7ff63d90b688-7ff63d90b69c call 7ff63d8f5af0 1128->1132 1133 7ff63d90b6a1-7ff63d90b6a4 1128->1133 1141 7ff63d90baa3-7ff63d90baa6 1129->1141 1140 7ff63d90baac-7ff63d90bab9 1130->1140 1132->1141 1138 7ff63d90b9ba 1133->1138 1139 7ff63d90b6aa-7ff63d90b6ae 1133->1139 1146 7ff63d90b9c2-7ff63d90b9ca 1138->1146 1139->1138 1143 7ff63d90b6b4-7ff63d90b6c9 1139->1143 1144 7ff63d90bbc5-7ff63d90bbcb 1140->1144 1145 7ff63d90babf-7ff63d90bac3 1140->1145 1141->1140 1141->1144 1147 7ff63d90b6cb-7ff63d90b6ce 1143->1147 1148 7ff63d90b6d0-7ff63d90b6fb realloc 1143->1148 1150 7ff63d90bbdd-7ff63d90bbf3 1144->1150 1151 7ff63d90bbcd-7ff63d90bbd0 1144->1151 1145->1144 1149 7ff63d90bac9-7ff63d90bacd 1145->1149 1152 7ff63d90b9ce 1146->1152 1147->1148 1153 7ff63d90b74d-7ff63d90b762 call 7ff63d8f5cf0 1147->1153 1154 7ff63d90b6fd-7ff63d90b719 call 7ff63d8f5970 1148->1154 1155 7ff63d90b71e-7ff63d90b74b 1148->1155 1149->1144 1157 7ff63d90bad3-7ff63d90bae8 call 7ff63d8f8800 1149->1157 1160 7ff63d90bc3b-7ff63d90bc41 1150->1160 1161 7ff63d90bbf5-7ff63d90bc39 memcpy * 2 1150->1161 1151->1150 1158 7ff63d90bbd2-7ff63d90bbda 1151->1158 1159 7ff63d90b9d6-7ff63d90b9dc 1152->1159 1167 7ff63d90b767-7ff63d90b76d 1153->1167 1154->1140 1155->1153 1187 7ff63d90bbae-7ff63d90bbc0 call 7ff63d8f5af0 1157->1187 1188 7ff63d90baee-7ff63d90baf0 1157->1188 1158->1150 1169 7ff63d90ba72-7ff63d90ba78 1159->1169 1170 7ff63d90b9e2-7ff63d90b9f7 call 7ff63d8f5af0 1159->1170 1165 7ff63d90bc43-7ff63d90bc46 1160->1165 1166 7ff63d90bc55-7ff63d90bc58 1160->1166 1163 7ff63d90bc65-7ff63d90bc87 call 7ff63d92f580 1161->1163 1165->1166 1171 7ff63d90bc48-7ff63d90bc50 1165->1171 1172 7ff63d90bc5a-7ff63d90bc5e 1166->1172 1173 7ff63d90bc60-7ff63d90bc62 1166->1173 1174 7ff63d90b972-7ff63d90b97a 1167->1174 1175 7ff63d90b773-7ff63d90b77f 1167->1175 1178 7ff63d90ba7e-7ff63d90ba8e 1169->1178 1179 7ff63d90b7a0-7ff63d90b7af 1169->1179 1191 7ff63d90b9f9-7ff63d90b9fc 1170->1191 1192 7ff63d90ba02-7ff63d90ba12 1170->1192 1171->1166 1172->1173 1173->1163 1182 7ff63d90b97c-7ff63d90b98d 1174->1182 1183 7ff63d90b992 1174->1183 1184 7ff63d90b799-7ff63d90b79e 1175->1184 1185 7ff63d90b781-7ff63d90b787 1175->1185 1178->1141 1190 7ff63d90ba90-7ff63d90ba94 1178->1190 1179->1141 1189 7ff63d90b7b5-7ff63d90b7b7 1179->1189 1182->1179 1183->1184 1195 7ff63d90b998-7ff63d90b9b5 1183->1195 1184->1179 1193 7ff63d90b78d-7ff63d90b794 call 7ff63d8f5af0 1185->1193 1194 7ff63d90b95e-7ff63d90b96d call 7ff63d8f5af0 1185->1194 1187->1144 1188->1187 1196 7ff63d90baf6-7ff63d90bb02 1188->1196 1189->1141 1198 7ff63d90b7bd-7ff63d90b7c0 1189->1198 1199 7ff63d90ba9b 1190->1199 1191->1192 1200 7ff63d90bb82-7ff63d90bb89 1191->1200 1201 7ff63d90ba18-7ff63d90ba59 call 7ff63d8f5af0 call 7ff63d909a80 1192->1201 1202 7ff63d90bb9a-7ff63d90bba9 1192->1202 1193->1184 1194->1184 1195->1179 1196->1144 1205 7ff63d90b7d2-7ff63d90b850 call 7ff63d8f83c0 1198->1205 1206 7ff63d90b7c2-7ff63d90b7c6 1198->1206 1207 7ff63d90ba9e call 7ff63d8f5af0 1199->1207 1200->1199 1220 7ff63d90bb8e-7ff63d90bb95 1201->1220 1221 7ff63d90ba5f-7ff63d90ba6d call 7ff63d8f5af0 1201->1221 1202->1207 1218 7ff63d90b852-7ff63d90b857 1205->1218 1219 7ff63d90b864-7ff63d90b869 1205->1219 1206->1205 1212 7ff63d90b7c8-7ff63d90b7cc 1206->1212 1207->1141 1212->1141 1212->1205 1218->1219 1222 7ff63d90b859-7ff63d90b85e 1218->1222 1223 7ff63d90b90e-7ff63d90b912 1219->1223 1224 7ff63d90b86f-7ff63d90b899 1219->1224 1220->1207 1221->1179 1222->1219 1226 7ff63d90bb07-7ff63d90bb0d 1222->1226 1223->1146 1230 7ff63d90b918-7ff63d90b91d 1223->1230 1227 7ff63d90b89b-7ff63d90b89e 1224->1227 1228 7ff63d90b8a0-7ff63d90b8bb realloc 1224->1228 1235 7ff63d90bb36-7ff63d90bb61 call 7ff63d8e1d10 call 7ff63d8f5af0 1226->1235 1236 7ff63d90bb0f-7ff63d90bb20 1226->1236 1227->1228 1232 7ff63d90b8e5-7ff63d90b8e9 1227->1232 1233 7ff63d90bb66-7ff63d90bb7d call 7ff63d8f5970 1228->1233 1234 7ff63d90b8c1-7ff63d90b8e1 1228->1234 1230->1146 1231 7ff63d90b923-7ff63d90b935 1230->1231 1231->1159 1237 7ff63d90b93b-7ff63d90b95c memcpy 1231->1237 1239 7ff63d90b8eb-7ff63d90b908 memcpy 1232->1239 1240 7ff63d90b90c 1232->1240 1233->1141 1234->1232 1235->1141 1241 7ff63d90bb2a-7ff63d90bb31 1236->1241 1242 7ff63d90bb22 1236->1242 1237->1152 1239->1240 1240->1223 1241->1199 1242->1241
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                            • API String ID: 3510742995-857957974
                                            • Opcode ID: 40bec67c4f280abf8169a9c87595eced14b45029a4417c1ac000181a656fb29d
                                            • Instruction ID: 388f90fb938ea734d7257502a8059e95ced557d828e7599404cdc2ca2041d5c5
                                            • Opcode Fuzzy Hash: 40bec67c4f280abf8169a9c87595eced14b45029a4417c1ac000181a656fb29d
                                            • Instruction Fuzzy Hash: 7002D232A18B4986EB61DB49E88476A27A4FB44BDCF100536DE4DC77EAEF78E441D700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1368 7ff63d90aa50-7ff63d90aabe 1369 7ff63d90aae0 1368->1369 1370 7ff63d90aac0-7ff63d90aad5 1368->1370 1372 7ff63d90aae7-7ff63d90ab01 1369->1372 1370->1369 1371 7ff63d90aad7-7ff63d90aade 1370->1371 1371->1372 1373 7ff63d90ab07-7ff63d90ab0c 1372->1373 1374 7ff63d90b1cb 1372->1374 1373->1374 1375 7ff63d90ab12-7ff63d90ab20 1373->1375 1376 7ff63d90ab62-7ff63d90ab66 1375->1376 1377 7ff63d90ab22-7ff63d90ab5c malloc 1375->1377 1379 7ff63d90ab68-7ff63d90abad malloc 1376->1379 1380 7ff63d90abb3-7ff63d90abc4 1376->1380 1377->1376 1378 7ff63d90b1bf 1377->1378 1378->1374 1379->1378 1379->1380 1381 7ff63d90abc6-7ff63d90abe0 realloc 1380->1381 1382 7ff63d90ac38-7ff63d90ac3a 1380->1382 1385 7ff63d90ac20-7ff63d90ac36 1381->1385 1386 7ff63d90abe2-7ff63d90abec call 7ff63d8f5970 1381->1386 1383 7ff63d90ac9a-7ff63d90ad41 call 7ff63d8f83c0 malloc 1382->1383 1384 7ff63d90ac3c-7ff63d90ac60 call 7ff63d8f5cf0 1382->1384 1383->1378 1395 7ff63d90ad47-7ff63d90ad61 memcpy 1383->1395 1390 7ff63d90ac65-7ff63d90ac68 1384->1390 1385->1382 1392 7ff63d90abf1 1386->1392 1393 7ff63d90ac6e-7ff63d90ac70 1390->1393 1394 7ff63d90aedf-7ff63d90aee6 1390->1394 1396 7ff63d90abf6-7ff63d90ac1f call 7ff63d92f580 1392->1396 1397 7ff63d90aec6-7ff63d90aeda call 7ff63d8f5970 1393->1397 1398 7ff63d90ac76-7ff63d90ac7e 1393->1398 1399 7ff63d90b1b8-7ff63d90b1ba 1394->1399 1400 7ff63d90aeec-7ff63d90aef8 1394->1400 1395->1392 1401 7ff63d90ad67-7ff63d90add3 free 1395->1401 1397->1396 1398->1397 1404 7ff63d90ac84-7ff63d90ac96 1398->1404 1399->1396 1400->1396 1408 7ff63d90add9-7ff63d90ade0 1401->1408 1409 7ff63d90b1a3-7ff63d90b1aa 1401->1409 1404->1383 1410 7ff63d90ade6-7ff63d90aded 1408->1410 1411 7ff63d90b14c-7ff63d90b158 1408->1411 1412 7ff63d90b1ae 1409->1412 1413 7ff63d90adf8-7ff63d90adff 1410->1413 1414 7ff63d90adef-7ff63d90adf2 1410->1414 1415 7ff63d90b15a-7ff63d90b186 call 7ff63d8e1d10 call 7ff63d8f5970 1411->1415 1416 7ff63d90b18b-7ff63d90b19e 1411->1416 1412->1399 1418 7ff63d90ae00-7ff63d90ae04 1413->1418 1414->1413 1417 7ff63d90aefd-7ff63d90af04 1414->1417 1415->1396 1416->1396 1423 7ff63d90af06-7ff63d90af0d 1417->1423 1424 7ff63d90af44-7ff63d90af6d call 7ff63d8e1d10 call 7ff63d8f5970 1417->1424 1420 7ff63d90ae06-7ff63d90ae0a 1418->1420 1421 7ff63d90ae43-7ff63d90ae4a 1418->1421 1420->1421 1426 7ff63d90ae0c-7ff63d90ae27 call 7ff63d8f6230 1420->1426 1428 7ff63d90ae59-7ff63d90ae62 1421->1428 1429 7ff63d90ae4c 1421->1429 1423->1415 1430 7ff63d90af13-7ff63d90af3f call 7ff63d8e1d10 call 7ff63d8f5970 1423->1430 1424->1392 1437 7ff63d90ae2c-7ff63d90ae32 1426->1437 1428->1418 1435 7ff63d90ae64-7ff63d90ae68 1428->1435 1429->1428 1430->1396 1439 7ff63d90af98-7ff63d90af9f 1435->1439 1440 7ff63d90ae6e-7ff63d90ae73 1435->1440 1442 7ff63d90ae38-7ff63d90ae3d 1437->1442 1443 7ff63d90af72-7ff63d90af93 call 7ff63d8f5970 1437->1443 1444 7ff63d90afa7-7ff63d90afae 1439->1444 1440->1439 1446 7ff63d90ae79-7ff63d90ae8a 1440->1446 1442->1421 1442->1443 1443->1396 1444->1412 1449 7ff63d90afb4-7ff63d90afb7 1444->1449 1446->1444 1447 7ff63d90ae90-7ff63d90aeb4 memcpy 1446->1447 1447->1449 1451 7ff63d90aeba-7ff63d90aebf 1447->1451 1453 7ff63d90afb9 1449->1453 1454 7ff63d90afc3-7ff63d90afcb 1449->1454 1451->1397 1453->1454 1455 7ff63d90afcd-7ff63d90afe7 1454->1455 1456 7ff63d90aff3 1454->1456 1455->1456 1457 7ff63d90afe9-7ff63d90aff1 1455->1457 1458 7ff63d90affb-7ff63d90affe 1456->1458 1457->1458 1459 7ff63d90b120-7ff63d90b128 1458->1459 1460 7ff63d90b004-7ff63d90b035 1458->1460 1459->1399 1461 7ff63d90b12e-7ff63d90b139 1459->1461 1465 7ff63d90b03b-7ff63d90b043 1460->1465 1466 7ff63d90b0f3-7ff63d90b11e call 7ff63d8e1d10 call 7ff63d8f5970 1460->1466 1461->1399 1462 7ff63d90b13b-7ff63d90b147 call 7ff63d925ad0 1461->1462 1462->1396 1465->1466 1468 7ff63d90b049-7ff63d90b04c 1465->1468 1471 7ff63d90b0c5-7ff63d90b0c8 1466->1471 1470 7ff63d90b04e-7ff63d90b055 1468->1470 1468->1471 1475 7ff63d90b057-7ff63d90b07e memset call 7ff63d9284b0 1470->1475 1476 7ff63d90b0c0 1470->1476 1473 7ff63d90b0ca CertFreeCertificateContext 1471->1473 1474 7ff63d90b0d0-7ff63d90b0d2 1471->1474 1473->1474 1474->1459 1478 7ff63d90b0d4-7ff63d90b0e5 call 7ff63d8f5970 1474->1478 1484 7ff63d90b0bb 1475->1484 1485 7ff63d90b080-7ff63d90b08a 1475->1485 1476->1471 1478->1396 1484->1476 1486 7ff63d90b0ea-7ff63d90b0f1 1485->1486 1487 7ff63d90b08c-7ff63d90b096 1485->1487 1488 7ff63d90b0b3-7ff63d90b0b6 call 7ff63d8f5970 1486->1488 1487->1486 1489 7ff63d90b098-7ff63d90b0aa call 7ff63d8ef0e0 1487->1489 1488->1484 1489->1484 1493 7ff63d90b0ac 1489->1493 1493->1488
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                            • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                            • API String ID: 860210379-3059304359
                                            • Opcode ID: ea392193f971925b59c67081e4a7e962e69aee8d6e8aa31c8d0ec1660afe7188
                                            • Instruction ID: 92b9648f49346016ebaa1e3dcafe245f83362e8939a37c3cde3fcfc44a57812c
                                            • Opcode Fuzzy Hash: ea392193f971925b59c67081e4a7e962e69aee8d6e8aa31c8d0ec1660afe7188
                                            • Instruction Fuzzy Hash: 30127F32A08B8985EB61CF99E8503AE77A5FB44BC8F104136CA5D877DAEF38E445D740

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1494 7ff63d909c70-7ff63d909ce0 1495 7ff63d909cff 1494->1495 1496 7ff63d909ce2-7ff63d909cf4 1494->1496 1498 7ff63d909d06-7ff63d909d20 call 7ff63d8f8800 1495->1498 1496->1495 1497 7ff63d909cf6-7ff63d909cfd 1496->1497 1497->1498 1501 7ff63d909d31-7ff63d909d38 1498->1501 1502 7ff63d909d22-7ff63d909d2c call 7ff63d8f5af0 1498->1502 1504 7ff63d909d78 1501->1504 1505 7ff63d909d3a-7ff63d909d5a GetModuleHandleA GetProcAddress 1501->1505 1502->1501 1507 7ff63d909d7a-7ff63d909d8b 1504->1507 1505->1504 1506 7ff63d909d5c-7ff63d909d72 call 7ff63d8f8800 1505->1506 1506->1504 1516 7ff63d909d74-7ff63d909d76 1506->1516 1509 7ff63d909d8d-7ff63d909da5 1507->1509 1510 7ff63d909db0 1507->1510 1509->1510 1512 7ff63d909da7-7ff63d909dae 1509->1512 1513 7ff63d909db7-7ff63d909dba 1510->1513 1512->1513 1514 7ff63d909dfb-7ff63d909e02 1513->1514 1515 7ff63d909dbc-7ff63d909dd3 call 7ff63d8f8800 1513->1515 1518 7ff63d909e06-7ff63d909e17 1514->1518 1522 7ff63d909de2-7ff63d909df6 call 7ff63d8f5970 1515->1522 1523 7ff63d909dd5-7ff63d909de0 1515->1523 1516->1507 1520 7ff63d909e19-7ff63d909e31 1518->1520 1521 7ff63d909e3c 1518->1521 1520->1521 1524 7ff63d909e33-7ff63d909e3a 1520->1524 1525 7ff63d909e43-7ff63d909e45 1521->1525 1533 7ff63d90a9fd-7ff63d90aa26 call 7ff63d92f580 1522->1533 1523->1518 1524->1525 1527 7ff63d909e47-7ff63d909e63 call 7ff63d8f0360 call 7ff63d8efd80 1525->1527 1528 7ff63d909e88-7ff63d909e92 1525->1528 1555 7ff63d909e80-7ff63d909e83 call 7ff63d8f0390 1527->1555 1556 7ff63d909e65-7ff63d909e7d 1527->1556 1530 7ff63d90a707-7ff63d90a71e call 7ff63d907900 1528->1530 1531 7ff63d909e98-7ff63d909ec3 1528->1531 1544 7ff63d90a720-7ff63d90a731 call 7ff63d907900 1530->1544 1545 7ff63d90a733-7ff63d90a73d call 7ff63d8f5af0 1530->1545 1534 7ff63d909efb 1531->1534 1535 7ff63d909ec5-7ff63d909edc 1531->1535 1542 7ff63d909f00-7ff63d909f0a 1534->1542 1540 7ff63d909ede-7ff63d909ee3 1535->1540 1541 7ff63d909ee5-7ff63d909eec 1535->1541 1540->1542 1547 7ff63d909eee-7ff63d909ef3 1541->1547 1548 7ff63d909ef5-7ff63d909ef9 1541->1548 1549 7ff63d909f0c-7ff63d909f0f 1542->1549 1550 7ff63d909f12-7ff63d909f1d 1542->1550 1544->1545 1561 7ff63d90a742-7ff63d90a74d 1544->1561 1545->1561 1547->1542 1548->1542 1549->1550 1552 7ff63d90a6ef-7ff63d90a6fe call 7ff63d8f5970 1550->1552 1553 7ff63d909f23-7ff63d909f38 1550->1553 1552->1530 1566 7ff63d90a9f8 1552->1566 1553->1552 1555->1528 1556->1555 1563 7ff63d90a7d6-7ff63d90a7e8 1561->1563 1564 7ff63d90a753-7ff63d90a7d4 call 7ff63d8f5af0 call 7ff63d8f8380 1561->1564 1565 7ff63d90a7ed-7ff63d90a845 calloc 1563->1565 1564->1565 1569 7ff63d90a847-7ff63d90a851 call 7ff63d8f5970 1565->1569 1570 7ff63d90a860-7ff63d90a863 1565->1570 1566->1533 1571 7ff63d90a856-7ff63d90a85b 1569->1571 1570->1571 1572 7ff63d90a865-7ff63d90a8c3 1570->1572 1571->1533 1577 7ff63d90a8c9-7ff63d90a8f8 free 1572->1577 1578 7ff63d90a96c-7ff63d90a988 call 7ff63d8f6230 1572->1578 1579 7ff63d90a946-7ff63d90a967 call 7ff63d8e1d10 call 7ff63d8f5970 1577->1579 1580 7ff63d90a8fa-7ff63d90a900 1577->1580 1585 7ff63d90a98d-7ff63d90a9aa 1578->1585 1579->1533 1583 7ff63d90a920-7ff63d90a941 call 7ff63d8e1d10 call 7ff63d8f5970 1580->1583 1584 7ff63d90a902-7ff63d90a91b call 7ff63d8e1d10 call 7ff63d8f5970 1580->1584 1583->1533 1584->1566 1594 7ff63d90a9e9-7ff63d90a9f0 1585->1594 1595 7ff63d90a9ac-7ff63d90a9af 1585->1595 1594->1566 1600 7ff63d90a9f3 call 7ff63d8f5970 1594->1600 1595->1594 1599 7ff63d90a9b1-7ff63d90a9e7 1595->1599 1599->1533 1600->1566
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                            • API String ID: 1646373207-2477831187
                                            • Opcode ID: 9df5deee7a8eb44b7c624e1997cfe2db299598a53202f801ac1e212e726632ce
                                            • Instruction ID: d6ce8c7fce3f6bfbe111d44c2f27f1ed0928344cd8505062f65e54a203d48c2c
                                            • Opcode Fuzzy Hash: 9df5deee7a8eb44b7c624e1997cfe2db299598a53202f801ac1e212e726632ce
                                            • Instruction Fuzzy Hash: AA02B372A08B8986E7108BA5E8403FD37A8FB44788F544136DA5D877DAEF3CE545E740

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1602 7ff63d8eb2b0-7ff63d8eb2fb calloc 1603 7ff63d8eb301-7ff63d8eb38a malloc 1602->1603 1604 7ff63d8eb43e-7ff63d8eb447 _errno 1602->1604 1606 7ff63d8eb38c-7ff63d8eb3b1 InitializeCriticalSectionEx call 7ff63d904a60 1603->1606 1607 7ff63d8eb3c7-7ff63d8eb3ce 1603->1607 1605 7ff63d8eb449-7ff63d8eb465 1604->1605 1617 7ff63d8eb466-7ff63d8eb47a _strdup 1606->1617 1618 7ff63d8eb3b7-7ff63d8eb3bf 1606->1618 1608 7ff63d8eb3e0-7ff63d8eb3f1 free 1607->1608 1609 7ff63d8eb3d0-7ff63d8eb3da DeleteCriticalSection free 1607->1609 1611 7ff63d8eb3f3 call 7ff63d908680 1608->1611 1612 7ff63d8eb3f8-7ff63d8eb400 1608->1612 1609->1608 1611->1612 1615 7ff63d8eb402 closesocket 1612->1615 1616 7ff63d8eb408-7ff63d8eb438 free 1612->1616 1615->1616 1616->1604 1617->1607 1619 7ff63d8eb480-7ff63d8eb4a0 free _strdup 1617->1619 1618->1607 1620 7ff63d8eb4a2-7ff63d8eb4b1 call 7ff63d908d50 1619->1620 1621 7ff63d8eb4ce-7ff63d8eb4d8 1619->1621 1627 7ff63d8eb4b6-7ff63d8eb4bc 1620->1627 1622 7ff63d8eb551-7ff63d8eb56c free 1621->1622 1623 7ff63d8eb4da-7ff63d8eb502 EnterCriticalSection LeaveCriticalSection 1621->1623 1622->1604 1625 7ff63d8eb504-7ff63d8eb50c CloseHandle 1623->1625 1626 7ff63d8eb515-7ff63d8eb518 1623->1626 1628 7ff63d8eb538-7ff63d8eb53b 1625->1628 1629 7ff63d8eb522-7ff63d8eb532 call 7ff63d8eb130 free 1626->1629 1630 7ff63d8eb51a-7ff63d8eb51d call 7ff63d908da0 1626->1630 1631 7ff63d8eb50e-7ff63d8eb510 1627->1631 1632 7ff63d8eb4be-7ff63d8eb4cb _errno 1627->1632 1635 7ff63d8eb53d-7ff63d8eb543 call 7ff63d8e5b00 1628->1635 1636 7ff63d8eb548-7ff63d8eb54b closesocket 1628->1636 1629->1628 1630->1629 1631->1605 1632->1621 1635->1636 1636->1622
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                            • String ID:
                                            • API String ID: 259767416-0
                                            • Opcode ID: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                            • Instruction ID: 38b6e6c8876b20a044fa550143b9bf72cbed75e980e22e15bfb88ae8aa95a224
                                            • Opcode Fuzzy Hash: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                            • Instruction Fuzzy Hash: 28817A22E19B8582E625DF65E8402B97360FBA9B54F055335CB9E437A2EF38F4D4D700
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                            • API String ID: 0-760484938
                                            • Opcode ID: 252dd515cb8bdb198c95c2b8d2812c48f0c9e2258bf50e30846c177568f5f6a3
                                            • Instruction ID: aa8be954093358af96dc8916431bff10a299c9ca74b150d47512d514d4158c37
                                            • Opcode Fuzzy Hash: 252dd515cb8bdb198c95c2b8d2812c48f0c9e2258bf50e30846c177568f5f6a3
                                            • Instruction Fuzzy Hash: F142AD22B09BCA96EB598BA5A5503B967E8FB45B84F084136CE5DC7785EF3CF460D300

                                            Control-flow Graph

                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8E1B61,?,?,?,?,00007FF63D8D3591), ref: 00007FF63D8F18C8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8F1911
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: callocfree
                                            • String ID: <$<$<$`$v
                                            • API String ID: 306872129-2056843887
                                            • Opcode ID: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                            • Instruction ID: 63e5e84e8c2d82f25e7f3ce88d95896c3881dd001aa04255f42611d6e9fd76f7
                                            • Opcode Fuzzy Hash: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                            • Instruction Fuzzy Hash: 0E913C32918BC586E310CF24D4043E837A4FB95B5CF185239CE995B39ADFBAA195D720

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,00007FF63D9224BA,?,?,?,?,00007FF63D8F89EB), ref: 00007FF63D8F8674
                                            • GetProcAddress.KERNEL32(?,?,00007FF63D9224BA,?,?,?,?,00007FF63D8F89EB), ref: 00007FF63D8F8699
                                            • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF63D9224BA,?,?,?,?,00007FF63D8F89EB), ref: 00007FF63D8F86AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcstrpbrk
                                            • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                            • API String ID: 27745253-3327535076
                                            • Opcode ID: 4e48bd242bc8de50c7c49492aed2aaea806512792f90eb033efec11107f27546
                                            • Instruction ID: 0ad4c7d8eb87492845b0125d1d501e3a921d6b1d6646a1c3d636bd522a6d056f
                                            • Opcode Fuzzy Hash: 4e48bd242bc8de50c7c49492aed2aaea806512792f90eb033efec11107f27546
                                            • Instruction Fuzzy Hash: 6441D796B0964682EB158F92B80017967E1AF49BE1F084530CE4D837D5FF3CE496E700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnogetpeernamegetsockname
                                            • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                            • API String ID: 2911674258-670633250
                                            • Opcode ID: 49c1520c5f3771e96cdf1576298b0c1f5e19965a53e7fb4b6fc29f3d889e0196
                                            • Instruction ID: 683ff626e55f45309bc1b464bee806ed765b1f99caee2d7ce16c1446f74adec2
                                            • Opcode Fuzzy Hash: 49c1520c5f3771e96cdf1576298b0c1f5e19965a53e7fb4b6fc29f3d889e0196
                                            • Instruction Fuzzy Hash: 68917066A19BC582E710CF65E8502ED33A0FB99B88F445236DE4C8775AEF39E185CB10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2074 7ff63d9086d0-7ff63d9086fd getaddrinfo 2075 7ff63d908703-7ff63d908715 2074->2075 2076 7ff63d908894-7ff63d9088a1 2074->2076 2077 7ff63d90871b 2075->2077 2078 7ff63d908874-7ff63d90887d WSASetLastError 2075->2078 2080 7ff63d908720-7ff63d908726 2077->2080 2079 7ff63d908883-7ff63d908890 2078->2079 2079->2076 2081 7ff63d908728-7ff63d90872b 2080->2081 2082 7ff63d90872d-7ff63d908730 2080->2082 2083 7ff63d908739-7ff63d90873d 2081->2083 2084 7ff63d908736 2082->2084 2085 7ff63d9087e1-7ff63d9087e8 2082->2085 2083->2085 2087 7ff63d908743-7ff63d90874a 2083->2087 2084->2083 2085->2080 2086 7ff63d9087ee 2085->2086 2088 7ff63d908822-7ff63d90882f 2086->2088 2087->2085 2089 7ff63d908750-7ff63d908753 2087->2089 2090 7ff63d908837-7ff63d90883a 2088->2090 2091 7ff63d908831 freeaddrinfo 2088->2091 2089->2085 2092 7ff63d908759-7ff63d90876a malloc 2089->2092 2093 7ff63d90883c-7ff63d90883f 2090->2093 2094 7ff63d90886f-7ff63d908872 2090->2094 2091->2090 2095 7ff63d90881c 2092->2095 2096 7ff63d908770-7ff63d9087a5 malloc 2092->2096 2097 7ff63d90886a-7ff63d90886d 2093->2097 2098 7ff63d908841-7ff63d908868 free * 3 2093->2098 2094->2078 2094->2079 2095->2088 2099 7ff63d9087a7-7ff63d9087bd memcpy 2096->2099 2100 7ff63d90880b-7ff63d90881a free 2096->2100 2097->2079 2098->2097 2098->2098 2101 7ff63d9087ce-7ff63d9087d8 2099->2101 2102 7ff63d9087bf-7ff63d9087cc _strdup 2099->2102 2100->2088 2104 7ff63d9087da 2101->2104 2105 7ff63d9087de 2101->2105 2102->2101 2103 7ff63d9087f0-7ff63d908809 free * 2 2102->2103 2103->2088 2104->2105 2105->2085
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                            • String ID:
                                            • API String ID: 2364279375-0
                                            • Opcode ID: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                            • Instruction ID: 5477da8ab7f5b821f131837c001a4b2908cb4b12ba76529a5ab3beb9bd4f4958
                                            • Opcode Fuzzy Hash: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                            • Instruction Fuzzy Hash: 99513D36B09B4A82EA65EF91B50013977A0FF48BD4F084075CE9E9379AEF3CE445A700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2106 7ff63d905fe0-7ff63d906025 2107 7ff63d90605b-7ff63d906075 2106->2107 2108 7ff63d906027-7ff63d90602a 2106->2108 2109 7ff63d90608c-7ff63d9060a7 2107->2109 2110 7ff63d906077-7ff63d906087 2107->2110 2108->2107 2111 7ff63d90602c-7ff63d90602f 2108->2111 2113 7ff63d9060ad-7ff63d9060b2 2109->2113 2114 7ff63d906137-7ff63d906143 2109->2114 2110->2109 2111->2107 2112 7ff63d906031-7ff63d906034 2111->2112 2115 7ff63d906054-7ff63d906056 2112->2115 2116 7ff63d906036 2112->2116 2119 7ff63d9060b4-7ff63d9060be 2113->2119 2120 7ff63d9060c7-7ff63d9060ca 2113->2120 2117 7ff63d906145-7ff63d906159 2114->2117 2118 7ff63d906190-7ff63d90619a 2114->2118 2123 7ff63d9062fd 2115->2123 2121 7ff63d90604b-7ff63d90604e Sleep 2116->2121 2122 7ff63d906038-7ff63d906046 WSASetLastError 2116->2122 2124 7ff63d90616f-7ff63d906171 2117->2124 2125 7ff63d90615b 2117->2125 2129 7ff63d9061d3-7ff63d9061db 2118->2129 2130 7ff63d90619c-7ff63d90619f 2118->2130 2119->2120 2126 7ff63d9060c0-7ff63d9060c5 2119->2126 2127 7ff63d9060ed-7ff63d9060f2 2120->2127 2128 7ff63d9060cc-7ff63d9060d0 2120->2128 2121->2115 2122->2123 2138 7ff63d9062ff-7ff63d90631f call 7ff63d92f580 2123->2138 2135 7ff63d906173-7ff63d906176 2124->2135 2136 7ff63d906189-7ff63d90618c 2124->2136 2134 7ff63d906160-7ff63d906167 2125->2134 2126->2119 2126->2120 2139 7ff63d906104-7ff63d90610e 2127->2139 2140 7ff63d9060f4-7ff63d9060fb 2127->2140 2128->2127 2137 7ff63d9060d2-7ff63d9060e6 2128->2137 2132 7ff63d9061e2 2129->2132 2133 7ff63d9061dd-7ff63d9061e0 2129->2133 2130->2129 2131 7ff63d9061a1-7ff63d9061a3 2130->2131 2131->2129 2143 7ff63d9061a5-7ff63d9061a8 2131->2143 2147 7ff63d9061e4-7ff63d90620e 2132->2147 2148 7ff63d906210-7ff63d906213 2132->2148 2146 7ff63d90621a-7ff63d90624a select 2133->2146 2134->2124 2149 7ff63d906169-7ff63d90616d 2134->2149 2135->2136 2150 7ff63d906178-7ff63d906185 2135->2150 2136->2118 2137->2127 2144 7ff63d906110-7ff63d906118 2139->2144 2145 7ff63d90612b-7ff63d906133 2139->2145 2140->2139 2142 7ff63d9060fd-7ff63d906102 2140->2142 2142->2139 2142->2140 2152 7ff63d9061b1 2143->2152 2153 7ff63d9061aa-7ff63d9061ac 2143->2153 2144->2145 2154 7ff63d90611a-7ff63d906127 2144->2154 2145->2114 2156 7ff63d906250-7ff63d90625a 2146->2156 2147->2146 2148->2146 2155 7ff63d906215 2148->2155 2149->2124 2149->2134 2150->2136 2157 7ff63d9061b3-7ff63d9061c1 WSASetLastError 2152->2157 2158 7ff63d9061c6-7ff63d9061d1 Sleep 2152->2158 2153->2156 2154->2145 2155->2146 2159 7ff63d906264 2156->2159 2160 7ff63d90625c-7ff63d90625f 2156->2160 2157->2156 2158->2156 2161 7ff63d90626d-7ff63d906270 2159->2161 2162 7ff63d906266-7ff63d906268 2159->2162 2160->2138 2163 7ff63d906272-7ff63d90629a __WSAFDIsSet * 2 2161->2163 2164 7ff63d90629f-7ff63d9062a2 2161->2164 2162->2138 2163->2164 2165 7ff63d90629c 2163->2165 2166 7ff63d9062a4-7ff63d9062b5 __WSAFDIsSet 2164->2166 2167 7ff63d9062ce-7ff63d9062d1 2164->2167 2165->2164 2168 7ff63d9062ba-7ff63d9062c9 __WSAFDIsSet 2166->2168 2169 7ff63d9062b7 2166->2169 2167->2123 2170 7ff63d9062d3-7ff63d9062e4 __WSAFDIsSet 2167->2170 2168->2167 2171 7ff63d9062cb 2168->2171 2169->2168 2172 7ff63d9062e9-7ff63d9062f8 __WSAFDIsSet 2170->2172 2173 7ff63d9062e6 2170->2173 2171->2167 2172->2123 2174 7ff63d9062fa 2172->2174 2173->2172 2174->2123
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                            • Instruction ID: 47a9837d160abc67cd9fd2f4645f8fb1520753239d7ae36804e631b589188a98
                                            • Opcode Fuzzy Hash: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                            • Instruction Fuzzy Hash: 8B91D831A0C68A8BEB648F99B9402B96291FF457D4F504134EA5DC6BCEFF3CD945A600
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                            • API String ID: 2635317215-3812100122
                                            • Opcode ID: 20c1f01f82be5406a22b6bd8f2c06d5bf3bce3b875cd4d8ace4c03d303d19b1a
                                            • Instruction ID: ae8835b3e8cbc43c4141737845de3453ef6a0b6687cc827917f2531fdfce2f01
                                            • Opcode Fuzzy Hash: 20c1f01f82be5406a22b6bd8f2c06d5bf3bce3b875cd4d8ace4c03d303d19b1a
                                            • Instruction Fuzzy Hash: 9B51C122B0DA8A82F6198BA9F4503B967E8FB85790F140071DB5D83795FF3DF5A1A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: system
                                            • String ID: .8$h%49
                                            • API String ID: 3377271179-4206735779
                                            • Opcode ID: 7ebd12cc3e181ad32f3692901b742a6bc9b2230d4e4e9f973d7613ff70f3cc47
                                            • Instruction ID: f768c4bd4179ff512aaa673b0fe9c11ebe855eaed28098989bdbb4949ad1edd4
                                            • Opcode Fuzzy Hash: 7ebd12cc3e181ad32f3692901b742a6bc9b2230d4e4e9f973d7613ff70f3cc47
                                            • Instruction Fuzzy Hash: 1B612B22E18BDA89F301CFB8EC491BC7771BB99748F045369CEC965A6AEF785108D344
                                            APIs
                                              • Part of subcall function 00007FF63D9086D0: getaddrinfo.WS2_32 ref: 00007FF63D9086F2
                                              • Part of subcall function 00007FF63D9086D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D90875E
                                              • Part of subcall function 00007FF63D9086D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D908798
                                              • Part of subcall function 00007FF63D9086D0: memcpy.VCRUNTIME140(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D9087B1
                                              • Part of subcall function 00007FF63D9086D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D9087BF
                                              • Part of subcall function 00007FF63D9086D0: freeaddrinfo.WS2_32(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D908831
                                              • Part of subcall function 00007FF63D9086D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D908845
                                              • Part of subcall function 00007FF63D9086D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D90884F
                                              • Part of subcall function 00007FF63D9086D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8EB1F5), ref: 00007FF63D90885C
                                            • WSAGetLastError.WS2_32 ref: 00007FF63D8EB1FB
                                            • WSAGetLastError.WS2_32 ref: 00007FF63D8EB205
                                            • EnterCriticalSection.KERNEL32 ref: 00007FF63D8EB220
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF63D8EB22F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EB240
                                            • send.WS2_32 ref: 00007FF63D8EB263
                                            • WSAGetLastError.WS2_32 ref: 00007FF63D8EB26D
                                            • LeaveCriticalSection.KERNEL32 ref: 00007FF63D8EB280
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                            • String ID:
                                            • API String ID: 506363382-0
                                            • Opcode ID: 8d4847aa9c3541c6272cc4f64181b6fcda6a05a4c2714a92309b560570c47997
                                            • Instruction ID: e550b7293071fab1c9371078e04e4246414db5a8506169ca8a8488a6d7611765
                                            • Opcode Fuzzy Hash: 8d4847aa9c3541c6272cc4f64181b6fcda6a05a4c2714a92309b560570c47997
                                            • Instruction Fuzzy Hash: 37318432A0864A82EB518FE5E85026D33A4FF84B98F445131D95ED77E9EF3CE449DB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastSleep
                                            • String ID:
                                            • API String ID: 1458359878-0
                                            • Opcode ID: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                            • Instruction ID: 3f2e9ee06d2c6c4c2d7fbbfeacd141f1a8539260378b4c365a42fccb11175c03
                                            • Opcode Fuzzy Hash: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                            • Instruction Fuzzy Hash: E7A128B1B1869A86EBA98B54A8043796295FF44BD4F144335EA5EC7BCEFF3CD8009300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                            • API String ID: 3056473165-3891197721
                                            • Opcode ID: cf259203f4bea438583c3c412f7776f9c7af7d41b21ab36aa11069d7271c4b40
                                            • Instruction ID: f9110873c7054aec651256e69fa08c2a3139dc0517a2779cb514de40ae1be171
                                            • Opcode Fuzzy Hash: cf259203f4bea438583c3c412f7776f9c7af7d41b21ab36aa11069d7271c4b40
                                            • Instruction Fuzzy Hash: A5719F72B05B098AEB10CBA5E4506AD37A5FB48BACF004635DF2D977D9EE38E406D740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                            • String ID:
                                            • API String ID: 1328870896-0
                                            • Opcode ID: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                            • Instruction ID: 5267b5a8c82a2f0191a9ee448d3f13f782c4cb7898105f75c1f2359f4514f651
                                            • Opcode Fuzzy Hash: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                            • Instruction Fuzzy Hash: 6D313A25E0C24E82FB54AFE699513B91391AF45788F444435EA8EC77DFFE2DA848A301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s$Connection #%ld to host %s left intact
                                            • API String ID: 1294909896-118628944
                                            • Opcode ID: b43007c119ddb362dd522825b94bdaea00a64d4afe850bffe6a95a76408431e2
                                            • Instruction ID: 57bafdd74f49d95103ad674744d1a90c740aac8447af8d3b0c954c31d77bd5b9
                                            • Opcode Fuzzy Hash: b43007c119ddb362dd522825b94bdaea00a64d4afe850bffe6a95a76408431e2
                                            • Instruction Fuzzy Hash: 62919032B0868A82EB689F61A5413FD73E4FB45B84F041931DE5E87395EF39F460AB40
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8F11BB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8F11D1
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F0FED
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F100A
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F101E
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F103A
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F1057
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F107A
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F108E
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10A2
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10C8
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10DC
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10F0
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F113F
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F114C
                                              • Part of subcall function 00007FF63D8F0F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F1175
                                            • memset.VCRUNTIME140 ref: 00007FF63D8F1205
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$memset
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 2717317152-3248832348
                                            • Opcode ID: 1fe9221564d640c4bd26ef65c7d112e8fbc6b6f9e54e64452478d767993c87a9
                                            • Instruction ID: ae0dabf955862225ae381da5d4ea7a80c8d118cf91c17e94e8e42792992460a4
                                            • Opcode Fuzzy Hash: 1fe9221564d640c4bd26ef65c7d112e8fbc6b6f9e54e64452478d767993c87a9
                                            • Instruction Fuzzy Hash: F5718E6290CACA81E751CFA5A4103FD27A9EB91F84F084131DB9D8B78AEF3CF455A350
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$memcpy
                                            • String ID: 1.1
                                            • API String ID: 4107583993-2150719395
                                            • Opcode ID: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                            • Instruction ID: 2b8497b0e9235475f978a81a4b8cd0eded46c2027e2c402a752adeebdae653e6
                                            • Opcode Fuzzy Hash: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                            • Instruction Fuzzy Hash: A5516076609B8986D668CF62F8403AA73A4FB45BC4F444031DF9D9779AEF3CE195A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 1294909896-3343404259
                                            • Opcode ID: 31029ba7bc85c6221cd791e62b65783b040d515dfa54cdf18f0e68298fd35378
                                            • Instruction ID: 061a7377b2242799e3c2962a9197069f8dee12256b92b1f57b8a0f7f35dc24cc
                                            • Opcode Fuzzy Hash: 31029ba7bc85c6221cd791e62b65783b040d515dfa54cdf18f0e68298fd35378
                                            • Instruction Fuzzy Hash: 73D19F21A0864A85FB648FA5D4403BC23B1FF85B88F446532DE0E9779AFF39F545A780
                                            APIs
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D28A7
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2917
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2977
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D29C7
                                              • Part of subcall function 00007FF63D8D2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2A17
                                            • MessageBoxA.USER32 ref: 00007FF63D8D3727
                                              • Part of subcall function 00007FF63D8D4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D8D4341
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D378A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                            • String ID: keyauth.win$null
                                            • API String ID: 3545939226-2841560827
                                            • Opcode ID: 54976bb8f5a6803ce57f224d1138e415bdf8c607ac50154f37e84ba570c39b8a
                                            • Instruction ID: 66cbfb8b4ad49ac5ff2b1324988bde741e8c3c1b2684a8913c72f0987f26c578
                                            • Opcode Fuzzy Hash: 54976bb8f5a6803ce57f224d1138e415bdf8c607ac50154f37e84ba570c39b8a
                                            • Instruction Fuzzy Hash: 4951CE62F08B5986FB04DBB5E4143AC2361AF44B88F404235CE4D57BDAEF3CE192A780
                                            APIs
                                              • Part of subcall function 00007FF63D8F8660: GetModuleHandleA.KERNEL32(?,?,?,00007FF63D9224BA,?,?,?,?,00007FF63D8F89EB), ref: 00007FF63D8F8674
                                            • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF63D8F89EB), ref: 00007FF63D9224D0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: AddressCallerHandleModuleProc
                                            • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                            • API String ID: 2084706301-3788156360
                                            • Opcode ID: eb7c67d60f81500d2959fb3e2a887152230945b8df9bf8d07a2b4a513378b2c4
                                            • Instruction ID: d59099b20eed394f744eca68b47f0822821b5bf6f6d4e7d04da4e3d4f3d53b44
                                            • Opcode Fuzzy Hash: eb7c67d60f81500d2959fb3e2a887152230945b8df9bf8d07a2b4a513378b2c4
                                            • Instruction Fuzzy Hash: B8F0F261F0AA4E80FF28DB95A89176013A0AF56748F844434C44CCA7DAFE3CA699A300
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Resolving timed out after %I64d milliseconds
                                            • API String ID: 0-3343404259
                                            • Opcode ID: ca364cd61b22da7a45924ca2c5d0be0ab3f163353069b28667edec80b41675fb
                                            • Instruction ID: cf8bccd9ec5631d112656564e400a797613dc56c014ff2318a25497b19259121
                                            • Opcode Fuzzy Hash: ca364cd61b22da7a45924ca2c5d0be0ab3f163353069b28667edec80b41675fb
                                            • Instruction Fuzzy Hash: 87B1A421A0864A85FB648EA5945437C23A5EF81B88F546536CE0EC73D9FF3DF844EB80
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D9013D0
                                              • Part of subcall function 00007FF63D901960: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D9019BA
                                              • Part of subcall function 00007FF63D901710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D9017A8
                                              • Part of subcall function 00007FF63D901710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D9017B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$calloc
                                            • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                            • API String ID: 3095843317-1242256665
                                            • Opcode ID: 047c063cc632b01c7180deedab65f5aa210f4e96e6fe781e7f6accdb5a76185c
                                            • Instruction ID: 5066e7a2dc4adfe2c87e24c599ec9a7879f431a3526348810f29d8e1e50d91f3
                                            • Opcode Fuzzy Hash: 047c063cc632b01c7180deedab65f5aa210f4e96e6fe781e7f6accdb5a76185c
                                            • Instruction Fuzzy Hash: 99417231A0C68A86E750DBA5B4413AA77A5AB857C4F184032DA4DD77DFFF3CE4489700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: closesocket$calloc
                                            • String ID:
                                            • API String ID: 2958813939-0
                                            • Opcode ID: 7286715f2d8226696fe039300086cd9a4100a7d7b36e2d67156ce959462abef5
                                            • Instruction ID: 961d06eafc13b5831c29c7b70bc5b13d8b5bf0cda4ee14b2fbd523bf5d59e454
                                            • Opcode Fuzzy Hash: 7286715f2d8226696fe039300086cd9a4100a7d7b36e2d67156ce959462abef5
                                            • Instruction Fuzzy Hash: B8416F32A08A8A91E740EFB5E4542F923A5FF88768F444231DE5DC63DAFF38E545A710
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                            • API String ID: 0-3791222319
                                            • Opcode ID: e548ac435fdf518fdc63269c384178e1aec1bc92e1be2642d1f665bd69d81a7b
                                            • Instruction ID: 1ae836215def6ac45f80b287ad8674c6f9dd953286464f6ad85adfd53a814222
                                            • Opcode Fuzzy Hash: e548ac435fdf518fdc63269c384178e1aec1bc92e1be2642d1f665bd69d81a7b
                                            • Instruction Fuzzy Hash: FF51C461B0869A95EB549B61A5403796799FF447F8F588231CA2DC73DAFF3CE041E300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freerecv
                                            • String ID:
                                            • API String ID: 2032557106-0
                                            • Opcode ID: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                            • Instruction ID: a68ad3d1066c47265dd32b7b46fc47b3d9a0d781d35152a8777dd7568f4a1b8b
                                            • Opcode Fuzzy Hash: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                            • Instruction Fuzzy Hash: 4CC1F632A0968646EB258F65D4103BA63A0FF457A8F446635DE6E83BC5FF3CF9419B00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                            • API String ID: 1294909896-3248832348
                                            • Opcode ID: 2db8d1b1d87920ac502833c0690e4baa10251e2d594a51cea7f79aa9207dcd08
                                            • Instruction ID: 345e1a56b9ce489e8135df0c49342f671484397e5ce29137915a8543f952add1
                                            • Opcode Fuzzy Hash: 2db8d1b1d87920ac502833c0690e4baa10251e2d594a51cea7f79aa9207dcd08
                                            • Instruction Fuzzy Hash: 35518B62A08AC581E7518F65E4043AD67A4EB84B98F084132DF8C8B3DAEF7CE595E310
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastrecv
                                            • String ID:
                                            • API String ID: 2514157807-0
                                            • Opcode ID: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                            • Instruction ID: f31a695b6e027e4141a34d8de8c70364e2e74fabbd4c0bb143c4b9473e7f4869
                                            • Opcode Fuzzy Hash: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                            • Instruction Fuzzy Hash: ECE09A62F0460942FF2957F1A85433812949B44772F444734CA3EC63D0EE2C44D65300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: closesocket
                                            • String ID:
                                            • API String ID: 2781271927-0
                                            • Opcode ID: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                            • Instruction ID: 500232b2c2db0e0adf679893791cd7b73caa7041f35c0a844e6544f697659109
                                            • Opcode Fuzzy Hash: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                            • Instruction Fuzzy Hash: 82019212B0654581EF54DBAAE19936D2390EF88B84F085131DB0DCB796EF3CE4959B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: socket
                                            • String ID:
                                            • API String ID: 98920635-0
                                            • Opcode ID: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                            • Instruction ID: fd267cbbc9435776d6e0407172e98173c8274d06f74dcfd3efe90e423135a145
                                            • Opcode Fuzzy Hash: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                            • Instruction Fuzzy Hash: 24E09B35F0650982DE495B76D85217923906F55734F844371C63D433D1EE3CE19AAB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _beginthreadex
                                            • String ID:
                                            • API String ID: 3014514943-0
                                            • Opcode ID: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                            • Instruction ID: b6412fe19ab1c0855b292bc52c6fc5f079397988d8a0eecb13eb463f62ad6e0b
                                            • Opcode Fuzzy Hash: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                            • Instruction Fuzzy Hash: 7AD02B63B18A04839F10CFB1AC40029E351B788774B484338EE7D827F4EF3CD1554600
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ioctlsocket
                                            • String ID:
                                            • API String ID: 3577187118-0
                                            • Opcode ID: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                            • Instruction ID: 430d868571f6bd583c0d848db4535e6e8136461f5e000e0f8df6aadcf88882b7
                                            • Opcode Fuzzy Hash: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                            • Instruction Fuzzy Hash: D7C08026F14581C3D3445F7158850876772ABC4304F955435D24B8223CEE3CC2E99B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                            • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                            • API String ID: 3939785054-690044944
                                            • Opcode ID: e05cc8603978f3b236e682b7e1e1b7a76b16787a534cfe94a371e3f4dfcd65fb
                                            • Instruction ID: 2367b5ba99594fd42ffffb220900c0f2e421ba358bc205a2c11b5c5cb1fa3f90
                                            • Opcode Fuzzy Hash: e05cc8603978f3b236e682b7e1e1b7a76b16787a534cfe94a371e3f4dfcd65fb
                                            • Instruction Fuzzy Hash: 31C28871E0868A85EB609BA5A8443F92791FB49BD8F484135CE4D8B3DEFE3DE444E310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                            • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                            • API String ID: 2059720140-3844637060
                                            • Opcode ID: 7c0d23a60b93744acfd05b3892a9ff91a3a92e57e3aab93d37f62f7272c507e2
                                            • Instruction ID: ee6499373e952068c96a79d6886c259691058993a5e4e069d845ed9a9d14e245
                                            • Opcode Fuzzy Hash: 7c0d23a60b93744acfd05b3892a9ff91a3a92e57e3aab93d37f62f7272c507e2
                                            • Instruction Fuzzy Hash: AE72B261A0878A86FB719BA5E8003BD67A0EF85794F441531CA8E827D6FF7CF445E740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                            • String ID: array$number overflow parsing '$object$object key$object separator
                                            • API String ID: 1664669839-85532522
                                            • Opcode ID: 0430c617731d3d5dcd1d85a078fc6eaf191fcc3ec08b5492cfa1e23e424cd946
                                            • Instruction ID: b857e6cae523dc8da855a534bf59a05b7d6f3c4d1ac989472b7c6ec5a93d2248
                                            • Opcode Fuzzy Hash: 0430c617731d3d5dcd1d85a078fc6eaf191fcc3ec08b5492cfa1e23e424cd946
                                            • Instruction Fuzzy Hash: DEA2C572A18B8A86EB10DBA8D4443ED2361FF457A4F505232DA5D97BE9EF7CE085D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                            • String ID: array$number overflow parsing '$object$object key$object separator
                                            • API String ID: 969624648-85532522
                                            • Opcode ID: 2d3b5b1313362666544617db59b1898d4018098a7ba51d5844b6820e794b86e1
                                            • Instruction ID: aa165839a13654cd757a881e08f8eff6fe830571d7583d2352c008adbb9c12b4
                                            • Opcode Fuzzy Hash: 2d3b5b1313362666544617db59b1898d4018098a7ba51d5844b6820e794b86e1
                                            • Instruction Fuzzy Hash: 7A928662A18B8986EB11DBA8D8443AD2371FF457A4F501232DA5D97BE9EF7CF085D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                            • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                            • API String ID: 561913010-2037819326
                                            • Opcode ID: aa642634a254af1ffcd2ad2ea0f61ab5314722c02f0035306fbb413ac3b6e6fd
                                            • Instruction ID: 7e40c436656a4c625837ae181a448248eedb700ce23d61e22524655389af016c
                                            • Opcode Fuzzy Hash: aa642634a254af1ffcd2ad2ea0f61ab5314722c02f0035306fbb413ac3b6e6fd
                                            • Instruction Fuzzy Hash: F342AE32A09B4E81EB509B95E8402B937A0FB44B98F544231DE5D97BDEEF3CE945E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastcallocfreegetsockname
                                            • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                            • API String ID: 2454324209-2383553807
                                            • Opcode ID: 10b29650d1a06bd4ec3ec31fc93c34fc74a05537e4d60ad3d080947db4e395c3
                                            • Instruction ID: e60ca9e79c6c87426f4e73894aa550daa8b4722e50d4afa8ab3416fc76e81c94
                                            • Opcode Fuzzy Hash: 10b29650d1a06bd4ec3ec31fc93c34fc74a05537e4d60ad3d080947db4e395c3
                                            • Instruction Fuzzy Hash: AD22A462B0878A81EB509BA1E8402BE67A5FB45B84F445032DA4EC77DEFF7CE545E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemallocstrncmp
                                            • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                            • API String ID: 1436789207-471711153
                                            • Opcode ID: 123a2d98d960ab42c595b3404186a2c4f6b30392ae679493633638e105c1701b
                                            • Instruction ID: c3361fc0ad7e680709ef87fe79436f57190281e5cd22dc9f1f0d0ba3e5d877db
                                            • Opcode Fuzzy Hash: 123a2d98d960ab42c595b3404186a2c4f6b30392ae679493633638e105c1701b
                                            • Instruction Fuzzy Hash: C8A1B261B19B8A81FB109FA2A8106B96790AF45BD4F485131DD1E877DAFF3CF445EB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                            • API String ID: 2190258309-2223379150
                                            • Opcode ID: e5e0312c21616c71d4915a97da91ed3be4c5b1f5ca8395eea93eafeb3c10cf90
                                            • Instruction ID: f4fcea4e8769e4974be77cf0fb66b6fa6776ee87de78926d85f9cf0c3b413d67
                                            • Opcode Fuzzy Hash: e5e0312c21616c71d4915a97da91ed3be4c5b1f5ca8395eea93eafeb3c10cf90
                                            • Instruction Fuzzy Hash: 0A125036A08B4D86EB14CFA1E8542AD37B4FB44B88F150035DE8D93B9AEF38D559E740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strncmp$memset
                                            • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                            • API String ID: 3268688168-2769131373
                                            • Opcode ID: b31d3d25bbb3d167ce02e5c6d937c1e200a4a95940cf2d5463f311fe965b8830
                                            • Instruction ID: 80e391b6a029bc5d4379d6d387f21a0946d75cd51fdbde6e00197279beb1473b
                                            • Opcode Fuzzy Hash: b31d3d25bbb3d167ce02e5c6d937c1e200a4a95940cf2d5463f311fe965b8830
                                            • Instruction Fuzzy Hash: 35E1D622E1878A86F710CBA5F8402B927A4FB89788F415136DE4E8379AFF7CE544D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                            • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                            • API String ID: 4221717217-4282655970
                                            • Opcode ID: 606fce838f325d9a22f8bd7fbe2373a4342e9e48cf8c19a5f72ee2543fa2c872
                                            • Instruction ID: ab3975802e2921ec0d6d2a881541a1921a72ffc1a5ac05c1a5ec998b5136d4cb
                                            • Opcode Fuzzy Hash: 606fce838f325d9a22f8bd7fbe2373a4342e9e48cf8c19a5f72ee2543fa2c872
                                            • Instruction Fuzzy Hash: FB819421B0964A86FB598FA5B8503B927A4BF45BD4F484135CA1EC63DAFF3DE448E340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 958247072-579821726
                                            • Opcode ID: 30b1def4f11264a7b609f98e6155777ab1970a3dcd2cc058dc3b7432fd5ad8e9
                                            • Instruction ID: 8d267a67079459f4da834facda5d6d265f914b1f11c37f94f1af026a85572a3c
                                            • Opcode Fuzzy Hash: 30b1def4f11264a7b609f98e6155777ab1970a3dcd2cc058dc3b7432fd5ad8e9
                                            • Instruction Fuzzy Hash: 7D32C462A18B8A85EB10DFA9D8443ED2361FF557A8F104232DA5D97BD9EF7CE085D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                            • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                            • API String ID: 4221717217-1887299029
                                            • Opcode ID: 18ad62f4a5a0cd3de7887efa181fed8ee0f51499181116489963c520c539ff20
                                            • Instruction ID: 5dd5733d807b41d4f161e8a02ddf1f109250ad143412a2362c65cface4c2beda
                                            • Opcode Fuzzy Hash: 18ad62f4a5a0cd3de7887efa181fed8ee0f51499181116489963c520c539ff20
                                            • Instruction Fuzzy Hash: 27819421B0964A86FB598FA5B8503B927A4BF45BD4F484135CA1EC63DAFF3DE448E340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup$fclosefgetsfopen
                                            • String ID: $default$login$machine$password
                                            • API String ID: 431015889-155862542
                                            • Opcode ID: aeef4b9014c4cf9d2d78b0d48f7a3ef214d4a9bc805991151f5d532477974b59
                                            • Instruction ID: 0de955ba18b1f68b49d0969f193bd5fe9339d4c2ed23a15fbc624c9edb497f12
                                            • Opcode Fuzzy Hash: aeef4b9014c4cf9d2d78b0d48f7a3ef214d4a9bc805991151f5d532477974b59
                                            • Instruction Fuzzy Hash: 3DA1A621A0D68F85FB619FA1A85037A67A0BF85788F094131DE4E877DAFF3DE454A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _errno$strtol
                                            • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                            • API String ID: 3596500743-988243589
                                            • Opcode ID: 29359ff11a13169c6bbd87f5d4eca36891b4094a7d179d7bfb86092fac4ccb88
                                            • Instruction ID: 294e7ff6e739378a6d4604425c038ca0de459dc224f95fd9b8e3b8c04667a917
                                            • Opcode Fuzzy Hash: 29359ff11a13169c6bbd87f5d4eca36891b4094a7d179d7bfb86092fac4ccb88
                                            • Instruction Fuzzy Hash: 05F1CA72F1561A8AEB24DFA4A8101BC37F1BB447A8F504235DE1ED77E9EF38A8059740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                            • API String ID: 600764987-1052566392
                                            • Opcode ID: 040bb05f0cf7cd9878106aad1305948eb5ac86463c693ab4e214be405d518435
                                            • Instruction ID: c0fd4ff4975e50e8ed6aed48addaa6c647b606e0b55d4d54cf9e7344ef26297e
                                            • Opcode Fuzzy Hash: 040bb05f0cf7cd9878106aad1305948eb5ac86463c693ab4e214be405d518435
                                            • Instruction Fuzzy Hash: BF318A62A0C7C586E7219BA0E4543BEB7A4FB85740F840535DA8D8279AEF3CE544DB10
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                            • API String ID: 0-2774518510
                                            • Opcode ID: 523e9815fb072d574a047b297e3395720e8989956db2acb0919649d8e29e9376
                                            • Instruction ID: 599bb6625795e5a7fcfcc732c9937cc0305b03048e4d4d25cc5bd4415ac6bf6c
                                            • Opcode Fuzzy Hash: 523e9815fb072d574a047b297e3395720e8989956db2acb0919649d8e29e9376
                                            • Instruction Fuzzy Hash: CD42C666A0C7CA49EBA58AA5A1503B937D9EB41B88F484036DB5DC7385FF3CB470E710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                            • String ID: @
                                            • API String ID: 3606780921-2766056989
                                            • Opcode ID: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                            • Instruction ID: 50c894a79acd8d8f6e587cabc011405356442706168ee2718caea9b24684d0e6
                                            • Opcode Fuzzy Hash: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                            • Instruction Fuzzy Hash: 7221523261868986EB60CF91F85466AB760FBC9BC4F445135EB8E87B6DEF3CD4059B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 313767242-0
                                            • Opcode ID: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                            • Instruction ID: ef46572ea417456bbc51de71f13733cac820ec07f135d0a656f763799a7134d6
                                            • Opcode Fuzzy Hash: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                            • Instruction Fuzzy Hash: 91311E76609B858AEB609FA1E8403ED7365FB84748F44403ADB4E97B9AEF38D548C710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                            • String ID: @
                                            • API String ID: 3016261861-2766056989
                                            • Opcode ID: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                            • Instruction ID: 7954d243ea24fd26ccea41b6a82deca75fa4d4174eceb8b6dac69f8a6953c9e2
                                            • Opcode Fuzzy Hash: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                            • Instruction Fuzzy Hash: 23418E22B046A08EF7108BB5D8513EE3BB0EB4A788F044065DE9D57B9ADF3CD15AE750
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF63D90C5C8,?,?,?,?,?,?,00007FF63D92380E), ref: 00007FF63D90C646
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF63D90C5C8,?,?,?,?,?,?,00007FF63D92380E), ref: 00007FF63D90C7AD
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D90C90C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                            • API String ID: 3985033223-3943651191
                                            • Opcode ID: 2a231402520dac6dfeb966d698eff136f7674ee3b3274eace693a1ffcb1e3978
                                            • Instruction ID: f50dbabef33fc25b396be743e16cc53cc743e8be14c0606a5b18210dda0cdbde
                                            • Opcode Fuzzy Hash: 2a231402520dac6dfeb966d698eff136f7674ee3b3274eace693a1ffcb1e3978
                                            • Instruction Fuzzy Hash: 6E91C572A086D985EB218B65B4003BE7BA0EB857D4F584231EAAD877DBEF3CD4419700
                                            APIs
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF63D93016B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 1848478996-631824599
                                            • Opcode ID: c81a61da6dff62d5fc6ebe2dd06c259fdb3328391505df66370617ea3a97fde8
                                            • Instruction ID: 0c8670c35d68fb6c9dc58fe40907c9ac745899202f0d0877431d807e2c1fe279
                                            • Opcode Fuzzy Hash: c81a61da6dff62d5fc6ebe2dd06c259fdb3328391505df66370617ea3a97fde8
                                            • Instruction Fuzzy Hash: 09115B32A14B8696E7449BA2D94137923A0FB04700F004139CA4DC2BA9EF3CE4749700
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                            • API String ID: 0-1379995092
                                            • Opcode ID: 70ca7b921aa72cb2f656cc355cb4e61dfcabc93d7a00fa25108394607d1b8cf8
                                            • Instruction ID: 4a479b51020732222d83567fb5fb1bee6ba98015cf52632031b8b0a229e24b5a
                                            • Opcode Fuzzy Hash: 70ca7b921aa72cb2f656cc355cb4e61dfcabc93d7a00fa25108394607d1b8cf8
                                            • Instruction Fuzzy Hash: 27424572A08A8A85E7259B58A4403BD67D9FF80BA4F510230DE5EC77C4FF3CF942A600
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8.1$8117cf7ad254a9a5d0d88f66a496a899a0f91b99fcda9b68c5bcd64eda7e1913$9WIvTVJa9m$https://keyauth.win/api/1.2/$loader principal
                                            • API String ID: 0-256606248
                                            • Opcode ID: 4d1748cb8f56f2878ad67963bcdf4b1ba8fbe7e05a9f2875c36f6a2263de4c73
                                            • Instruction ID: eda6b6147c032f01e605394f42c540b6ac3df9ca654f00bf71220e8feb776c8c
                                            • Opcode Fuzzy Hash: 4d1748cb8f56f2878ad67963bcdf4b1ba8fbe7e05a9f2875c36f6a2263de4c73
                                            • Instruction Fuzzy Hash: 35125D62D2DB864AF703D77998010A4E3649FA37C4F40D337ED58B1AA7FF29B2959204
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                            • Instruction ID: 0868ce61fd2b658a2dc55690138fa588b4379eb5aad57d11066d6cd31cf53264
                                            • Opcode Fuzzy Hash: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                            • Instruction Fuzzy Hash: E2112A26B14F098AEB00DFA1EC552B833B4FB19758F440E31DA6D867A9EF78D1989340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _getpidhtons
                                            • String ID:
                                            • API String ID: 3416910171-0
                                            • Opcode ID: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                            • Instruction ID: 1b35a18b7d8f32218e3ce8b4a9ddcce9885368b2b2995a6a4502a417e98f77a3
                                            • Opcode Fuzzy Hash: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                            • Instruction Fuzzy Hash: 82113C26A247D0CAD304CF75E5001AD37B0FB5CB88F04962AFB8987B59EB78D690C744
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Xbad_function_call@std@@
                                            • String ID:
                                            • API String ID: 1029415015-0
                                            • Opcode ID: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                            • Instruction ID: 6030d73792e75d139722683497123ded43490415ff2621ae465e4107045ed8f9
                                            • Opcode Fuzzy Hash: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                            • Instruction Fuzzy Hash: 3A81AD63B09B9989EB00CBA9D4843BC3770EB15B88F544026DF8E97795EF39E481D340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: Xbad_function_call@std@@
                                            • String ID:
                                            • API String ID: 1029415015-0
                                            • Opcode ID: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                            • Instruction ID: 18897c64e18ac90ec93a65619eb7ba19bc64b9c4c681e1ff6b1669be9ed3d387
                                            • Opcode Fuzzy Hash: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                            • Instruction Fuzzy Hash: 76819D62B19B9D89EB01CBA9D0843AC3770EB15B88F584423CF8D97795EF39E085D350
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction ID: 2b6b55d07f7fc4fc91404efd27c9fc284bcf451bf4aada64ba9a86546f6d538c
                                            • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                            • Instruction Fuzzy Hash: 90F08C2532476BBEFE00853B4624FBD1E419BD0700FA37974CC80421CB9A9E5493D714
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                            • Instruction ID: e9a594be2e138d635094fb2a64487254f60df890b3be7aa800beec4fb971ea4d
                                            • Opcode Fuzzy Hash: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                            • Instruction Fuzzy Hash: 17A00122A0980A90E6048B81EA900B02325AB55344B410035C11DD12AAAF2CA504A240
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$CounterPerformanceQuery
                                            • String ID: Closing connection %ld
                                            • API String ID: 3490100708-2599090834
                                            • Opcode ID: eb9022106fa48ef0e48b7552785da4dbc1585c49f9124965ca0ddee36b5df991
                                            • Instruction ID: 61578ae166a3beb89cf578695d8d6438bec4c0eef903d1ec492624cc243a1d9c
                                            • Opcode Fuzzy Hash: eb9022106fa48ef0e48b7552785da4dbc1585c49f9124965ca0ddee36b5df991
                                            • Instruction Fuzzy Hash: 49C1FE35518B8682E750DF61E8502ED3374FF85F98F085231DE9D8B79AEF38A195A310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                            • API String ID: 1294909896-2200874227
                                            • Opcode ID: ae1e4fcc06bd7d9f04feea2aa870c001feb33b1b7f8d8a18fdde67d1064cfb35
                                            • Instruction ID: 152b699c299dab067605a606fe865cc41b0689c3b4cf20ab82019a9c27139b18
                                            • Opcode Fuzzy Hash: ae1e4fcc06bd7d9f04feea2aa870c001feb33b1b7f8d8a18fdde67d1064cfb35
                                            • Instruction Fuzzy Hash: A3026B21A09B8B81FB659BA5E8403BA63A5EF44B84F440436DE4DC77DAFF3CE545A340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree$strpbrk
                                            • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                            • API String ID: 2737852498-2994854565
                                            • Opcode ID: 9f3ae06b9d67fe3e04b5c85581cf7496fb5af4bc220afe7f1755c54301e1dd65
                                            • Instruction ID: 3842d9693109a73a4fe4123b8e06787a32482ab786286381de392051acffe62f
                                            • Opcode Fuzzy Hash: 9f3ae06b9d67fe3e04b5c85581cf7496fb5af4bc220afe7f1755c54301e1dd65
                                            • Instruction Fuzzy Hash: 31D1B061E1975A80FB11DBA2A8146B923A8BF45B88F454131DD4E877CBFF3DE459E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc$memcpy$htonl
                                            • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                            • API String ID: 82385936-242323837
                                            • Opcode ID: 122f7fd80c8594248d113e32287b9eb9e9d1154b8ca574f645f8e3e0c2da2698
                                            • Instruction ID: 8ba7427bd1ad709ae381818c38fdb8f4dc7ef1c283f90d002a0fafc80f1fa543
                                            • Opcode Fuzzy Hash: 122f7fd80c8594248d113e32287b9eb9e9d1154b8ca574f645f8e3e0c2da2698
                                            • Instruction Fuzzy Hash: 86C15131A18B4A8AE710DFA5E8902AD77B0FB49B88F004035DE5E87B9AEF3CD445D740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                            • Instruction ID: b3e68f5fdc5e9eaac55395ae268a83b148d0af7a8b9542e79512eca4a6409b7d
                                            • Opcode Fuzzy Hash: 1355b7a7184f64feaaccd16da42868722d35f25f5e110b8e10d39babc2a5a14d
                                            • Instruction Fuzzy Hash: 7971EE35528B8581D750DF61E8942BC33B8FF89F99F080075CE9E8B75A9F389199E321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 1391767211-579821726
                                            • Opcode ID: 5c4f9039412dcb40fc83093152c61a3b643f1859d17c36408014daf374312b89
                                            • Instruction ID: 362397c9858792faa4c7592c22a35d02cf22845c2fafb0ca55a32170c8721b8b
                                            • Opcode Fuzzy Hash: 5c4f9039412dcb40fc83093152c61a3b643f1859d17c36408014daf374312b89
                                            • Instruction Fuzzy Hash: D922A362A18B8985EB118FA9D8443AD2371FF457A4F505232DA5D87BD9EF7CF084E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: calloc$_strdupfreehtonsmemset
                                            • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                            • API String ID: 130798683-4053692942
                                            • Opcode ID: 7cec8a530bab6e4e14e36d90609d07fde7477cf563e6d6e9dc01247cd4815aea
                                            • Instruction ID: c6fe85b4ef51079a80b5d86ef564ae62a97ad013c5a0467d64bafc6259c18c17
                                            • Opcode Fuzzy Hash: 7cec8a530bab6e4e14e36d90609d07fde7477cf563e6d6e9dc01247cd4815aea
                                            • Instruction Fuzzy Hash: DEE18F32B08A8E86EB60DFA1E4403B977A4FB48B88F444135DA4D8779AEF3CE554D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                            • String ID: array$number overflow parsing '$object
                                            • API String ID: 1346393832-579821726
                                            • Opcode ID: 5aea829a4d6894ef447e787a7303a6b904d496e6585f7fe99c3ff1b09238d1ac
                                            • Instruction ID: e2732925641748596b26dbd4799b6f7eb72c1ffd3c6be0bcdaab9316aa73b810
                                            • Opcode Fuzzy Hash: 5aea829a4d6894ef447e787a7303a6b904d496e6585f7fe99c3ff1b09238d1ac
                                            • Instruction Fuzzy Hash: EC12B762A18B8985FB009BB9D8443ED2361FF557A4F505232DA5D93BE9EF7CE085E300
                                            APIs
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DB96
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DBBC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DBCD
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DC3B
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DC6C
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DC8C
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DC9E
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DD00
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DD71
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DD88
                                            • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DE43
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DEB7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF63D91D2CF), ref: 00007FF63D91DEC0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$free$_strdupcalloc
                                            • String ID: LDAP$base$one$onetree$sub$subtree
                                            • API String ID: 112326314-884163498
                                            • Opcode ID: c441c14a2b1bdea0e04bcdcd83fc73141006c477e6a67313454cb6bf718cf366
                                            • Instruction ID: a438967c70d4b3de094bd31ad72b4b7e2c325c74c396866e9b48f6ac7ae33c2c
                                            • Opcode Fuzzy Hash: c441c14a2b1bdea0e04bcdcd83fc73141006c477e6a67313454cb6bf718cf366
                                            • Instruction Fuzzy Hash: D5B1A226B09B4A82FB51DB95A84027927A8FF89B80F448535DE4D837CAFF3CE445E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memchrstrtol
                                            • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                            • API String ID: 1626215102-895336422
                                            • Opcode ID: e72314628692c8f67b7c30d7b4dec522e30d90b8ff87010d58779c3d96bd0464
                                            • Instruction ID: 5a7f0ca13bbfe6ed9b9ec8334786a32f0d4ce60bf62ca92f33d64f1d74f162b0
                                            • Opcode Fuzzy Hash: e72314628692c8f67b7c30d7b4dec522e30d90b8ff87010d58779c3d96bd0464
                                            • Instruction Fuzzy Hash: A261D461B0864E85EB15EBA5E8002B96795BF45BE8F404631E91EC73EAFF3CE105E700
                                            APIs
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5757
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5763
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC094
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC09C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC0C3
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC0CC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC150
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EC159
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                            • API String ID: 1294909896-1595554923
                                            • Opcode ID: fa43ea9e0a126be4bef8fb6f7ed3e76991f67a2a80a70aa702e2070dbb11514f
                                            • Instruction ID: b8c7c36d08bd199aa3e0a84e9a39433cc23bed15937d20c8160d7b30f9a446a9
                                            • Opcode Fuzzy Hash: fa43ea9e0a126be4bef8fb6f7ed3e76991f67a2a80a70aa702e2070dbb11514f
                                            • Instruction Fuzzy Hash: E9E1AF22F0978A92FA6A8B9595002B967A4FF05B84F485035DE4DC7786FF3CF854EB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                            • String ID:
                                            • API String ID: 1087521380-0
                                            • Opcode ID: 178b2be9fe900d882fbf4bec64a10ac822553494956453af857de872257d8abc
                                            • Instruction ID: f1e0f3880e4253d4e42e5d9d7acd37a93f0e496bc19594e77c74a7390dd61bf5
                                            • Opcode Fuzzy Hash: 178b2be9fe900d882fbf4bec64a10ac822553494956453af857de872257d8abc
                                            • Instruction Fuzzy Hash: 1EB1B4A1B0AB5A41FF65AFA6A51027927A0AF45B94F081130CE9D833C5FF7CF496E710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                            • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                            • API String ID: 1094891576-1753329177
                                            • Opcode ID: d1553399ecc74311bf5003d4dab665501ce049fb482f209a04c290e844c2cb37
                                            • Instruction ID: 666dee8a06e074834e6ab96b95dbe08c398ce427065e4f2aaec3b69a0aa22d49
                                            • Opcode Fuzzy Hash: d1553399ecc74311bf5003d4dab665501ce049fb482f209a04c290e844c2cb37
                                            • Instruction Fuzzy Hash: 70D1A322A196CA45FB629BA1E4003F92794FF45798F444532DA5E97BCAEF3CF505D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                            • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                            • API String ID: 3103143820-2414412286
                                            • Opcode ID: bd80529c0a055b40eb949fe60fbfac290892e4a6154919f81aed75a89cf498cd
                                            • Instruction ID: e3eea5e6b6226187d7548b686a9cd63fa947cca0c11a5fa2d16d41a02248ae46
                                            • Opcode Fuzzy Hash: bd80529c0a055b40eb949fe60fbfac290892e4a6154919f81aed75a89cf498cd
                                            • Instruction Fuzzy Hash: 14D18922F0878652EB689B65E5402B977B9FB49784F440036DA4D83BDAEF3CE554E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                            • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                            • API String ID: 2243338858-131330169
                                            • Opcode ID: 6763ac52683adc2b30a8790578e0db2f895b694b4c0befe19cf29afa3948292b
                                            • Instruction ID: 2dbb2717fbaa4cd50879dee7d5fbf110a477a97ee26da162162dadef4abd6c20
                                            • Opcode Fuzzy Hash: 6763ac52683adc2b30a8790578e0db2f895b694b4c0befe19cf29afa3948292b
                                            • Instruction Fuzzy Hash: E191D321F1878A82EB548B65E8443B927F8FF4AB80F444035DA5E837DAEF3CE455A701
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno
                                            • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                            • API String ID: 3939687465-1752685260
                                            • Opcode ID: db281f68b38cbdc177fe78e3b8ce9259576fae544cc566fc18b4b21884f897dc
                                            • Instruction ID: a7e7a8ade3d5923726c1ccfa86824ba4ba2dcd23b04ce8a1312ef0106645e422
                                            • Opcode Fuzzy Hash: db281f68b38cbdc177fe78e3b8ce9259576fae544cc566fc18b4b21884f897dc
                                            • Instruction Fuzzy Hash: 8551B362A0C68A86E7258BE0E8403BD77A4FF44740F844535DA4D8379AEF3CF619AB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$strchr$_strdup
                                            • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                            • API String ID: 1922034842-2519073162
                                            • Opcode ID: 9420c540ce49b788537a1560c0a8b2960d2ad3b97e9a1f39b48959878ce98d9c
                                            • Instruction ID: a37e4c7867d8112d6710a86112d18e69c03a8265791dca5d7d7171632b6ccc50
                                            • Opcode Fuzzy Hash: 9420c540ce49b788537a1560c0a8b2960d2ad3b97e9a1f39b48959878ce98d9c
                                            • Instruction Fuzzy Hash: 95918C21A08A9A85FB619B92A8003B96790BF45BC8F494035DA4DD77CFFF3DE549E300
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF63D91FD2F), ref: 00007FF63D92D02D
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF63D91FD2F), ref: 00007FF63D92D04F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF63D91FD2F), ref: 00007FF63D92D060
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF63D91FD2F), ref: 00007FF63D92D08E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: ../$/..$/../$/./
                                            • API String ID: 111713529-456519384
                                            • Opcode ID: f19d3bbf4f657fe2a39777922c2588bd535b1b954c8ccd3c424f95d841e483cd
                                            • Instruction ID: cd4d05e7d66254e1276d8ec1396ad4cb1cea7debb5db0caedb27a6a79dea83a6
                                            • Opcode Fuzzy Hash: f19d3bbf4f657fe2a39777922c2588bd535b1b954c8ccd3c424f95d841e483cd
                                            • Instruction Fuzzy Hash: 2271FA21E0D68E45FB629B9195002796BA0AF62BA8F044131CB9D837DFFE3CE455E341
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                            • API String ID: 111713529-3006446216
                                            • Opcode ID: c052995a42e6b728a69c439b8f9efaad45d5159dd0512a59b113cd4f6ac561c8
                                            • Instruction ID: db95dad6cff720b03ab21fcb4db7dc2026969645bd2935da78f7c7960a8440bd
                                            • Opcode Fuzzy Hash: c052995a42e6b728a69c439b8f9efaad45d5159dd0512a59b113cd4f6ac561c8
                                            • Instruction Fuzzy Hash: 1071B566E0D7C945EB11CBA994052B97BA0EF4678CF5844B2CA4D833DBEE3CE149E301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                            • API String ID: 2190258309-1086287758
                                            • Opcode ID: c9cf272a14080f984a1e5b17b6d9c33fcb4d42b5607d30e6d9f2944a95de6c96
                                            • Instruction ID: af92404744d52ee07bd63b6975ceaaaf08b6a04d60369db54643ed901912a018
                                            • Opcode Fuzzy Hash: c9cf272a14080f984a1e5b17b6d9c33fcb4d42b5607d30e6d9f2944a95de6c96
                                            • Instruction Fuzzy Hash: F8B17532A08B4A86EB10DFA5E8502AD37B4FB49B98F400135DE4D97B9AEF3CD545E740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                            • API String ID: 1294909896-1220118048
                                            • Opcode ID: 8e597e9a321645fbd1e646547d860fffd9a743d79f84a05bd7a1f386ba8e9fa4
                                            • Instruction ID: 3889159e694c0ea4d167de8e8a9f4ca48a511c8ef4105785a5e00fe4dfa19fa7
                                            • Opcode Fuzzy Hash: 8e597e9a321645fbd1e646547d860fffd9a743d79f84a05bd7a1f386ba8e9fa4
                                            • Instruction Fuzzy Hash: 6C712A62A0874E85EA10DB91A9401F92391FB89B88F444576EE4D877CFFF3CE605D680
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloctolower
                                            • String ID: %%%02x
                                            • API String ID: 1244608590-4020994737
                                            • Opcode ID: b1bdd30bba7c06ed5a90474b3ff21456d1dc9d6e3bc5ba75029f1b5d07c933d7
                                            • Instruction ID: 8d1e42d31b8279d8f3f39e88dd63b78b9080a501a0573155c37fd299dc01f81f
                                            • Opcode Fuzzy Hash: b1bdd30bba7c06ed5a90474b3ff21456d1dc9d6e3bc5ba75029f1b5d07c933d7
                                            • Instruction Fuzzy Hash: 05A1B113A0D68E45FB628FA194103B96BE4AF46B84F084071DE9E863DFFE3DE505A310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcmp
                                            • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                            • API String ID: 1475443563-555813803
                                            • Opcode ID: 6a2bea4392b2130e34a27003928b1a1b59b2f45c4f6fe4f375bb331a3221da70
                                            • Instruction ID: 3f24646f6c010760e48cc1608645f9cdff10540808536906e434e353b4b03f74
                                            • Opcode Fuzzy Hash: 6a2bea4392b2130e34a27003928b1a1b59b2f45c4f6fe4f375bb331a3221da70
                                            • Instruction Fuzzy Hash: 14D15C61A0C24B41FB659FA5E9442B86794AF01BD4F885032DA5DC6BCFFE6CF842B301
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID:
                                            • API String ID: 111713529-0
                                            • Opcode ID: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                            • Instruction ID: 308e5e15285d8f6380a5520e70a3695b27593e70661efa501bd81c9d68c80a8a
                                            • Opcode Fuzzy Hash: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                            • Instruction Fuzzy Hash: D1618926B15B4982EA25DF52B84416973A4FF48B94B058075CF8E83B9AEF3CE484E310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                            • API String ID: 1294909896-2312071747
                                            • Opcode ID: 4f8d1fe6c507fc75a8a7447a995cc6d66b45d7b9cd231fe4e4829fdd3982d9d9
                                            • Instruction ID: c298d01821da13ef6c95a4e41357c10a055ed9eebd4e1307e86f5baa1b66fdda
                                            • Opcode Fuzzy Hash: 4f8d1fe6c507fc75a8a7447a995cc6d66b45d7b9cd231fe4e4829fdd3982d9d9
                                            • Instruction Fuzzy Hash: 90D1C361A0C68A65EB649BA0A4403F96799FB41794F404231CAADD77CBFF7CF459A300
                                            APIs
                                              • Part of subcall function 00007FF63D8D4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D8D4341
                                              • Part of subcall function 00007FF63D8D6310: memcpy.VCRUNTIME140 ref: 00007FF63D8D6486
                                              • Part of subcall function 00007FF63D8D1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC0E0
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF63D8DC10E
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF63D8DC11C
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC156
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC1B3
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC26C
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF63D8DC29A
                                            • __std_exception_destroy.VCRUNTIME140 ref: 00007FF63D8DC2A8
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC2E2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC333
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8DC37D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                            • String ID: value
                                            • API String ID: 3212548336-494360628
                                            • Opcode ID: 907c027a49782bd1002e07455baf20756771f542bad6bb0b414523d8210b4af8
                                            • Instruction ID: 06bb5b89576bd290723625c2f11cc433e6b4cf04ad06008a9a6d726940b89b43
                                            • Opcode Fuzzy Hash: 907c027a49782bd1002e07455baf20756771f542bad6bb0b414523d8210b4af8
                                            • Instruction Fuzzy Hash: 34A19622A18A8941EB009BF9E4443AD6361FF457B4F501332EA6D92BE9EF7CE085D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                            • API String ID: 4109794434-4095489131
                                            • Opcode ID: 88899a74057057c88eedf4ad62886504cfa5c0b3359586eb28e03194c433b762
                                            • Instruction ID: 081bf12baf0b3dac32d553a93ae793030d372e9a28cdb5954bfffa87790edf39
                                            • Opcode Fuzzy Hash: 88899a74057057c88eedf4ad62886504cfa5c0b3359586eb28e03194c433b762
                                            • Instruction Fuzzy Hash: C361B222A0C78A81EB559BA5A8042F927D4FF46F84F485034DE8E87796FF3DF405AB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$calloc$malloc
                                            • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                            • API String ID: 3103867982-1477229593
                                            • Opcode ID: 9b585e6bd0feb1063935b59970e61f5a74aa7bdd2576848c92edd7d7f5558c6b
                                            • Instruction ID: e751dacd12923e22d7ffda35112c134d610782cc1c60d7543e67a3cd5ce9cf09
                                            • Opcode Fuzzy Hash: 9b585e6bd0feb1063935b59970e61f5a74aa7bdd2576848c92edd7d7f5558c6b
                                            • Instruction Fuzzy Hash: B3C16C72A05B59C6EB10DFA5E8502AD37B4FB54B88F000136DE4D87B9AEF38E845DB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                            • API String ID: 2190258309-1457932261
                                            • Opcode ID: 2e18772b0babaabf96da70afab19b25dd9ef6fe2d3988751f7e99ff51ff6f865
                                            • Instruction ID: 1423ac1e8900e69903119195eee211489ac6296031c44e9f4b6c139ca8f9c37b
                                            • Opcode Fuzzy Hash: 2e18772b0babaabf96da70afab19b25dd9ef6fe2d3988751f7e99ff51ff6f865
                                            • Instruction Fuzzy Hash: D961BD62A0978A85EB158BA1E8443FA23A1BF45798F440A36CD5E877DBFF3CE154D300
                                            APIs
                                            • memset.VCRUNTIME140 ref: 00007FF63D919D8B
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D919EB5
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5757
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5763
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D919E6F
                                              • Part of subcall function 00007FF63D8E5690: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D8E56A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freestrncpy$_strdupmemset
                                            • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                            • API String ID: 3826632026-748038847
                                            • Opcode ID: da2cc46d67d0a219d26850ebc5348b5f8784cef6f8666290cff01ef196f61833
                                            • Instruction ID: d8a517223cdbd202c30fcdf8199e7fb7504d5d80a974f51f87895c717b22e335
                                            • Opcode Fuzzy Hash: da2cc46d67d0a219d26850ebc5348b5f8784cef6f8666290cff01ef196f61833
                                            • Instruction Fuzzy Hash: 0F717172A0CACAA5FB218F54D4417E963A8FF84798F844032DA8D8739AFF38E555D740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                            • API String ID: 1294909896-3837278924
                                            • Opcode ID: a8180e9f6d2c3404b4c8cde9795521e6aeca6fd533f5cebbf2dd30bb0d07b83b
                                            • Instruction ID: 23d9e4308c8ab4f295d1b7dfa6808ab78bda388bce26a16e5627257912144e23
                                            • Opcode Fuzzy Hash: a8180e9f6d2c3404b4c8cde9795521e6aeca6fd533f5cebbf2dd30bb0d07b83b
                                            • Instruction Fuzzy Hash: 10D19162A08ACA85EF11CFA4D4403B9B7A5FB45B88F848132DA4D877CAEF7CD549D310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: sendto$ErrorLast
                                            • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                            • API String ID: 4042023021-4197595102
                                            • Opcode ID: 2c42f4589fd93ccc31a9c772dbb528ab0ebb5ca0010053bde185be85adee39dc
                                            • Instruction ID: 290cbe06b1620a0a48b5e0a9a9746c8f29e268e5dbf5fe36af485e9320e44533
                                            • Opcode Fuzzy Hash: 2c42f4589fd93ccc31a9c772dbb528ab0ebb5ca0010053bde185be85adee39dc
                                            • Instruction Fuzzy Hash: 87B18F72608A86C6E7258F69D8407AD37A4FB88F88F444132DE4D8B79DEF38E445D750
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLastsend
                                            • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                            • API String ID: 1802528911-931584821
                                            • Opcode ID: 50ee8aa9fddf47a21618979ca5a05e459097dd67ce3ab72c0ee9a09730b3203c
                                            • Instruction ID: 4601d003f51b844dc4ab0ff20cc66d58d89ac690a10017ede68610a47cc085e2
                                            • Opcode Fuzzy Hash: 50ee8aa9fddf47a21618979ca5a05e459097dd67ce3ab72c0ee9a09730b3203c
                                            • Instruction Fuzzy Hash: 8691AD22A08AC595F7218F94E8057EA63A5FB847A8F440231EE8D47BDAEF3CD546D740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdup$freestrchrstrncmpstrtol
                                            • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                            • API String ID: 2070079882-2404041592
                                            • Opcode ID: c0389e6460597208a1fcbcc33ceaf34b3b224a0e2a46fa55c8373790c4765b53
                                            • Instruction ID: aa435c9e3c65f9fec78001ff40fb498b0e31e597804379522943226d60d98c0a
                                            • Opcode Fuzzy Hash: c0389e6460597208a1fcbcc33ceaf34b3b224a0e2a46fa55c8373790c4765b53
                                            • Instruction Fuzzy Hash: 6351C562E0C68E46EB658BA5A8603B977E5EF05794F484031DA4D867C6FF3CF445A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                            • String ID: Set-Cookie:$none
                                            • API String ID: 4109794434-3629594122
                                            • Opcode ID: 3b281a9d8fec38794cab6deb469b12af5d61e8eb2c6cb3d8728870ef85f7b18c
                                            • Instruction ID: f16fd04dc01d8de04adc94924dce1fb56bd47ec9731087e9582c6e1cb910736b
                                            • Opcode Fuzzy Hash: 3b281a9d8fec38794cab6deb469b12af5d61e8eb2c6cb3d8728870ef85f7b18c
                                            • Instruction Fuzzy Hash: 3551C86190C78A41FB55AB91A9102B967D0FF45B84F085434DECE827D5FF7CF446A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                            • API String ID: 3510742995-1652449680
                                            • Opcode ID: d8d1418f8031cba0bf6fb4262a2c68856d9d2c7bea2d3532c97021ddabc94649
                                            • Instruction ID: 61b30cb589e34fa7a222dfb1385cfea6dbca28265b9eaf3b51b7d56eb75d5f70
                                            • Opcode Fuzzy Hash: d8d1418f8031cba0bf6fb4262a2c68856d9d2c7bea2d3532c97021ddabc94649
                                            • Instruction Fuzzy Hash: 17A17032A08A8A81E751DFA5E8403FA23D9EB85B94F585131DD4D8B3DAFE3CF441A311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                            • API String ID: 1294909896-3146291949
                                            • Opcode ID: 7504568c3eadcb67795fcc710138e6e92c1df6eea46f795b5d6e6b2f2caaf592
                                            • Instruction ID: 2396a3e7f2bf1e0974c92b0f5fdf4ed89fa9fd0db2692c5a3eb879f780709e8b
                                            • Opcode Fuzzy Hash: 7504568c3eadcb67795fcc710138e6e92c1df6eea46f795b5d6e6b2f2caaf592
                                            • Instruction Fuzzy Hash: BE915D61B0CA4A86FB649BA1A8503B96394EF45BC4F044035DA4E87BCBFF7CE854E340
                                            APIs
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F5584
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F559A
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55AE
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55C2
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55D6
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55EA
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55FE
                                              • Part of subcall function 00007FF63D8F5570: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F5612
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8F4612
                                              • Part of subcall function 00007FF63D91E540: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E555
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E56F
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E58A
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5A6
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5C2
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5DA
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5F2
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E60A
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E622
                                              • Part of subcall function 00007FF63D91E540: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E63A
                                              • Part of subcall function 00007FF63D91E540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E654
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D8F4816
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D8F4859
                                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF63D8F499E
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF63D8F4A1B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdup$free$callocstrtoul
                                            • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                            • API String ID: 954404409-4150109901
                                            • Opcode ID: aede1fb7b6da657e8b39b25d02583713103dfba9771a86412c2b46d958339e45
                                            • Instruction ID: d9de5b5788ccf8486b83b22a36f18200278f1f100013526694ee61dae981155d
                                            • Opcode Fuzzy Hash: aede1fb7b6da657e8b39b25d02583713103dfba9771a86412c2b46d958339e45
                                            • Instruction Fuzzy Hash: 3AC15132B0C68A86FB698AB9A9503F923D8AB45744F040532CA1DC7795FF3CF554A300
                                            APIs
                                              • Part of subcall function 00007FF63D8D2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2469
                                              • Part of subcall function 00007FF63D8D2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D24A8
                                              • Part of subcall function 00007FF63D8D4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D8D4341
                                              • Part of subcall function 00007FF63D8D3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D3BF6
                                              • Part of subcall function 00007FF63D8D5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5E61
                                              • Part of subcall function 00007FF63D8D3C30: memcpy.VCRUNTIME140 ref: 00007FF63D8D3C83
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2121
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2171
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D21C2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2202
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2254
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2293
                                            • __std_exception_copy.VCRUNTIME140 ref: 00007FF63D8D22E6
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2337
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                            • String ID: parse error$parse_error
                                            • API String ID: 2484256320-1820534363
                                            • Opcode ID: b9f953f85efe2737f4ea5801a044b849877f2ec745bd3841908ce74f93fcba4a
                                            • Instruction ID: 1b309f9a5db027241c0adf9fd386ef6cfd5b235eb76459790ffd0d621c7a777c
                                            • Opcode Fuzzy Hash: b9f953f85efe2737f4ea5801a044b849877f2ec745bd3841908ce74f93fcba4a
                                            • Instruction Fuzzy Hash: 0AB18662A04B4985FB00CBA5E8443AD7771EB457A8F505631EA6D53BEAEF78E1C4E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                            • API String ID: 1865132094-1312055526
                                            • Opcode ID: b941f56203112eb735e749685b5e095cafadd7fb3b5203ee30a478e70944225f
                                            • Instruction ID: c27af957f7d05b8c61886a650f9405c1be01ee86b776d5370b174775ab48431b
                                            • Opcode Fuzzy Hash: b941f56203112eb735e749685b5e095cafadd7fb3b5203ee30a478e70944225f
                                            • Instruction Fuzzy Hash: F971C472A0C68A80E761CBA9A4403BD37E9EB85B94F180031DE4DC7799EF3DF581A351
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F0FED
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F100A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F101E
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F103A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F1057
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F107A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F108E
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10A2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10C8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10DC
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F10F0
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F113F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F114C
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F1175
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                            • Instruction ID: 5fe1e37a770d60b8f4f95f90c9b5e7b3d4ad356b49bcc742cea3b552d68a0676
                                            • Opcode Fuzzy Hash: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                            • Instruction Fuzzy Hash: 74510131919A8681EB14DF71E8512FD23A4FF85F98F085031DE4E8B79ADF39A095A350
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                            • API String ID: 1294909896-1896214517
                                            • Opcode ID: 13ca91801db0d7697efb043c9153a7fd339819c6765acc440fe6433b89c3a7f6
                                            • Instruction ID: 069e4d5a7909ae622cf1c43e1131a41c1ea33b275249cfc836bfd960165895bc
                                            • Opcode Fuzzy Hash: 13ca91801db0d7697efb043c9153a7fd339819c6765acc440fe6433b89c3a7f6
                                            • Instruction Fuzzy Hash: 69D14962909A8A85EB618B91E8403AA77E4FB8475CF040236DE8C477DEEF3CE545D714
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                            • API String ID: 2190258309-1670639106
                                            • Opcode ID: 8e1e589f99b5e9eb405cff7163e3db68d2180580e02b1a305af9f4982e269c67
                                            • Instruction ID: 993cd73caefb15556b64bab6e23077ab5813fbbd33d10b2192c25a1cb518236d
                                            • Opcode Fuzzy Hash: 8e1e589f99b5e9eb405cff7163e3db68d2180580e02b1a305af9f4982e269c67
                                            • Instruction Fuzzy Hash: 94A1446290968A85EB518F65E8503B827A0FF45BD8F481031EE5E87FCAEF39D485E300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdup$free$strrchr$_access_stat64
                                            • String ID:
                                            • API String ID: 2557200964-0
                                            • Opcode ID: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                            • Instruction ID: 57e6e2d1dc0fbcc3e9caad177597eba6fc5df0d7980cc60e2592a1a48aa188f3
                                            • Opcode Fuzzy Hash: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                            • Instruction Fuzzy Hash: 13417F61B09B4A86FA60EF92A44027963A0FF48B90F481134EE5D87795FF3CF455A700
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E555
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E56F
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E58A
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5A6
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5C2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5DA
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E5F2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E60A
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E622
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E63A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F45B5,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D91E654
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdup$callocfree
                                            • String ID:
                                            • API String ID: 1183638330-0
                                            • Opcode ID: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                            • Instruction ID: c1ced85695f99626a705222817c77a2c67e81eacbc811d633ba4c8cd3439b4f8
                                            • Opcode Fuzzy Hash: b29704e7a7bafcfd67e48d247ff31038bc34b79da22b3b3364008b4691575eec
                                            • Instruction Fuzzy Hash: EE31ED65A16B0A86FE6ACFD6A15017823E4FF48B54F4C0535CA1E827CAFF3CE464A350
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy$strchr
                                            • String ID:
                                            • API String ID: 1615377186-0
                                            • Opcode ID: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                            • Instruction ID: 30c2550067ce04c728be66068db2fe987a571ec4b64f10f399165c6e9dbb2a71
                                            • Opcode Fuzzy Hash: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                            • Instruction Fuzzy Hash: AE517D25B19B8985EA65EF95B5142B963E9BF44BC4F084430DE8D87789FF3CF419A300
                                            APIs
                                            Strings
                                            • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF63D8F3D09
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Couldn't find host %s in the .netrc file; using defaults
                                            • API String ID: 2653869212-3983049644
                                            • Opcode ID: 68ac9eeb43db9e5fab4e5cb7431107d5fc0a2d7964483fdef9680f4b84830d14
                                            • Instruction ID: a43ac5fef16b76e1c38c6165105520cd8c40d8f19358743f9c08f8928c423d7f
                                            • Opcode Fuzzy Hash: 68ac9eeb43db9e5fab4e5cb7431107d5fc0a2d7964483fdef9680f4b84830d14
                                            • Instruction Fuzzy Hash: EE71AF22E08B8A86EB65ABA5E4543B967E8FB84784F140035DB5D87395EF3EF454E300
                                            APIs
                                            Strings
                                            • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF63D8F3D09
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Couldn't find host %s in the .netrc file; using defaults
                                            • API String ID: 2653869212-3983049644
                                            • Opcode ID: 409e8ccf2cd3c48ddd194ed0cbd5bbb9f08e90a8da56c531e43f24badbebf168
                                            • Instruction ID: d5b0f2ab0bc6e2a29b84fb1d9e01beda2df6f970577d8c08fa8a3c80a18fd094
                                            • Opcode Fuzzy Hash: 409e8ccf2cd3c48ddd194ed0cbd5bbb9f08e90a8da56c531e43f24badbebf168
                                            • Instruction Fuzzy Hash: 5E61C222A08B8686E765DBA5E8643AD7BA4FB44B84F094031CB9D87391EF3DF455E300
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                            • API String ID: 0-1262176364
                                            • Opcode ID: 10e739815150c1fc96bd3dcf5279b1569fc72bf075f00fb4c524cee43709b833
                                            • Instruction ID: 8443a761dafdc031485714c0be997e1f635d67499f72e422a50d22c0b903500e
                                            • Opcode Fuzzy Hash: 10e739815150c1fc96bd3dcf5279b1569fc72bf075f00fb4c524cee43709b833
                                            • Instruction Fuzzy Hash: 9E41B222B0865AC6EB249BE5E8401BD63A4BF49BD4F444131DA4D877DBFF7CE944A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                            • API String ID: 2653869212-571364039
                                            • Opcode ID: 0f6e6d2ff9e25c00b2ba7230e7ec17ef429f3a51a60f19fd29005913708eaf6c
                                            • Instruction ID: f1d3c61ca057d3230623748293424558db4bb3a062379992e4db9e75305f57cc
                                            • Opcode Fuzzy Hash: 0f6e6d2ff9e25c00b2ba7230e7ec17ef429f3a51a60f19fd29005913708eaf6c
                                            • Instruction Fuzzy Hash: EA41B366A0878E49EB118BA5A8442F927A5BF0578CF480431CE4D9B3DBFF3CE554E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchr
                                            • String ID: Unknown error %u (0x%08X)
                                            • API String ID: 1897771742-1058733786
                                            • Opcode ID: 6db4a148488e5faae759fa00f2047bf7036d17ce9e803fcf4c659236faa6b94c
                                            • Instruction ID: 2cfb492d48af6246a2a0033eb83ef4d7ecc41b1f672a07aa5ff11f73655012d8
                                            • Opcode Fuzzy Hash: 6db4a148488e5faae759fa00f2047bf7036d17ce9e803fcf4c659236faa6b94c
                                            • Instruction Fuzzy Hash: 5D219362A0C78982EB215FA1A80032E7BE0BF54BD0F085534DE4D937A9EF3CE5559B10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                            • API String ID: 600764987-2710416593
                                            • Opcode ID: e72c6dac9182f083b27a246ce7e39daeaee275ef12f8df3a52750dc7f20c32e7
                                            • Instruction ID: 4ac9c56545031556cc3913e139454e29e8c5d6e3053b87f04ddea94f658d69cf
                                            • Opcode Fuzzy Hash: e72c6dac9182f083b27a246ce7e39daeaee275ef12f8df3a52750dc7f20c32e7
                                            • Instruction Fuzzy Hash: 30318A62A0C7C586E7219BA0E4543BEB7A4FB84740F840535DA8D82B9AEF3CE544DB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                            • API String ID: 600764987-1502336670
                                            • Opcode ID: 22f5f913cf0be7411f16a76cd575f268f1e4d73e328349b01835e54fb8980df1
                                            • Instruction ID: 9b21313e5fb0a685cf85ecb682578081d64dede411bf1699871812b907bb9e4f
                                            • Opcode Fuzzy Hash: 22f5f913cf0be7411f16a76cd575f268f1e4d73e328349b01835e54fb8980df1
                                            • Instruction Fuzzy Hash: 5D318A62A0C7C586E7219BA0E4543BEB7A4FB84740F840535DA8D8279AEF3CE544DB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                            • API String ID: 600764987-2628789574
                                            • Opcode ID: d674bc91ab309861c4f229d8fb5e2326304ccee02d36cd07337ee2d10ece94b6
                                            • Instruction ID: 5cff0a3546ac081ac63ebf9b4d376bc2b7d0a530c8e708721d7b35e82d103b22
                                            • Opcode Fuzzy Hash: d674bc91ab309861c4f229d8fb5e2326304ccee02d36cd07337ee2d10ece94b6
                                            • Instruction Fuzzy Hash: 8A318A62A0C7C586E7219BA0E8543BEB7A4FB84740F840535DA8D82B9AEF3CE544DB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                            • API String ID: 600764987-1965992168
                                            • Opcode ID: 21007d3461f6208895004d40506dbe1f915b5f9fd6c49eefa50c2d29984a337d
                                            • Instruction ID: f2d0cfa6c792caff169c64790a23808699c5b2f74ef855e16c22235008d92cb5
                                            • Opcode Fuzzy Hash: 21007d3461f6208895004d40506dbe1f915b5f9fd6c49eefa50c2d29984a337d
                                            • Instruction Fuzzy Hash: 0C318A62A0C7C586E7219BA0E4543BEB7A4FB84740F840535DA8D8279AEF3CE544DB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                            • API String ID: 600764987-1381340633
                                            • Opcode ID: 867b3c2889ea910bc82d5d4d60626029d6c103a08cfe34e10975424c7ee76e4e
                                            • Instruction ID: 3d44b10ed3025448960fbab3b30217ccf00ab450bd3a5b74b28a400e675e8229
                                            • Opcode Fuzzy Hash: 867b3c2889ea910bc82d5d4d60626029d6c103a08cfe34e10975424c7ee76e4e
                                            • Instruction Fuzzy Hash: 7A318A62A0C7C586E7219BA0E4543BEB7A4FB84740F840535DA8D8279AEF3CE544DB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                            • API String ID: 600764987-3862749013
                                            • Opcode ID: e21ee0f88ee939b7acd86ddd09091f8135850e0e83f13a8bc41a40d40aa2e6f4
                                            • Instruction ID: 50ce24eb7a1a051cffa549c94067988f4d487a0e4b6216a6cedbb8856dafef3b
                                            • Opcode Fuzzy Hash: e21ee0f88ee939b7acd86ddd09091f8135850e0e83f13a8bc41a40d40aa2e6f4
                                            • Instruction Fuzzy Hash: 15318A62A0C7C586E7219BA0E4543BEB7A4FB84740F840535DA8D82B9AEF3CE544EB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                            • API String ID: 600764987-618797061
                                            • Opcode ID: 16bb4725a52e87406c64d7570a0d1708fd42835543bc5ceca5d1af16b41e7555
                                            • Instruction ID: ec8262318676465fc24e25a348986d7e31c0d11aa276dd8bbe4a238f40fad27c
                                            • Opcode Fuzzy Hash: 16bb4725a52e87406c64d7570a0d1708fd42835543bc5ceca5d1af16b41e7555
                                            • Instruction Fuzzy Hash: 4D319C6260C7C586EB319FA0E8443AEB794FB85744F840535DA8D8279AEF3CE544DB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_time64
                                            • String ID:
                                            • API String ID: 3087401894-0
                                            • Opcode ID: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                            • Instruction ID: 0b76c43a2e6a7d27679c758d0cca2d5b852ea1a8d882b971e8a037dde04f2860
                                            • Opcode Fuzzy Hash: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                            • Instruction Fuzzy Hash: 4C21FF36A18A4581DB20DF62E9441796370FF49F94F055071DE9E8375AEF3CE485E740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$strchrstrtol
                                            • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                            • API String ID: 137861075-1224060940
                                            • Opcode ID: b1d23da1f6448ceea52aefbd53d22620ef15af7bfc877e12de7476ea10bbd4ea
                                            • Instruction ID: 495339150b1fd2fbc1c6d0f3427464234f569a6dfa7a782d4e9bf11669f2a2be
                                            • Opcode Fuzzy Hash: b1d23da1f6448ceea52aefbd53d22620ef15af7bfc877e12de7476ea10bbd4ea
                                            • Instruction Fuzzy Hash: E051C622A0CBCA84EB219FA9B8403A927D8FB41B98F444136DE9D87795EF3DE545D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfreestrpbrk
                                            • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                            • API String ID: 1812939018-2300960079
                                            • Opcode ID: 7750b02f0dbcdff0acb3bf35a48202898c7d4dc77abf2a9b37d649822f35866f
                                            • Instruction ID: 183ce105683a2e8394a2d2d1ed988cd14553cf5df5391f65073a758e41cd96d5
                                            • Opcode Fuzzy Hash: 7750b02f0dbcdff0acb3bf35a48202898c7d4dc77abf2a9b37d649822f35866f
                                            • Instruction Fuzzy Hash: 2851C662F1CB8991EB11CB52E8107B967A4FB86B84F450231DA8D837CAEF3EE554D340
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                            • API String ID: 1294909896-1147549499
                                            • Opcode ID: 567cec5eb1f694fa24dd200d27c250479e4804b01726046d216b7bbc46925cfe
                                            • Instruction ID: 90b1f60c6e663335d41ab483f4d2fd5745e8267940f87501b9f62a3616fbeabb
                                            • Opcode Fuzzy Hash: 567cec5eb1f694fa24dd200d27c250479e4804b01726046d216b7bbc46925cfe
                                            • Instruction Fuzzy Hash: 55416211F0C54B42FA18ABB5A9502B96395AF84BD0F486031DE0EC77D6FE3DF415BA40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdup
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                            • API String ID: 2653869212-3672398475
                                            • Opcode ID: e343febf516ec9d38bf4e5ff34aca985b545a36e1131153d014cfbc99d8ea65a
                                            • Instruction ID: 8ddd91d0fdb6f663e26bc3e9a3e25e8c4ba1a103d96d2fe8129b390a826aa4f0
                                            • Opcode Fuzzy Hash: e343febf516ec9d38bf4e5ff34aca985b545a36e1131153d014cfbc99d8ea65a
                                            • Instruction Fuzzy Hash: 0241AE62B0978A85EF158BA5E8442F927A5BF0578CF480475CE4E8B7DBEF3CE154A300
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E96CD
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E96F7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9701
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E970B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9715
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E971F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9729
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9733
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E973D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9746
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF63D8F10B9,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8E9761
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                            • Instruction ID: 821ac013b8a77292c6114442e6e4dd34b126fce573848de09cabc34519d69768
                                            • Opcode Fuzzy Hash: dca2646a6d4bee659c796f93a2f38fa2669d1fcc608c2bf197bd4bbed9a2a8d6
                                            • Instruction Fuzzy Hash: 5421D876A28A4582DB20DF61F8541696370FF89F99F141071DE9E8376ADE3CD889E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: mallocmemcpy
                                            • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                            • API String ID: 4276657696-1832275178
                                            • Opcode ID: b4658a80f4914b881289cdf9ec249ecfe85db5b317b3999fd571b759e4aeb899
                                            • Instruction ID: 5766e31f430bec095332be35b77ed31473f431a4b34a3d1337f17f4e74be69a8
                                            • Opcode Fuzzy Hash: b4658a80f4914b881289cdf9ec249ecfe85db5b317b3999fd571b759e4aeb899
                                            • Instruction Fuzzy Hash: EDA15062B09B8A89EB658F91A9403A973A8FF44B84F444135DE5D837DEEF3CE454E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3401966785-2901970132
                                            • Opcode ID: 675581fe95d70d56e8e3699e3a784245db5b4a778fe3a8afeca15a521e899947
                                            • Instruction ID: 933b98266c2a249c885a665674fb9ea82fa4108f0bacb420e5cee770a3117147
                                            • Opcode Fuzzy Hash: 675581fe95d70d56e8e3699e3a784245db5b4a778fe3a8afeca15a521e899947
                                            • Instruction Fuzzy Hash: 0A612665A0878E45EF188BA198152F927A2BF0579CF444535CE5E9B7CBFE3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3401966785-517259162
                                            • Opcode ID: d4e23496baadb6999b3355ec43cb5b2942b84d7c3c397044e5b8f182b07cf7af
                                            • Instruction ID: 660da6e8f1f95b64b6392d9e0c6dba0d3bf061cbdb633b2aa52ea0802ba34f08
                                            • Opcode Fuzzy Hash: d4e23496baadb6999b3355ec43cb5b2942b84d7c3c397044e5b8f182b07cf7af
                                            • Instruction Fuzzy Hash: 0161F352A0978E45EF198BA5D4542F927A2AF0579CF084535CE1E8BBCFFE3CA159A300
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF63D9044E8), ref: 00007FF63D921010
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF63D9044E8), ref: 00007FF63D921047
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF63D9044E8), ref: 00007FF63D92106E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                            • API String ID: 1294909896-3948863929
                                            • Opcode ID: 72266c120b509359db8940e29d2bafec9ecaf846b70da79a858558816950a900
                                            • Instruction ID: 5ec78a250ade60919dd209c2b37505bde70d1ccbbe297086a37a0891882b547d
                                            • Opcode Fuzzy Hash: 72266c120b509359db8940e29d2bafec9ecaf846b70da79a858558816950a900
                                            • Instruction Fuzzy Hash: 74617132A09B8985EB60CF95E8443AA73A4FB45BC8F004136DE8D8779AEF3CD555D701
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                            • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                            • API String ID: 1392894463-1168109407
                                            • Opcode ID: 5dbef2c0e756209cfb9fc127f82bb29073db9982edaea3d0de072ac830874615
                                            • Instruction ID: 8ba005d22edbc5a848637687c50d68a95c4f144b3d4ee474423c254c3f8f5ad2
                                            • Opcode Fuzzy Hash: 5dbef2c0e756209cfb9fc127f82bb29073db9982edaea3d0de072ac830874615
                                            • Instruction Fuzzy Hash: C9418421A0C68B81EB549FA5E9402B967A4AF45BC8F444131DA5EC73DBFF2CE905E710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$mallocrealloc
                                            • String ID: 0123456789-$<DIR>$APM0123456789:
                                            • API String ID: 359134164-4291660576
                                            • Opcode ID: 047adec88dde980229124f4fd7082d4da4df1b56da47dff766f1abbd12e4aa1d
                                            • Instruction ID: 84f32fded5980d615b457f4886b3620ab8b4632faca4a5b5a1cc640ccb6f9794
                                            • Opcode Fuzzy Hash: 047adec88dde980229124f4fd7082d4da4df1b56da47dff766f1abbd12e4aa1d
                                            • Instruction Fuzzy Hash: C6B16836A08A0E8AEB259F65D09037927A4FB44B4CF144435DA4E877DEEF39E490E780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: %s?%s$Failed sending Gopher request
                                            • API String ID: 111713529-132698833
                                            • Opcode ID: b97149f697a4ec87fa41c7b983c173117a12b1e15fcd256f89d3e8d393aeb69b
                                            • Instruction ID: 1a86c6cf442d0fc7062f3f80be82f87a63b38e4fd4a0a40bb0a7261dbb18e03f
                                            • Opcode Fuzzy Hash: b97149f697a4ec87fa41c7b983c173117a12b1e15fcd256f89d3e8d393aeb69b
                                            • Instruction Fuzzy Hash: BD51A522B1DA4A86E6119BA5B8001BA6794FF45BE4F440331EE6DC37DAFE3CD542A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                            • String ID: value
                                            • API String ID: 1346393832-494360628
                                            • Opcode ID: 2065c7959cdada8ae0f43b3798bb766cff933abfead470087c45b528edc7a64a
                                            • Instruction ID: 81e1afeeda3fc6d0e006dee460f5b0d11248f2a71763ebf82997abafc67dd325
                                            • Opcode Fuzzy Hash: 2065c7959cdada8ae0f43b3798bb766cff933abfead470087c45b528edc7a64a
                                            • Instruction Fuzzy Hash: D761A922A18A8985EB10DFB5E8443ED6361FF497A4F105332EA5D96BD9EF7CE085D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _close$_fstat64_openstrchr
                                            • String ID: Can't get the size of %s$Can't open %s for writing
                                            • API String ID: 423814720-3544860555
                                            • Opcode ID: d58b5c5ccc483598e4832854e43a540fe0e2e1d4e81638e85a20253436b34479
                                            • Instruction ID: 06452a9d11c2615f86390152a58369dea69540751a08044d5b7fe462b362717d
                                            • Opcode Fuzzy Hash: d58b5c5ccc483598e4832854e43a540fe0e2e1d4e81638e85a20253436b34479
                                            • Instruction Fuzzy Hash: D2518661B08A4A81EB249BA5E8103B963E5FF85BD4F444535DA5EC73DAFF3CE446A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdupstrtol
                                            • String ID: %%%02x
                                            • API String ID: 2999891020-4020994737
                                            • Opcode ID: bdf0f05f73a0858c45583dfff4fa5f00b36286e0bbb8b8d5827946e5d5b25b73
                                            • Instruction ID: 54ca44976745a887e61ff379d712bfb3569318551dfe984566213e2d298b2f1e
                                            • Opcode Fuzzy Hash: bdf0f05f73a0858c45583dfff4fa5f00b36286e0bbb8b8d5827946e5d5b25b73
                                            • Instruction Fuzzy Hash: 2651D312A0D28E45FB22CBA1A0143786B95AF46794F080171DE9E873CBFE3DE544E301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1496848336-4020994737
                                            • Opcode ID: a8ab935ad872045f021220b571eaedcfb8e3157dc64c221794b8d50643bb9222
                                            • Instruction ID: a2d8e9769c0ad6c9f1267666b2927dab04eb9483904b350715f902ad0971b740
                                            • Opcode Fuzzy Hash: a8ab935ad872045f021220b571eaedcfb8e3157dc64c221794b8d50643bb9222
                                            • Instruction Fuzzy Hash: 2D41C212A0D69E49FA32CBA160143B96BE5AF46794F080171DE9E873CBFE3DE544E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLasthtonssend
                                            • String ID: Sending data failed (%d)
                                            • API String ID: 2027122571-2319402659
                                            • Opcode ID: e72ffad40c6c327c58e12ef2ac7cdfaf983506424d5196833446f5a155874149
                                            • Instruction ID: 715e58c75c86a7b1a54ada95b0e1a5c9251009328c12904e7265e44cc877f6e3
                                            • Opcode Fuzzy Hash: e72ffad40c6c327c58e12ef2ac7cdfaf983506424d5196833446f5a155874149
                                            • Instruction Fuzzy Hash: AE41A132A08A8985E7055FB5E810AA83734F751F99F444632DB8D8379AEF7CE51AD301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 111713529-2901970132
                                            • Opcode ID: 3fbb2ee2ed78fb502877e763017400895ae92542c223960a27efdc1935aabdc9
                                            • Instruction ID: ba9324554e3016e3dbf88666ea86996bd8120a4b3707e048e69bb852b0edbb9f
                                            • Opcode Fuzzy Hash: 3fbb2ee2ed78fb502877e763017400895ae92542c223960a27efdc1935aabdc9
                                            • Instruction Fuzzy Hash: 26319266A0878E49EB159BE1A8441F927A5BF0578CF440875CE4E9B3DBFF3CE554A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_strdupmalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 111713529-517259162
                                            • Opcode ID: d10775beb8856261a6a377fe09b1f7ea7cce4b85b7cdecb8f317ba190c89088c
                                            • Instruction ID: 69da26bbc72a8f1ab93ccdf5c31514d82226c7f256f05b9b7fcfa72d0696fd0a
                                            • Opcode Fuzzy Hash: d10775beb8856261a6a377fe09b1f7ea7cce4b85b7cdecb8f317ba190c89088c
                                            • Instruction Fuzzy Hash: 52319E52A0978E45EF158BA1A8441F927A5BF0578CF481875DE0E9B7DBFF3CA154A300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                            • String ID:
                                            • API String ID: 3063020102-0
                                            • Opcode ID: f3abccec7c814f59f06d8638c2ddefffc87fb1d2fde3f04ad7c776f3c612ad4c
                                            • Instruction ID: f6263520a447811e1f916d1b0774acfc3aaa0509665a40fe709b643b6d2ef1bb
                                            • Opcode Fuzzy Hash: f3abccec7c814f59f06d8638c2ddefffc87fb1d2fde3f04ad7c776f3c612ad4c
                                            • Instruction Fuzzy Hash: 3CB1A222B18B4985FB10DBA5E5443AD2361EF447A8F404636DE6C977DAEF3CE099E340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3805148269
                                            • Opcode ID: 20c586ed46f578d029fc1c4b89a0decbb4f5f629725f0b5f4d429cc534bf48d2
                                            • Instruction ID: a3118bc11b7eb934dbe157229e71cb229112539f911f9aac77511f4f317457d6
                                            • Opcode Fuzzy Hash: 20c586ed46f578d029fc1c4b89a0decbb4f5f629725f0b5f4d429cc534bf48d2
                                            • Instruction Fuzzy Hash: 6871AE62A0868E88EB148BA1A8441F96BB5FB05789F444536CA4D977DBFF3CE554E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-599393795
                                            • Opcode ID: 63857b9f88c73a3064a1e0c02ff08f03428f3bc832e62006535a3ca44d91489c
                                            • Instruction ID: 8103d7d1a04e63d22dde3d6c793778c060ca8e680272620b7569b5607a2a2b2f
                                            • Opcode Fuzzy Hash: 63857b9f88c73a3064a1e0c02ff08f03428f3bc832e62006535a3ca44d91489c
                                            • Instruction Fuzzy Hash: 3561FE62A0868E48EB10ABA1E8441F87BA5FF05788F444536CA4D87BDFEF3CE554E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc$memcpy
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 901724546-1663925961
                                            • Opcode ID: 345c0efb75e5f5e3bfb360a7d56e46c10df3a749cc31020d7aafd10691290c92
                                            • Instruction ID: 9ab41db564cfe7607b6369bb341d7d90f7d2b568d9958257527248b1c5420fa6
                                            • Opcode Fuzzy Hash: 345c0efb75e5f5e3bfb360a7d56e46c10df3a749cc31020d7aafd10691290c92
                                            • Instruction Fuzzy Hash: E8510512B0968E46EE198B9594543F927A1FF45BD8F044635CA6F87BDBFE3CE045A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                            • API String ID: 1294909896-1642401773
                                            • Opcode ID: 8b14ffb17a7bed5e6f994567bd3f98ab4d170a11dbe0be09abedf0c16e82eb71
                                            • Instruction ID: 6361fcb94a9df09fce1a108db66c6bc9f5d5e0c45623a889eff159997811c2b5
                                            • Opcode Fuzzy Hash: 8b14ffb17a7bed5e6f994567bd3f98ab4d170a11dbe0be09abedf0c16e82eb71
                                            • Instruction Fuzzy Hash: D1517265A09B8E44EB108BA198441F977A5BB0578CF884535CE4DAB3DFEF7CE654E300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdup
                                            • String ID:
                                            • API String ID: 1169197092-0
                                            • Opcode ID: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                            • Instruction ID: cd6480f221b3f4a8c251b52a242a078bbcfa34b2185b0219426e416e9b595699
                                            • Opcode Fuzzy Hash: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                            • Instruction Fuzzy Hash: 33515226A1AB4182EB65CF95F04012C77A4FF48F94B082175EF5D43B49EF38E5E1A740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-3876350232
                                            • Opcode ID: 78f50a21b7f34b2d023b796abcd60e340b68c6140382275490a97a3042a013e5
                                            • Instruction ID: 57e18ee7b5816762f499119ddb528dfef74a1c64af0a022554fac29f3d412a92
                                            • Opcode Fuzzy Hash: 78f50a21b7f34b2d023b796abcd60e340b68c6140382275490a97a3042a013e5
                                            • Instruction Fuzzy Hash: 21518062A0DB8E84EB109BA1E8401F967A5BB05B8CF484535DA4D9B7DFEF3CE554E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3401966785-2901970132
                                            • Opcode ID: 6033982258b0eef9005531746be83ee8e6b9dd8905cea50568e3603bd33cd3c7
                                            • Instruction ID: 804b2d9f75fc45c105d1c504d8914731a33e48946b2841f9ce9e69c8a3136aea
                                            • Opcode Fuzzy Hash: 6033982258b0eef9005531746be83ee8e6b9dd8905cea50568e3603bd33cd3c7
                                            • Instruction Fuzzy Hash: B241AC65A0878E45EF159BA1A8041F927A2BF09BDCF480935CE1D9B7DBFE3CA514A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                            • API String ID: 2190258309-1780565354
                                            • Opcode ID: b76e7acda3d1431c819e0a95e862e65b45221f05599d27ce728834a38d5ef351
                                            • Instruction ID: 9dd83120f2842149344c26e61fbd3986a8142f2ff389e58040c2b0d4f2afc2c2
                                            • Opcode Fuzzy Hash: b76e7acda3d1431c819e0a95e862e65b45221f05599d27ce728834a38d5ef351
                                            • Instruction Fuzzy Hash: BF418571A0878A86EB618FA5E4403F827B8BB45798F914471CA9E837DBEE3CD455E300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 1e9cdfff36ca690872912e0e694f6311f5828980c35702adb4f25b4d88f6cc40
                                            • Instruction ID: 48ce4c564cd52cc49aa084443db0dbb58766a588ecc62c7e4bece1457893a57f
                                            • Opcode Fuzzy Hash: 1e9cdfff36ca690872912e0e694f6311f5828980c35702adb4f25b4d88f6cc40
                                            • Instruction Fuzzy Hash: A4414E32918B4A82E761CF61E44027933B4FB49F98F044175EA9D9339EEF38D891E380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                            • Instruction ID: e5620bc7ce6391da091c55e3aba7cc0e688acbb1e23823638097b3ccc4453bbe
                                            • Opcode Fuzzy Hash: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                            • Instruction Fuzzy Hash: 20312C36A28A5581D720EF52E8441697370FB85FD4F080031DE9D87BA9EF7CE446E700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                            • Instruction ID: 71bd353d8ed4c92a95cdac488bd17b871ad1f99eff9b87813df420efa454726a
                                            • Opcode Fuzzy Hash: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                            • Instruction Fuzzy Hash: 2A018C65634A0582DB14DF62ED540786330FF89F99B041071CD9E8376ADF3CE899E340
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF63D922AB3), ref: 00007FF63D923748
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF63D922AB3), ref: 00007FF63D92378A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF63D922AB3), ref: 00007FF63D92382F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF63D922AB3), ref: 00007FF63D923842
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D923D27
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$memcpystrchr
                                            • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                            • API String ID: 1438451818-3030351490
                                            • Opcode ID: d32a9535cb046ac46ed60313e465b9cac3221bdd75689f286ff64116ab2ec733
                                            • Instruction ID: be9c1a6eeffccc480d9d48753c5598c9819da48d9dcc3e6a529c976e2ba5be89
                                            • Opcode Fuzzy Hash: d32a9535cb046ac46ed60313e465b9cac3221bdd75689f286ff64116ab2ec733
                                            • Instruction Fuzzy Hash: 2102A161F087CB46F7119AE698447B92795AB4978CF444039DE0DCB7CBFE78E844A380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpymemset
                                            • String ID:
                                            • API String ID: 1579693990-0
                                            • Opcode ID: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                            • Instruction ID: abf0fd8ab484f66f5eff87eb87e8dd276960d335587db4dd9611eea67046c823
                                            • Opcode Fuzzy Hash: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                            • Instruction Fuzzy Hash: 90917D61B0974E82EA559AE6A45137A62A0AFA5BC8F084034DE5DC77CBFF3CE451A700
                                            APIs
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF63D8F8FA8), ref: 00007FF63D8F90F5
                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF63D8F8FA8), ref: 00007FF63D8F910F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strncmp
                                            • String ID: I32$I64$Internal error removing splay node = %d
                                            • API String ID: 1114863663-13178787
                                            • Opcode ID: bd4a6c465e0bce7c2a912e253289e6a8022db79ca8432d680972d7c5c4570fb2
                                            • Instruction ID: 0df09a1b68fb5848301ba7b706805e0f73127afa6fd41fbb74bffeb2fb069ba5
                                            • Opcode Fuzzy Hash: bd4a6c465e0bce7c2a912e253289e6a8022db79ca8432d680972d7c5c4570fb2
                                            • Instruction Fuzzy Hash: 88A1D673A0864986EB209F55E45477D7BE8FB48B48F168135CA8D83399EF3CE219D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                            • API String ID: 1294909896-116363806
                                            • Opcode ID: c74913c289f09ae1ee76359fbca19a34e67593ca543870b10d4fd17b6b441526
                                            • Instruction ID: 1d62a7e230a0ea11394ab8c23b3a0f23c00e5de5d12cdf54085339d33b320642
                                            • Opcode Fuzzy Hash: c74913c289f09ae1ee76359fbca19a34e67593ca543870b10d4fd17b6b441526
                                            • Instruction Fuzzy Hash: F6914936604F8986EB10CFA5E8506AE37B5FB88B84F044135DE4D877A9EF38D455DB00
                                            APIs
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF63D8EA92A,?,?,?,?,?,?,?,00007FF63D8EA6F7), ref: 00007FF63D907911
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF63D907AB3
                                            • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF63D907AD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                            • API String ID: 2644425738-1191287149
                                            • Opcode ID: 20cffc9857d5c3f46d7d6b21cac0e35f38831cc88af52eadf473f723694601ae
                                            • Instruction ID: 103840407054db8f134ec1908ebf13167f5b5022721995bc594b70b51cc8d220
                                            • Opcode Fuzzy Hash: 20cffc9857d5c3f46d7d6b21cac0e35f38831cc88af52eadf473f723694601ae
                                            • Instruction Fuzzy Hash: A651D422E0D78E41EA218BA5BC5017A6790AB55BE8F944131DA8D867CEFE2CE941E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                            • API String ID: 573759493-910067264
                                            • Opcode ID: 93edd36fceb0d69f2bb24ea6509d4cc8a93b47af0be9797d42cf70ab4cdd1ca4
                                            • Instruction ID: b8d7dee1eca2da0c5ee9466ec03d9d51248a5d0bdf3462a3d40f40808ed3b82e
                                            • Opcode Fuzzy Hash: 93edd36fceb0d69f2bb24ea6509d4cc8a93b47af0be9797d42cf70ab4cdd1ca4
                                            • Instruction Fuzzy Hash: E26149A1E4C69E68FB11CBA495042BA7BE9EB01798F544131C69EC2BDEEF3CD545E300
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5E61
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5EA5
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5EBD
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5F42
                                              • Part of subcall function 00007FF63D92F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF63D8D43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D92F20A
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5F74
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D8D1DBA), ref: 00007FF63D8D5F8F
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8D5FAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID:
                                            • API String ID: 1155477157-0
                                            • Opcode ID: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                            • Instruction ID: 0158d5ead25668418d49b76b8231d7bdd14105cc71a3789e706badcccec3ddfd
                                            • Opcode Fuzzy Hash: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                            • Instruction Fuzzy Hash: AF51EC32A09B8982EB04EFA5D5042682361FB15BD4F140A32DF6D977D6EF78F195E380
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                            • API String ID: 2190258309-3231818857
                                            • Opcode ID: ed2e198dcc3b011cc1bfcec88ea1bc6807998eeb1b1d636bf5459b77496cbc5e
                                            • Instruction ID: ba206b8ec7eb816e90ac13fb221adb16aae5c2a312aa847063c8ec911df65a46
                                            • Opcode Fuzzy Hash: ed2e198dcc3b011cc1bfcec88ea1bc6807998eeb1b1d636bf5459b77496cbc5e
                                            • Instruction Fuzzy Hash: 7451E462A0C6CE85EB11CB94A8442B977B4FF45BA8F440532DA4D937EAEF3CE945D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memchrmemcpyrecvfrom
                                            • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                            • API String ID: 3107918033-477593554
                                            • Opcode ID: d3f428e3e3a515e8a76563d932edcfca6e7b97f94956f80ba8286d8b94d8e803
                                            • Instruction ID: 8730a4f09a14acc044e6b9bac5516b3f332e93f189d1ca0bb27b201192f910a1
                                            • Opcode Fuzzy Hash: d3f428e3e3a515e8a76563d932edcfca6e7b97f94956f80ba8286d8b94d8e803
                                            • Instruction Fuzzy Hash: 67510572A0868A85EB649FA5D8153B9B7A4FB44B84F044132EE4EC77CAEE3CE445D700
                                            APIs
                                            • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4A93
                                            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4AE7
                                            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4B0E
                                            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4B36
                                            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4B7C
                                            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4B83
                                            • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF63D8D314B,?,?,?,00007FF63D8D3104), ref: 00007FF63D8D4B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                            • String ID:
                                            • API String ID: 1492985063-0
                                            • Opcode ID: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                            • Instruction ID: b419489e227dc66146bf8879ea00a8d290a5aa16527e43c9959e8744c9a47c3e
                                            • Opcode Fuzzy Hash: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                            • Instruction Fuzzy Hash: C8514432608A4581EB208BADD590238E7A0EF85F95F15C632CE5E837E5DF79E4469704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                            • API String ID: 1294909896-1255959952
                                            • Opcode ID: e970562c74868112c6df1a03012bf8c95489708dae6951303b259dec22d0baf0
                                            • Instruction ID: fb2cb690aed344360fd0909e7527dbe806dd3120f6f814e57d3ed2b821a41d1d
                                            • Opcode Fuzzy Hash: e970562c74868112c6df1a03012bf8c95489708dae6951303b259dec22d0baf0
                                            • Instruction Fuzzy Hash: ED51B262A0878E96FB21DBA5E8802BD2790FB51798F450032DA4DC77CAEF3CE465D350
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 86de3d7c9fee03b22631dcbbad5bbc54ee5ca30d69bbecc19bfd3f20b0975ccf
                                            • Instruction ID: 157bd93b3b3a6b3348abe0de64b2ca73ada3fded5f84ddd4927af3e311b9cb58
                                            • Opcode Fuzzy Hash: 86de3d7c9fee03b22631dcbbad5bbc54ee5ca30d69bbecc19bfd3f20b0975ccf
                                            • Instruction Fuzzy Hash: F441D412A0D69E49FB62CB5160143B96BE5AF46794F080171DE9E873CBFE3DE504E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: e87370a5869864d495002ca49e55217450b4e01ac38c04b7491b294906ca183f
                                            • Instruction ID: 40021ee69e81ca0ca1a93e242342c6371f421900c3d76f2beffe38bfe6fdb154
                                            • Opcode Fuzzy Hash: e87370a5869864d495002ca49e55217450b4e01ac38c04b7491b294906ca183f
                                            • Instruction Fuzzy Hash: AB41D112A0D29E49FB22CBA160143B86B95AF46794F080171DE9E873CBFE3DE444E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: eb8acf01f820f75c68904246a9ece804f2211bd47c51cec25c3a42db63dbcaa7
                                            • Instruction ID: d31a43b78e68cef36e8c3ecf618b3402d108b205477b0e12891956d2936c2d55
                                            • Opcode Fuzzy Hash: eb8acf01f820f75c68904246a9ece804f2211bd47c51cec25c3a42db63dbcaa7
                                            • Instruction Fuzzy Hash: 8541C112E0D69E49FA228BA160143B86BE5AF06794F080171DE9E873CBFE3DE544E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: e7d4bbfd5b38bbbd6d8bf0e475cbd4f94a9fc81eb8a3b1b531cbd017f784b84c
                                            • Instruction ID: 7aff875b9e5f9591c3fb077653b24af753cdeef3e5d1fcbefdb76498bd50abfe
                                            • Opcode Fuzzy Hash: e7d4bbfd5b38bbbd6d8bf0e475cbd4f94a9fc81eb8a3b1b531cbd017f784b84c
                                            • Instruction Fuzzy Hash: B241C112E0D69E49FA228BA160143B86BE5AF06794F080171DE9E873CBFE3DE504E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 9dce3a1e02d3dd0decdb27a30e4dbabf375221b931b30d07f11530cfea0de688
                                            • Instruction ID: 7a76629a5dc2f8139c4b758acc9371e6fab6575c0f5420db6e2e8cd23e4fd839
                                            • Opcode Fuzzy Hash: 9dce3a1e02d3dd0decdb27a30e4dbabf375221b931b30d07f11530cfea0de688
                                            • Instruction Fuzzy Hash: 8C41C012A0D69E49FA228BA160143B86BA5AF46794F080171DE9E873CBFE3DE444E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: eeb42b2a52bbdab434df15e2a6555f120b688906af1e5a0ec8f7357212fa5c02
                                            • Instruction ID: 52ac1ecfb3b6531405536637a0a9b49b6b60d66d92221b672a97355280d4b5c5
                                            • Opcode Fuzzy Hash: eeb42b2a52bbdab434df15e2a6555f120b688906af1e5a0ec8f7357212fa5c02
                                            • Instruction Fuzzy Hash: EA41C112E0D69E49FA228BA160143B86BE5AF06794F080171DE9E873CBFE3DE544E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: %%%02x
                                            • API String ID: 1941130848-4020994737
                                            • Opcode ID: 89f36e15c459582ef8a19abe2e0c0d18899e06bfa663bf0be4ff2b53d824261c
                                            • Instruction ID: 9c87ddf0b1a796ee7c0a0fd79e4cabafafc757aabae780964199cd9927aa4d87
                                            • Opcode Fuzzy Hash: 89f36e15c459582ef8a19abe2e0c0d18899e06bfa663bf0be4ff2b53d824261c
                                            • Instruction Fuzzy Hash: 0E41C212A0D69E48FA628BA160143B86BE59F06794F080171DE9E873CBFE3DE444E311
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr
                                            • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                            • API String ID: 2830005266-711804848
                                            • Opcode ID: 9df210bce6356ebbc1900224a2991696d1098ea7454d5676cb9223a8ecd7a2ea
                                            • Instruction ID: df3b0d702ccf91f74cf48641f596bb347c8bd8d2dd07160d12a1933bf14a1425
                                            • Opcode Fuzzy Hash: 9df210bce6356ebbc1900224a2991696d1098ea7454d5676cb9223a8ecd7a2ea
                                            • Instruction Fuzzy Hash: B541D221B0C78AC5EB549BAAF8401B967A0EF55BC8F484034DA4E877DFFE2DE441A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _time64
                                            • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                            • API String ID: 1670930206-870032562
                                            • Opcode ID: 816daf6425511fafc4144085c150fa208d6ed39076a45b0587e0b95dc59eac6e
                                            • Instruction ID: f23222686c62fd76ca85984f4cb59e6ae556342813b02e2e903a560fcd5c8526
                                            • Opcode Fuzzy Hash: 816daf6425511fafc4144085c150fa208d6ed39076a45b0587e0b95dc59eac6e
                                            • Instruction Fuzzy Hash: FB410672B1465D86DB20CF6AF00166877A4F798F88F505032EE0DC7B99EE39E951DB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-3155708153
                                            • Opcode ID: 53322ca47145cf0b56934f3223b1f0d61cfd0422896eed2fd94c1d26d7dd0d81
                                            • Instruction ID: e51b1f3f025f1c9ec98b57b399a4728cae3cfbbebbad2a14ccf5845682bc3b8c
                                            • Opcode Fuzzy Hash: 53322ca47145cf0b56934f3223b1f0d61cfd0422896eed2fd94c1d26d7dd0d81
                                            • Instruction Fuzzy Hash: 79419D62A0878E48EF149BA5A8451F927A6BF0578CF445831CE0E9B7CBFF3CE514A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                            • API String ID: 2190258309-3662781045
                                            • Opcode ID: 3423c50565629b261c04f200d569919f8545122c186ea242b1492fb3335ace71
                                            • Instruction ID: 8e6b5697381e62405d522fa284493b3ffe5988156659b9ada26f369e09e5f808
                                            • Opcode Fuzzy Hash: 3423c50565629b261c04f200d569919f8545122c186ea242b1492fb3335ace71
                                            • Instruction Fuzzy Hash: 3A418226A08B8E85EB10CBA5E8441FAB3A4FF45788F580532DA4D9779BEF3CE545D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-659367561
                                            • Opcode ID: 3a79513afe6aea4f96036019143dff1e5783e73f1d6728b543c147c9c275da5b
                                            • Instruction ID: 646aff260550cdaec419a57e399c5bc3da6ced7dfaad17b27cc8494649924b21
                                            • Opcode Fuzzy Hash: 3a79513afe6aea4f96036019143dff1e5783e73f1d6728b543c147c9c275da5b
                                            • Instruction Fuzzy Hash: F741A152B0978E49EF158BA5A8441F92BA1BF0578CF485875DE0E9B7CBFE3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: .
                                            • API String ID: 1865132094-916926321
                                            • Opcode ID: 56123e3a473889bf9ea8c9488b22fdc8ba33d670e3acbcf3f2f06b941ca91a8c
                                            • Instruction ID: 0e5f13438b4491fe4fc4279ec02d56115e5e42771fd1ae000bf8576af7de30a3
                                            • Opcode Fuzzy Hash: 56123e3a473889bf9ea8c9488b22fdc8ba33d670e3acbcf3f2f06b941ca91a8c
                                            • Instruction Fuzzy Hash: 26414222B08B8A82E760DF51B90027963A4EB49B94F454131EB4E877DAEF3CE552A740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3401966785-517259162
                                            • Opcode ID: 460a80e6cf153cb36f8422525b8caca0178bcd542308400b50d5b32dc07c46c2
                                            • Instruction ID: 36756107038f28e6f949ebae10cc0d17294f7ab2b5970b30347f1fae622b55be
                                            • Opcode Fuzzy Hash: 460a80e6cf153cb36f8422525b8caca0178bcd542308400b50d5b32dc07c46c2
                                            • Instruction Fuzzy Hash: 56418E65B0978A44EF158BA598442F927A1BF05B8CF484475CD0E9B7DBFF3CA554A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: isupper$freemallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 2172629687-3412697401
                                            • Opcode ID: cb891c32c6e3222d2a6e5507c8be083332d8d010055dea793f0f17abb076a06c
                                            • Instruction ID: 196e3a2d7406b66d07d474ad4f61fd5392b9d7939c47b5bbaab124d55b83ebd1
                                            • Opcode Fuzzy Hash: cb891c32c6e3222d2a6e5507c8be083332d8d010055dea793f0f17abb076a06c
                                            • Instruction Fuzzy Hash: C0312A95E4D69E54FB12CBA585043786B969F11BA8F080631C99EC2BDFFF3C9541E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$memcpy
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 3519880569-1663925961
                                            • Opcode ID: fb3880e822f44cd4eb53f69da3d9ae151aad4d879054bdaf5fecb74b28bac563
                                            • Instruction ID: 75089147b80c9267bed4471e9321d006b0bed0625f7841712beb2f82901066b9
                                            • Opcode Fuzzy Hash: fb3880e822f44cd4eb53f69da3d9ae151aad4d879054bdaf5fecb74b28bac563
                                            • Instruction Fuzzy Hash: EC31A626B09B8A45EE55CB96A8443FA63A1BF85BD8F040531CE5D977DBFE3CE0459300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: __stdio_common_vsscanf_strdupfree
                                            • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                            • API String ID: 860312144-3309259123
                                            • Opcode ID: 5a4ee0cb38acc090a0fbedc4f51c1d267081722fb7daa94e28cba8e938d1c70d
                                            • Instruction ID: 876663adab377ed061d4237609dfd94bc124669a5473e1ee49527f436c286cfa
                                            • Opcode Fuzzy Hash: 5a4ee0cb38acc090a0fbedc4f51c1d267081722fb7daa94e28cba8e938d1c70d
                                            • Instruction Fuzzy Hash: D5315C62E0DA4A89EA649BA0F4401BA2364BF45BD4F504432CE5E877DBEF3CE851E341
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                            • API String ID: 1865132094-176635895
                                            • Opcode ID: ae907500a812d25586cfa41279ce18986c9e2021419cb2cd90361f473d061923
                                            • Instruction ID: c4272f72b5f021e63ef344b344297a609700cfe53e3c7fb71fb5be31f531ae74
                                            • Opcode Fuzzy Hash: ae907500a812d25586cfa41279ce18986c9e2021419cb2cd90361f473d061923
                                            • Instruction Fuzzy Hash: 3821D062A0C7CA85EB218B94A8442F92761BF05B88F480471CA4D973DBEF3CE194E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc$_strdup
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1941130848-1663925961
                                            • Opcode ID: a68dbb86ef700e451aeb603a4cad13e7e7929bfbccc6980a137ba8f38b9cdaa9
                                            • Instruction ID: f0ef0baf6052da56525df40ea9015a6b240fcf511a1d92aff7fe98be385d80b5
                                            • Opcode Fuzzy Hash: a68dbb86ef700e451aeb603a4cad13e7e7929bfbccc6980a137ba8f38b9cdaa9
                                            • Instruction Fuzzy Hash: AE219666A08B8A46EA60CB95F8442FA63A4FF85788F440471DE4E8779BFF3CD045D700
                                            APIs
                                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D8F5675
                                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D8F56A1
                                            • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D8F56A9
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D8F56CB
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF63D8F29BC), ref: 00007FF63D8F56E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_errnostrerrorstrtoul
                                            • String ID: Invalid zoneid: %s; %s
                                            • API String ID: 439826447-2159854051
                                            • Opcode ID: 7d3ad36db36a946ac291080f8d2e221e09c17a1af24516dc27065fad3f0b3fed
                                            • Instruction ID: 03d38d76d120509cf74eb0823c38b6e27607143d724af068a62f9c3716c417a2
                                            • Opcode Fuzzy Hash: 7d3ad36db36a946ac291080f8d2e221e09c17a1af24516dc27065fad3f0b3fed
                                            • Instruction Fuzzy Hash: F3118632A0E64A86EB10DBA1E84027923B4EF85B58F540471DA1D877A9FF3CE844D700
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F5584
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F559A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55AE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55C2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55D6
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55EA
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F55FE
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D8F5612
                                              • Part of subcall function 00007FF63D91E510: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F562B,?,?,00000000,00007FF63D8F1073,?,?,00000000,00007FF63D8F15F5), ref: 00007FF63D91E525
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                            • Instruction ID: f1eeabd847c4fa19967a7be1c8eafab599063ce8294ed40caedf48e0936c9952
                                            • Opcode Fuzzy Hash: 8c11188c648886522ce8a6e64f6b6562302f20e8865ed9cfa606d4a8050b4ce4
                                            • Instruction Fuzzy Hash: 08115236528E85C1D710DF61FD940E823A4FBC9B9AB180175DE9E8F79AAF3890959210
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF061
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF071
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF07F
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF08D
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF09B
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF0A9
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF0B7
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8F2856), ref: 00007FF63D8EF0C5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                            • Instruction ID: e4676ccb2bbb4e59a191f2b497b25b1dcf90775bb04a97f69df7b7a4a8a6372a
                                            • Opcode Fuzzy Hash: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                            • Instruction Fuzzy Hash: 2801B036528B05C2D720DF61F98407C33B8FB8AFA8B101165CE9E8275ADF38C4A9E240
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcmpmemcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                            • String ID:
                                            • API String ID: 2846809682-0
                                            • Opcode ID: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                            • Instruction ID: 0c8a3ada0babcf345b0e4ee9da69cf79b35c2e34a1add8c220271bc92c19d6c4
                                            • Opcode Fuzzy Hash: 69c2e6193ddaa38194f47971ac0935eb94a2df83c2e04eaa05abd7d51751e23c
                                            • Instruction Fuzzy Hash: 46A1E122608B8986EB14CF66D4442A96361FF48BD4F588136DFAD87BC5EF3CE491E300
                                            APIs
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF63D8F299B), ref: 00007FF63D8F2137
                                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF63D8F299B), ref: 00007FF63D8F2168
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: calloc
                                            • String ID:
                                            • API String ID: 2635317215-0
                                            • Opcode ID: bc82dee56741fcdb2a61ea5e49477a01e532ce5743e5ef1c6ec771a3a7dfbefc
                                            • Instruction ID: 261e890498d1e5d314871096e760ed275174cbb4c77413c7b2e3e17bcf4a9bd8
                                            • Opcode Fuzzy Hash: bc82dee56741fcdb2a61ea5e49477a01e532ce5743e5ef1c6ec771a3a7dfbefc
                                            • Instruction Fuzzy Hash: 4D919E22609BC589D7558F74A4403ED37A4FB55B28F080235CFAC8B3DADF39A1A4D721
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                            • Instruction ID: 1047cc4a7de488475c5722d980e183815dafdf63d56673a994ba7bb03515fecc
                                            • Opcode Fuzzy Hash: 56b14bdc5f89045d4f7b2da786287d42a27f2024155c1ece33cbbf5de22e5f5c
                                            • Instruction Fuzzy Hash: C431C56271978985EE149F96A5041B8A365EF08BE0F540732EE6D877DAEF7CF051D300
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF63D8D3C25,?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D4FA3
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF63D8D3C25,?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D4FB1
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF63D8D3C25,?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D4FEA
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF63D8D3C25,?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D4FF4
                                            • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF63D8D3C25,?,?,?,?,?,00007FF63D8D1D8B), ref: 00007FF63D8D5002
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8D5031
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                            • Instruction ID: 8db7a51061f5bed7e0100406b04343a3ee562e5e82daac12dca5d363f99c6862
                                            • Opcode Fuzzy Hash: a0251d31b2e56c634ffd3971ee331e0c2d19140fef6248804dc9cc2118053b84
                                            • Instruction Fuzzy Hash: A741F961709B8985EE149FA6A90426DA351FF04BE4F544732DFAD877DAEF3CE051A300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ConditionMask$InfoVerifyVersion
                                            • String ID:
                                            • API String ID: 2793162063-0
                                            • Opcode ID: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                            • Instruction ID: df3e7bc56e3dbd4de562d589b784a47ffc786e7c62559311e32638d35a45fd6d
                                            • Opcode Fuzzy Hash: b6c6db3b816de679375f91f2878e76babe7d6183a69cc8df1fcf61702d0bf89d
                                            • Instruction Fuzzy Hash: FC41E462E2C68686F3308B92F4147BAA3A0FBD5700F015635E9DD46B95EF3DE494AF00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-2901970132
                                            • Opcode ID: 9dec1790426589c6bec882defff916bff345b07b4a0c113e656f09ef2ca887c0
                                            • Instruction ID: bc1fb79ebf209d4746c0ab6fe0776a9d6c401b45f6d38e2bd2c0cd13b6cc7b71
                                            • Opcode Fuzzy Hash: 9dec1790426589c6bec882defff916bff345b07b4a0c113e656f09ef2ca887c0
                                            • Instruction Fuzzy Hash: 3641D366A087CA49EB148BA198441F927A5BF0979CF484931CE5D9B7CBEF3CE154D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-517259162
                                            • Opcode ID: 2dab462f5145bc0738b088c235cea5b0e6c2d607e6670f6eefb5e99da21a05ee
                                            • Instruction ID: b0a5e68374c71de243da01ad1a8420a40ec1b6f4848ce8a60a885033d8e70dd8
                                            • Opcode Fuzzy Hash: 2dab462f5145bc0738b088c235cea5b0e6c2d607e6670f6eefb5e99da21a05ee
                                            • Instruction Fuzzy Hash: 9E41C162B0878A49EF158BA198441F927A1BF05BCCF484871DE0E9B7CBEF3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$freemalloc
                                            • String ID: PLAIN
                                            • API String ID: 3313557100-4000620671
                                            • Opcode ID: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                            • Instruction ID: f94d4e7992f0224011a4100b9b74aa10214fe30e6ebd309d6d24396d5350e8d4
                                            • Opcode Fuzzy Hash: 8f06fc03e41532ca5b0a05e7a0119cb7575dcb3cf368c3afc8c923dc2a594b74
                                            • Instruction Fuzzy Hash: 8C31C866A08B8982EB11CF95E4403A9A790FB45BE8F498631DF9D877DAEE3CD045D340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 1294909896-2901970132
                                            • Opcode ID: 2963d0671b70161468663b7bdc3d46495c8b6a5f4f70a29bc53403dd734bd104
                                            • Instruction ID: 5b3e879e122a6dc388a0d2c6c31325a43b390b4e68d4a293e23b6253fa9ad256
                                            • Opcode Fuzzy Hash: 2963d0671b70161468663b7bdc3d46495c8b6a5f4f70a29bc53403dd734bd104
                                            • Instruction Fuzzy Hash: A6318F66A0978E49EB159BE1A8451F927A6BF0578CF440835CE4E9B3CBFF3CE554A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: callocfreememcpystrchr
                                            • String ID: CAPA$Got unexpected pop3-server response
                                            • API String ID: 2887963327-1591402739
                                            • Opcode ID: 201f3c32be0abebb09fcfe128f2889ecaff817daab1915a220306004f407a3d4
                                            • Instruction ID: df9b3d990f80951d15d832bad902d1614596ec21f8b5d3e5efa33c5f93ccecad
                                            • Opcode Fuzzy Hash: 201f3c32be0abebb09fcfe128f2889ecaff817daab1915a220306004f407a3d4
                                            • Instruction Fuzzy Hash: 4931AF62B0978A91EB199FA5B4002B92394BF457D4F440135CA2E937DBFF3CE6A5E301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: 6f603f33f848ebba4556c22852868b21b3dd251d675c3a95975d4e36f17b5b88
                                            • Instruction ID: 5327955aac487528766e50858c350f2e9e5a6d594a59ac0514c81e691a3f79df
                                            • Opcode Fuzzy Hash: 6f603f33f848ebba4556c22852868b21b3dd251d675c3a95975d4e36f17b5b88
                                            • Instruction Fuzzy Hash: D231A066A0878E49EB149BE1A8451F927A6BF0578CF440875CE4E9B3CBFF3CE514A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                            • API String ID: 3061335427-2901970132
                                            • Opcode ID: bb4d56488f41999b2b9a4b6edf9b4030d84b897ccf009ae421a43553a3af00d7
                                            • Instruction ID: 2072f4f7e0130d1fdaca05d12d3321d27ed886be5a801589ce92fb039050ea5b
                                            • Opcode Fuzzy Hash: bb4d56488f41999b2b9a4b6edf9b4030d84b897ccf009ae421a43553a3af00d7
                                            • Instruction Fuzzy Hash: 4B31A062A0878E49EB149BE1A8451F927A6BF0578CF440835CE4E9B3CBFF3CE514A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$%s%lx$Signature
                                            • API String ID: 2190258309-1406629954
                                            • Opcode ID: 77be2812b9aa8131dd145d23130a352d1c51842506ecc649404dfcaa3bb354b8
                                            • Instruction ID: 5f6df906b67ada644320ba5cbed1b9d943ec8c71209af7e5ce06115fb911f6ae
                                            • Opcode Fuzzy Hash: 77be2812b9aa8131dd145d23130a352d1c51842506ecc649404dfcaa3bb354b8
                                            • Instruction Fuzzy Hash: F531D422B0868E45EE20CBA5E8442F963A5FF49B88F540431DE4E9779BFE3DE040D740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupcallocfree
                                            • String ID:
                                            • API String ID: 1236595397-0
                                            • Opcode ID: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                            • Instruction ID: 437f721c9c09f0c69ffe4d229202e5b0ca1e747fec9b59d070cb6b37f8b3670b
                                            • Opcode Fuzzy Hash: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                            • Instruction Fuzzy Hash: BC318836A04B8EC2EB51CB64E4503BD67A0EB86B88F184035DE4D477DAEF3DD5999700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 1294909896-517259162
                                            • Opcode ID: 6747ec776cf2ce8da402bad2bb84dfc54471b3caf19a89f9e193f5818a58486c
                                            • Instruction ID: e24c4e24a117bd83725c6a552c28194473f796e62abce1a6651f702017b0bbd6
                                            • Opcode Fuzzy Hash: 6747ec776cf2ce8da402bad2bb84dfc54471b3caf19a89f9e193f5818a58486c
                                            • Instruction Fuzzy Hash: 35318D52A0978E44EF159BA5A8401F927A1BF0578CF481875DE0E9B7DFFE3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3061335427-517259162
                                            • Opcode ID: 430c93e604ecb33b3ff84b76402e8b8dd37a4f1645805b06affe485f7e029d85
                                            • Instruction ID: 76f76a8c3480e2c53d585faeb093d9ebe5700d69a0162da0fed80e33f936e498
                                            • Opcode Fuzzy Hash: 430c93e604ecb33b3ff84b76402e8b8dd37a4f1645805b06affe485f7e029d85
                                            • Instruction Fuzzy Hash: D6319A62A0978E48EF158BA1A8401F927A1BF0578CF481875DE0E9B7DBFE3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                            • API String ID: 3061335427-517259162
                                            • Opcode ID: f38fd06d586284ddde5e18db3b0b80492eb2fbc1132887621bdcaf4423ed1ca7
                                            • Instruction ID: 81e58327f8dd46379d61b0d88d5316c05a1c68f1876e2e550b4f9f3ae2dfef82
                                            • Opcode Fuzzy Hash: f38fd06d586284ddde5e18db3b0b80492eb2fbc1132887621bdcaf4423ed1ca7
                                            • Instruction Fuzzy Hash: 16319A62A0978E48EF158BA1A8401F927A1BF0578CF481875DE0E9B7DFFE3CE154A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemalloc
                                            • String ID: OS/400$SITE NAMEFMT 1
                                            • API String ID: 3061335427-2049154998
                                            • Opcode ID: 924411b33166fe90b7481d7a5f125ceca56f5dad428a03f15fc2c6138f981451
                                            • Instruction ID: ba9baa6f7d505baf4c372f738481e65adb6d5264425fa8be7c22479e54e26cca
                                            • Opcode Fuzzy Hash: 924411b33166fe90b7481d7a5f125ceca56f5dad428a03f15fc2c6138f981451
                                            • Instruction Fuzzy Hash: A4318421A1C68A46F7B58B55A4503B823B4BF45798F904031CA9D977CFFE3CE546E701
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                            • String ID:
                                            • API String ID: 469868127-0
                                            • Opcode ID: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                            • Instruction ID: 24bea39599f589645ff50bf2479cebd4c59caea060f2cc0d0f232b296753e8aa
                                            • Opcode Fuzzy Hash: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                            • Instruction Fuzzy Hash: 25211D36609A4996E721DF96E9402697370FB89B90F044131DF8E83B95EF3DF4A59700
                                            APIs
                                              • Part of subcall function 00007FF63D8D4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF63D8D1B49), ref: 00007FF63D8D4341
                                              • Part of subcall function 00007FF63D8D3C30: memcpy.VCRUNTIME140 ref: 00007FF63D8D3C83
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D26E2
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D2730
                                            • __std_exception_copy.VCRUNTIME140 ref: 00007FF63D8D2780
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8D27CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                            • String ID: out_of_range
                                            • API String ID: 2484256320-3053435996
                                            • Opcode ID: ffcb1dd9954a8bed1128b9b45f87da7a32f8492f75755f77d0c05d6c16dedd1a
                                            • Instruction ID: 626d09225be366568b57cc274f6aaffaae1d79b23c7ef81c9756a28a89a8c9e2
                                            • Opcode Fuzzy Hash: ffcb1dd9954a8bed1128b9b45f87da7a32f8492f75755f77d0c05d6c16dedd1a
                                            • Instruction Fuzzy Hash: 34517372A18B4999FB00DFA5E8403AC3365FF447A8F405235DA6D52BD9EF78E1A5D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _errno_strdupstrcspnstrncmpstrspn
                                            • String ID: 0123456789abcdefABCDEF:.
                                            • API String ID: 2191890455-446397347
                                            • Opcode ID: a8a3a5dd2038b67971282b16d8888a121d149a91a9dbb00d32b5e69f4339c014
                                            • Instruction ID: b03f1616ff2a21e58476ca3fc8efdfb75d6a10600614fa035e85193f3245d641
                                            • Opcode Fuzzy Hash: a8a3a5dd2038b67971282b16d8888a121d149a91a9dbb00d32b5e69f4339c014
                                            • Instruction Fuzzy Hash: 1A41D423A0DACD45EF228FA498043B93799EB06794F480231DA8D877DBEF2CE455E701
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: isupper$free
                                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 573759493-632690687
                                            • Opcode ID: 1546a41c3cf0fa7789e2e6a29b1ef5ab1d392cc0b06c06d356420f0a5f695d78
                                            • Instruction ID: 90d59840edd6ccdb2ccabb7d9f12f4bd31b8bc676fb969177e66b2f9b02e6608
                                            • Opcode Fuzzy Hash: 1546a41c3cf0fa7789e2e6a29b1ef5ab1d392cc0b06c06d356420f0a5f695d78
                                            • Instruction Fuzzy Hash: 0941F7A1E4CA8EA5F711CBE594442B9BBA9EB45798F480131C68E827DFEF3CD545E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: tolower$_time64
                                            • String ID: :%u$Hostname in DNS cache was stale, zapped
                                            • API String ID: 4068448496-2924501231
                                            • Opcode ID: b3832e9ae83c2f818d8e5f20c02279ad86dc294354eb5af68b8479754fb5ab38
                                            • Instruction ID: 8a67ab0ebf1d126b2c20a831c3a4a8bf3a4098a31758028fc53e2bff5c1ed5cc
                                            • Opcode Fuzzy Hash: b3832e9ae83c2f818d8e5f20c02279ad86dc294354eb5af68b8479754fb5ab38
                                            • Instruction Fuzzy Hash: 9C41B56261868A95EB21DB51F4407BD67A5FB88B88F444231DE4E877D6EF3CE009D300
                                            APIs
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF63D8D11FA), ref: 00007FF63D8E075F
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF63D8D11FA), ref: 00007FF63D8E079C
                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF63D8D11FA), ref: 00007FF63D8E07A6
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8E07D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID: https://keyauth.win/api/1.2/
                                            • API String ID: 1775671525-3933380396
                                            • Opcode ID: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                            • Instruction ID: b39efa7e4d8cdb88814293b3d61c9e62be335f855c8c85e84936f0d26418bd0c
                                            • Opcode Fuzzy Hash: e4ce4394363e5324866952fb85af2f58288ab99f1bf50804098d43e406ae33b8
                                            • Instruction Fuzzy Hash: 793136A2B0975994EE109F92A9003696351EB04BD0F580A31DE5D4B7CAEF7DF061E700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$_close_openmalloc
                                            • String ID: Couldn't open file %s
                                            • API String ID: 3412525164-447283422
                                            • Opcode ID: 95857b77417a878704d7fdb905165e311696dfc49cd5d2f0f3364ef33b98184e
                                            • Instruction ID: a5b6ec61aea8674e3573a814a15186d1945c2cc0b6be18257e2c16b4758e3394
                                            • Opcode Fuzzy Hash: 95857b77417a878704d7fdb905165e311696dfc49cd5d2f0f3364ef33b98184e
                                            • Instruction Fuzzy Hash: EA418232A0CB8981EB148F65E84027AA7A5FB45BD4F18C131DA9D877DEEF7CE4459700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_errnofreememcpyrecv
                                            • String ID: Recv failure: %s
                                            • API String ID: 267823591-4276829032
                                            • Opcode ID: be7537aced1d6328b3c5947b8cb48486490fdd45464f7ecb243888b41117e164
                                            • Instruction ID: 1ef8a1c5d164d35fbfbcfc35803a0f434675e279effe01dab9105daf0f4ffa24
                                            • Opcode Fuzzy Hash: be7537aced1d6328b3c5947b8cb48486490fdd45464f7ecb243888b41117e164
                                            • Instruction Fuzzy Hash: 48319F72B06B4981EB50DFA2F8402A933A4BB58FD8F504135DE5D87385EE3CE466E340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                            • API String ID: 1865132094-195851662
                                            • Opcode ID: 427686f8d707d859e0364fb1270cb692fdecbdb31599b6ac3ad766ef55f4a22a
                                            • Instruction ID: e008319f8f4fb51ad644ea82ac82dbb4c9dc344b334bc55bd3dca9f8b7e6b4b4
                                            • Opcode Fuzzy Hash: 427686f8d707d859e0364fb1270cb692fdecbdb31599b6ac3ad766ef55f4a22a
                                            • Instruction Fuzzy Hash: 5D416122B1868A81E755CB66F4803B967A4EB84B88F4C4031EA4D87799EF7DE5A1D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfreestrpbrk
                                            • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                            • API String ID: 1812939018-579818044
                                            • Opcode ID: 85d63cd334a15fffc10c553eae93822cc61512cdc19f79a5e6d0144d017ae251
                                            • Instruction ID: 35a49533f38fd3b98ab01144c2b5a2319e92f4452d21d6d8df3e90cc955bc7da
                                            • Opcode Fuzzy Hash: 85d63cd334a15fffc10c553eae93822cc61512cdc19f79a5e6d0144d017ae251
                                            • Instruction Fuzzy Hash: CF31C462A18B8981EB01CB66E4403B9A3A4FB84BD4F484231EA9E437DAEF7CD545D300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %s: %s$FALSE$TRUE
                                            • API String ID: 1865132094-3430445539
                                            • Opcode ID: 27fd7b92b08e80c62ef846c0a086f2f778ba8bb1206fe5054450fd63a8227f2e
                                            • Instruction ID: de1b68812a9d960d2904a4eebc662549b4de5197c633861f9d3eaba7d049c3f9
                                            • Opcode Fuzzy Hash: 27fd7b92b08e80c62ef846c0a086f2f778ba8bb1206fe5054450fd63a8227f2e
                                            • Instruction Fuzzy Hash: 52018851A0C7CE95EB659B96E8453F51394BF06B94F444031CE4E833DBEE3CE185A300
                                            APIs
                                              • Part of subcall function 00007FF63D8D3D70: memcpy.VCRUNTIME140(?,?,0000000100000000,00007FF63D8E083D), ref: 00007FF63D8D3E22
                                              • Part of subcall function 00007FF63D8D3D70: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8D3E47
                                              • Part of subcall function 00007FF63D8D3D70: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,0000000100000000,00007FF63D8E083D), ref: 00007FF63D8D3E04
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8E0A50
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8E0A57
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8E0A5E
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8E0A65
                                            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF63D8E0A6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                            • String ID:
                                            • API String ID: 2318677668-0
                                            • Opcode ID: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                            • Instruction ID: 57ba2140720628e1ecf636e1f74649c4f4fad928c604c9eef98b751e6205255d
                                            • Opcode Fuzzy Hash: 5e99ca1bde4e1416277db961ec109b41f83edf1a84fdc12d99675d70987ffbfa
                                            • Instruction Fuzzy Hash: D161B572A08B8985EB10DFA1E8487BD3361EB45BC4F405431DA8D46BAAEF7DE494E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                            • API String ID: 1294909896-1891748601
                                            • Opcode ID: 64235b987dc4283eb39a3e46cb9056cdcaac1d29d970c9d48b0a8f2c00d34f7d
                                            • Instruction ID: 11e05d377ed8b2526f89681391a419c880665427885de04839818d66f6cb4d06
                                            • Opcode Fuzzy Hash: 64235b987dc4283eb39a3e46cb9056cdcaac1d29d970c9d48b0a8f2c00d34f7d
                                            • Instruction Fuzzy Hash: 3E51D562A0C68B51EA64D7B0A0413B96798BB413A4F400335CAAD977CBFF7CF449A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 3401966785-3412697401
                                            • Opcode ID: 602671d3a2d94d0c58c6a2817907598d8b60c771bcf79690e693e34a726910cb
                                            • Instruction ID: 8487c8dc56508c7bd3e1611acbb2db6a3b6ad4be47a98171dac1bd552414b147
                                            • Opcode Fuzzy Hash: 602671d3a2d94d0c58c6a2817907598d8b60c771bcf79690e693e34a726910cb
                                            • Instruction Fuzzy Hash: F84178A2A5969E15FF098A6585143782756EB41BF8F044631CA6EC77CFED2CE185E300
                                            APIs
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF63D92D5A0), ref: 00007FF63D92D64F
                                              • Part of subcall function 00007FF63D907900: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF63D8EA92A,?,?,?,?,?,?,?,00007FF63D8EA6F7), ref: 00007FF63D907911
                                              • Part of subcall function 00007FF63D907900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF63D907AB3
                                              • Part of subcall function 00007FF63D907900: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF63D907AD0
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF63D92D5A0), ref: 00007FF63D92D6BE
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF63D92D5A0), ref: 00007FF63D92D6D8
                                            • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF63D92D5A0), ref: 00007FF63D92D70E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_errno
                                            • String ID: xn--
                                            • API String ID: 2644425738-2826155999
                                            • Opcode ID: 0482d43a5dde45dd05f52a108a77ab978c10832de55e94877db1e2a1dabc5794
                                            • Instruction ID: b4234bf3bccce68894fd20f1c6ff40dc8f39851ed7562a08dba67608b6f80f1d
                                            • Opcode Fuzzy Hash: 0482d43a5dde45dd05f52a108a77ab978c10832de55e94877db1e2a1dabc5794
                                            • Instruction Fuzzy Hash: C841F391B1D68E05FB549BA199143B95689AF45FD4F488134DE4EC7BCBFE3CE0029340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: callocfreememset
                                            • String ID: CONNECT phase completed!$allocate connect buffer!
                                            • API String ID: 3505321882-591125384
                                            • Opcode ID: 19a2770aa77b3fa0689d2492ca67e253766b0bf91735c74c89d5515d28d14041
                                            • Instruction ID: da52428efe877e4a714efd833821274f83ac61583980d7aae2ffddfb6155487b
                                            • Opcode Fuzzy Hash: 19a2770aa77b3fa0689d2492ca67e253766b0bf91735c74c89d5515d28d14041
                                            • Instruction Fuzzy Hash: 1C517072A086CA92F71A8BAAE5443B973D4FB84B88F044035CB5D87395EF78F5659300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID: %s: %s
                                            • API String ID: 3401966785-1451338302
                                            • Opcode ID: 5bb74c90d2b924d3d46db183046a0a2a57736da918594bd6e258ae812eb30cc8
                                            • Instruction ID: baec89fa060a6c6d87b88d4675125c728f6be68253b42e9bc3ace47833cb2aa8
                                            • Opcode Fuzzy Hash: 5bb74c90d2b924d3d46db183046a0a2a57736da918594bd6e258ae812eb30cc8
                                            • Instruction Fuzzy Hash: ED417C91A492DD56FA288A8694193B55791FB46BE4F044236CEAF877CFFD2CE045B300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 2190258309-1663925961
                                            • Opcode ID: 8c86ff128ba9d3563ac51cb2b2091eae2cf1052a09e38ac452feb21dadc9144c
                                            • Instruction ID: 168a6673fc4bb2a098c1dd49ceda5c298ac7362f0142773b97cfe2e37ffa9fc9
                                            • Opcode Fuzzy Hash: 8c86ff128ba9d3563ac51cb2b2091eae2cf1052a09e38ac452feb21dadc9144c
                                            • Instruction Fuzzy Hash: D1218226B08ACA46EA10CB55E8442EA63A4FF45BD8F084532DE5D877DBEE3CD145D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Failure sending QUIT command: %s$QUIT
                                            • API String ID: 1294909896-1162443993
                                            • Opcode ID: 7d883075aae54850d3eb03df06446082c78f0e0411fe14da9346d1acb75fded0
                                            • Instruction ID: 8783c9740483692f35aedd56ccb4bd8a8ede435b0efe41d088f7a40b2de4b6be
                                            • Opcode Fuzzy Hash: 7d883075aae54850d3eb03df06446082c78f0e0411fe14da9346d1acb75fded0
                                            • Instruction Fuzzy Hash: AD319C32B08B8A81EB54DFA1A4413B933A8FB45B88F484131DA4D8B79AEF3CE141D340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$calloc$memcpy
                                            • String ID:
                                            • API String ID: 3478730034-0
                                            • Opcode ID: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                            • Instruction ID: d6f073a1fcda1dbf7519771014d5aaa4858722c2d3bc36433832e12ed8f608a9
                                            • Opcode Fuzzy Hash: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                            • Instruction Fuzzy Hash: 4B21E2B1A1978986E714EF51A81023977B0FF48BD0F444275DA9D973DAEF3CD4509700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$_strdupmalloc
                                            • String ID:
                                            • API String ID: 4236146995-0
                                            • Opcode ID: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                            • Instruction ID: 18e7dd5c24d2840b93b3a9e540c4df377ba1b4aa8bf042d981951676d00c5a07
                                            • Opcode Fuzzy Hash: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                            • Instruction Fuzzy Hash: EE21A462A15B8A81EB81CF65D4403A823E4EF45B54F0C0134DE4D8BB9AFF3DD590D320
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$malloc
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 2190258309-1663925961
                                            • Opcode ID: 80d941fe8a2562cfa1d9bd5d0ddd1395d7de46f75ffb7d469e30cae601067e19
                                            • Instruction ID: c5106427a3a56679d95acda5e978f499a3e4374e40202402fae283bb0422dfc4
                                            • Opcode Fuzzy Hash: 80d941fe8a2562cfa1d9bd5d0ddd1395d7de46f75ffb7d469e30cae601067e19
                                            • Instruction Fuzzy Hash: 08218666A08A8E46EA50DB95F8442FA63A4FF857C8F440431DE4E9779BFE3CD041D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: malloc$free
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1480856625-1663925961
                                            • Opcode ID: e9065b80354950d0c0a22d29add7bf103f3a31efd183f5bfd048baa5b73aabb4
                                            • Instruction ID: 03b369d9a4838cf60df559b6d2200776e6c937f77e3b11aeadd6b806dffbd977
                                            • Opcode Fuzzy Hash: e9065b80354950d0c0a22d29add7bf103f3a31efd183f5bfd048baa5b73aabb4
                                            • Instruction Fuzzy Hash: 82218466A08A8A86EB50CB95F8442EA63A4FF857C8F440472DE4D8779BFF3CD045D700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: malloc$free
                                            • String ID: Signature: %s$Signature
                                            • API String ID: 1480856625-1663925961
                                            • Opcode ID: 351cc430754a4aa9ce224d767375869e203a95fb4cbef21fa980b6650913238a
                                            • Instruction ID: 2ca8391411f16c924a3a526e06f34cbb29fd81a839d9d130d5696e45c57f5d24
                                            • Opcode Fuzzy Hash: 351cc430754a4aa9ce224d767375869e203a95fb4cbef21fa980b6650913238a
                                            • Instruction Fuzzy Hash: 21218466A08A8A86EB50CB95F8442EA63A4FF857C8F440432DE4E9779BFF3CD045D700
                                            APIs
                                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF63D8E2579), ref: 00007FF63D8E2EDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strncpy
                                            • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                            • API String ID: 3301158039-3625861382
                                            • Opcode ID: 87e7efae683d90ae9f7ffd3d2827c118d7d582aa4952cc6e8680895ff73779e2
                                            • Instruction ID: 7897013181aaaeaffd2bfdce198bb9cf88269ef8bf85262e85f648cabdb9e15d
                                            • Opcode Fuzzy Hash: 87e7efae683d90ae9f7ffd3d2827c118d7d582aa4952cc6e8680895ff73779e2
                                            • Instruction Fuzzy Hash: 48117752A0C69B41FB6987A8F95537832909F05780F486175C61E867D7EE7CF6D0A700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                            • String ID:
                                            • API String ID: 469868127-0
                                            • Opcode ID: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                            • Instruction ID: 6de3e528603bafee2800f647f3a2be902f0604870d15a7681e3b8747fcf02c5e
                                            • Opcode Fuzzy Hash: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                            • Instruction Fuzzy Hash: 67112836A09B49C6E7219F96E5402697370FB89B90F144131DF8E83B55EF39F4A59B00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: FALSE$TRUE
                                            • API String ID: 1865132094-1412513891
                                            • Opcode ID: 18f56905f20e121188a22abea656a85f17a1ee6d051de28b0ad6ada156964aaf
                                            • Instruction ID: 3363288b30bc2317660c38ae8b1b0f424a3396abaade179669467b8ad94c9660
                                            • Opcode Fuzzy Hash: 18f56905f20e121188a22abea656a85f17a1ee6d051de28b0ad6ada156964aaf
                                            • Instruction Fuzzy Hash: 0A41C5E2B4935D94FF158A99D4143BC2799AB057A9F484932CE5DC63CAFE3CE544A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _time64$ErrorLast
                                            • String ID: TFTP response timeout
                                            • API String ID: 3339832089-3820788777
                                            • Opcode ID: 8347cac327bb24b5d574b77b49ec0f6cd9e89f2d5a1a1fa804789b694d9cfef2
                                            • Instruction ID: 32d0f1b781ea018416f96fe10732f13f04e541d162b456db489b52934d3d1e50
                                            • Opcode Fuzzy Hash: 8347cac327bb24b5d574b77b49ec0f6cd9e89f2d5a1a1fa804789b694d9cfef2
                                            • Instruction Fuzzy Hash: FD41B132608A4981EB619FA6E8103BA2795EB49BA8F444231DE2D877DEFF3CD4459740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: fwrite
                                            • String ID: ...$...
                                            • API String ID: 3559309478-2253869979
                                            • Opcode ID: ce52080936e4f8e8d2536faf948e6cb61c3c5a059659c50af308800804d1eb0d
                                            • Instruction ID: 451292101959af15e635999c6ffa15d595d75620fcdbed2f63fd6f53c550f00d
                                            • Opcode Fuzzy Hash: ce52080936e4f8e8d2536faf948e6cb61c3c5a059659c50af308800804d1eb0d
                                            • Instruction Fuzzy Hash: 19310321A0DA8991EB24CB61E4047F963E5FB84B84F458231CA9E837D5EF3DE055D780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: acceptgetsocknameioctlsocket
                                            • String ID: Connection accepted from server$Error accept()ing server connect
                                            • API String ID: 36920154-2331703088
                                            • Opcode ID: 37eff06c670ceac0791a01fedf0a1c54ff6c4c3372e9d23781156f68b02f578b
                                            • Instruction ID: c2ad25a1a78aa88152d806e4be0e0936f24dbd73935027bdc367aa8e22e6b9f1
                                            • Opcode Fuzzy Hash: 37eff06c670ceac0791a01fedf0a1c54ff6c4c3372e9d23781156f68b02f578b
                                            • Instruction Fuzzy Hash: DE31B42170868986FB64DF61E4453AA7394FB88BE4F440231DA6D8B7CAEF7DE5059700
                                            APIs
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D903B69), ref: 00007FF63D9041BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: realloc
                                            • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                            • API String ID: 471065373-1365219457
                                            • Opcode ID: fd2de4368d3f59bb441b9b1cd9bd76850ec27dc8a676fb8f2278394dc7b74183
                                            • Instruction ID: 6ba86ff4b5702c3af63a99e624b2873f13c6e344863cbbabb6b37190e637294c
                                            • Opcode Fuzzy Hash: fd2de4368d3f59bb441b9b1cd9bd76850ec27dc8a676fb8f2278394dc7b74183
                                            • Instruction Fuzzy Hash: CA215C32B08A8886EB449B65F5402AD67A5FB49FC4F444036EF9D87B5ADF38D4A2D700
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %s%s$LIST "%s" *
                                            • API String ID: 0-1744359683
                                            • Opcode ID: 9ad9c9c743700dca674b2ef310e13197ed19483ca3184e6ea3a8d7b69f8cecd6
                                            • Instruction ID: 99e8f347f3f42ba7b82f1fad25d0bf08170c199dfc1868a8e23f931f65a367b9
                                            • Opcode Fuzzy Hash: 9ad9c9c743700dca674b2ef310e13197ed19483ca3184e6ea3a8d7b69f8cecd6
                                            • Instruction Fuzzy Hash: 8C115E22B1D64A81EB54CB95F9401B96360EF48FC4F484136EE0D87B9AFF3CE985A340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: strchr$mallocmemcpy
                                            • String ID:
                                            • API String ID: 320687583-0
                                            • Opcode ID: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                            • Instruction ID: 5087605957bc99fb25d3a401c78c9c761b1aa5ce065df484adc574f30328ce47
                                            • Opcode Fuzzy Hash: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                            • Instruction Fuzzy Hash: F621E211A0D79A41EE958B9165102B9A7D29F45BC8F4C8071EE8D8B7CFFE2CE616E310
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D9019B5), ref: 00007FF63D9015D8
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D9019B5), ref: 00007FF63D9015E1
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D9019B5), ref: 00007FF63D90165A
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D9019B5), ref: 00007FF63D90166B
                                            • memcpy.VCRUNTIME140(?,?,00000000,00007FF63D9019B5), ref: 00007FF63D901694
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$mallocmemcpy
                                            • String ID:
                                            • API String ID: 3401966785-0
                                            • Opcode ID: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                            • Instruction ID: a2bdd1aa07d3eb706ec1084b102e6552b1fd54b06b0d975ca797254cad2ba0ac
                                            • Opcode Fuzzy Hash: e5aaf608392412e8d4b9a1dc4236b9329a67fb2d8f166538309d8ae37baf092e
                                            • Instruction Fuzzy Hash: 6F315022A09B4981EB10DF91F9402A963A4EB49FE4F480631DE6ED77CAEF3CD454A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                            • API String ID: 1294909896-910067264
                                            • Opcode ID: 02a75f58ffacef6802f716bea87759d1f8428b31b63a0010405d9e98485556c6
                                            • Instruction ID: c610f4b8bd510f2fbe75e9d9d4641d9a20eae41ecb8299c67a5dd25ed0fe7c84
                                            • Opcode Fuzzy Hash: 02a75f58ffacef6802f716bea87759d1f8428b31b63a0010405d9e98485556c6
                                            • Instruction Fuzzy Hash: 645106F2A4C69E64EB11CBA5A9441B97BA9EB05798F444032CA4D827DEEF3CE545E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                            • API String ID: 1294909896-2632828617
                                            • Opcode ID: f60b2e51f519615eef786d8073e28d31358248af6a85787eb4334c3cf12e941d
                                            • Instruction ID: 7e3ee76e09b6ce73cd943f74821cf6be9639166873467f6127dde5b2e0dce9cc
                                            • Opcode Fuzzy Hash: f60b2e51f519615eef786d8073e28d31358248af6a85787eb4334c3cf12e941d
                                            • Instruction Fuzzy Hash: 6F41E561B0C69E89EB608B91A4442F9B795FB05794F444171CE4D837DAEF3CE846E300
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF63D90C9DB), ref: 00007FF63D92A88E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s
                                            • API String ID: 1294909896-3043279178
                                            • Opcode ID: e8563760c9da6c2e55638eb9222dc2312effe998e0ffc11f539499322c92f9db
                                            • Instruction ID: 21db645328951cad00bea38d830fe00be943f02d7281aea36c1709ec1c2dc4eb
                                            • Opcode Fuzzy Hash: e8563760c9da6c2e55638eb9222dc2312effe998e0ffc11f539499322c92f9db
                                            • Instruction Fuzzy Hash: D4418433A18B4982EB50CB56F4401AA77A4FB85BA4F140135DF9E47BA6EF3CE495D340
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF63D90E220,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF63D92ACC3
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D92AD4C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s
                                            • API String ID: 1294909896-3043279178
                                            • Opcode ID: dce2de37e97ba3121b39420a420f3ffe21f4b37a0ee740fa9a1d3028c897691b
                                            • Instruction ID: 172c5532474c98d02f0b7ec72fdb0240dd3234c97b9e884cc825d71020071340
                                            • Opcode Fuzzy Hash: dce2de37e97ba3121b39420a420f3ffe21f4b37a0ee740fa9a1d3028c897691b
                                            • Instruction Fuzzy Hash: E0419533618B8982EA51DB56F4401AAB3E4FB45B94F044235DF8D87BA6EF3CF0959700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1775671525-0
                                            • Opcode ID: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                            • Instruction ID: 66ec41d59798035687c9fdc1287985b50e46d5a9dd6f0779dbb27c8691a6826c
                                            • Opcode Fuzzy Hash: e60ed55956e50edfbe7ea8bb8067bec7a55e8f8f967eba0faf20a733e55885ad
                                            • Instruction Fuzzy Hash: FB31F52270978968EE149FAAA5042A8A351AF04BF0F580736DF6D477DAEF7CF051A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                            • API String ID: 1294909896-918878739
                                            • Opcode ID: cf9aa252f422a400f87b355d1684e97f3e4706dadaf5d5527515fc444d0a9930
                                            • Instruction ID: fddda13f0c187baf8ac15a4625a071720b0d962de1c7d30d94ada5abb47864a5
                                            • Opcode Fuzzy Hash: cf9aa252f422a400f87b355d1684e97f3e4706dadaf5d5527515fc444d0a9930
                                            • Instruction Fuzzy Hash: AB31B3B2A49B8DA4EB10CBA5E9402A97766FB457D8F484032CA4D877DEEF3CE545D300
                                            APIs
                                            • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF63D8D11FA), ref: 00007FF63D8E05B8
                                            • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF63D8D11FA), ref: 00007FF63D8E0659
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63D8E0677
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: memcpy$Concurrency::cancel_current_task
                                            • String ID:
                                            • API String ID: 326894585-0
                                            • Opcode ID: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                            • Instruction ID: 91e62f2ef573b515bc2e28bb82400fdc79aeceba188b3f2d559f3946909cd1ad
                                            • Opcode Fuzzy Hash: de1c6875f200540c7d25ef907db20005fdec5c9f83ccc6c164fa8115f0418b6c
                                            • Instruction Fuzzy Hash: CD21F762A0A75E45FA159BD1A5013382254AF44BE4F580B30DE6D4BBD6FF7CB4A2A700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                            • API String ID: 1294909896-1153420294
                                            • Opcode ID: c8d5e4a8ff85ba13f6c5b70e3070ea00d9005e9db9aac26ba7c889d65a3b0171
                                            • Instruction ID: c9248f9c4c9ff323b9930600761b5512c4c4198b8f20852ffbdfe12aecacc524
                                            • Opcode Fuzzy Hash: c8d5e4a8ff85ba13f6c5b70e3070ea00d9005e9db9aac26ba7c889d65a3b0171
                                            • Instruction Fuzzy Hash: 2231C462A0CB8D88EB649B91E4446E973A5FB49B94F544131CE4D873CBEF7CE549E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: TRUE
                                            • API String ID: 3056473165-3412697401
                                            • Opcode ID: 0a46df6ddcc284711443a9b7be861963df002ccb44c57c74328d9d386c14981d
                                            • Instruction ID: 8f914239920bad9c0b41fc4bf0d2649810062b6c65987489edde99dece061d74
                                            • Opcode Fuzzy Hash: 0a46df6ddcc284711443a9b7be861963df002ccb44c57c74328d9d386c14981d
                                            • Instruction Fuzzy Hash: 5C21C1A6B4974E54FF068A96A5143B82766AB45BF8F044532CD1E837CEEE7CE5819300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: isupper$_strdupfree
                                            • String ID:
                                            • API String ID: 3359907120-0
                                            • Opcode ID: c81d72406b07da167721bd56d756242438e8c37084d661deb41acdef60b828a0
                                            • Instruction ID: fe7b9cbff2f563ecc52dad5767e8c037eba0d6537c1aaf26808324996fb6b4cb
                                            • Opcode Fuzzy Hash: c81d72406b07da167721bd56d756242438e8c37084d661deb41acdef60b828a0
                                            • Instruction Fuzzy Hash: 5A212195E4D59E65FB12CBA488043786FA98B11B68F080530C1CEC1BDFEF2CD545E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID: %s: %s
                                            • API String ID: 3056473165-1451338302
                                            • Opcode ID: 5220cc3d17588d35cad3d5a67b2830ac868535652abc24202a45ac1b11bc70fb
                                            • Instruction ID: d03e4543c495261fd46be55d301314452a36c1b580664925d3752946d929b2a7
                                            • Opcode Fuzzy Hash: 5220cc3d17588d35cad3d5a67b2830ac868535652abc24202a45ac1b11bc70fb
                                            • Instruction Fuzzy Hash: B121D195B097C951FA659B87A9043B55395BF89FE4F044131CE5D87BCBEE3CE045A300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Start Date: %s$%s%lx$Start Date
                                            • API String ID: 1294909896-3519493645
                                            • Opcode ID: d226b40c569d856c120d596ceab6aaf83955d24eba0c30aa2b7f35493c273657
                                            • Instruction ID: ea8783710870c0803451103ba99f2da8dff91dea46503c994fda56a1cd916ddf
                                            • Opcode Fuzzy Hash: d226b40c569d856c120d596ceab6aaf83955d24eba0c30aa2b7f35493c273657
                                            • Instruction Fuzzy Hash: A221CB51A0D28E45EF148BA598546F967A2AF0578CF445871C90EDB7CBFF3DE154A300
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D923E99,00000000,?,?,00007FF63D923456), ref: 00007FF63D923159
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D923E99,00000000,?,?,00007FF63D923456), ref: 00007FF63D923190
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D923E99,00000000,?,?,00007FF63D923456), ref: 00007FF63D9231A2
                                            • memcpy.VCRUNTIME140(?,?,?,00007FF63D923E99,00000000,?,?,00007FF63D923456), ref: 00007FF63D9231CA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpyrealloc
                                            • String ID:
                                            • API String ID: 3881842442-0
                                            • Opcode ID: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                            • Instruction ID: 81d7c44d62dd6d9dd7d4613d897de51ebf98efd278f24e5d157bba7ad527953c
                                            • Opcode Fuzzy Hash: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                            • Instruction Fuzzy Hash: 1F218E26A19B8582DB44CF66F49022963A0FB48FC8B488435DE5E4779EEF3CC492C300
                                            APIs
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F04B9,?,?,?,?,00007FF63D8EF85B), ref: 00007FF63D90BF68
                                            • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF63D8F04B9,?,?,?,?,00007FF63D8EF85B), ref: 00007FF63D90BF8E
                                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F04B9,?,?,?,?,00007FF63D8EF85B), ref: 00007FF63D90BFAF
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63D8F04B9,?,?,?,?,00007FF63D8EF85B), ref: 00007FF63D90BFC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: realloc$EnvironmentVariablefree
                                            • String ID:
                                            • API String ID: 2828309815-0
                                            • Opcode ID: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                            • Instruction ID: 0baf70e332cb85709e712f6dd0239ae779d5bdbe25e464e1f68123d171134241
                                            • Opcode Fuzzy Hash: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                            • Instruction Fuzzy Hash: F3118A21B0D74681E661AB92B540239A291FF4CBCCF140435DE5D83BDEEE3DE4406B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID: Proxy-Connection: Keep-Alive
                                            • API String ID: 1294909896-2835282938
                                            • Opcode ID: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                            • Instruction ID: 524ff0b656a1cd395862bc60cac09233093b9a5460966cafc892576d007e1a97
                                            • Opcode Fuzzy Hash: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                            • Instruction Fuzzy Hash: ED019B61F1574942FA159B95B8403B96290AF84BF0F044230DEBD877DAFF3CD4999340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree$strchr
                                            • String ID:
                                            • API String ID: 1739957132-0
                                            • Opcode ID: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                            • Instruction ID: aab17445936796c64c8eaf70a2f82e1c3ddd2eeee8e19ccc0f4fe98c73c230af
                                            • Opcode Fuzzy Hash: 7cab5db05de9ca3a6ba704ce4dbf99f699dd45310a38cd1de36bc81fa6730da7
                                            • Instruction Fuzzy Hash: 3601B161F1D78942FF698BD6755003852A0AF49BD8F080074EE5E83BCEFEACD885A340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$CriticalDeleteSectionclosesocket
                                            • String ID:
                                            • API String ID: 3086658127-0
                                            • Opcode ID: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                            • Instruction ID: d0ffe444e1b7b9219ae5127e9c5c34458c462fc592e3b6745c9efcba7925227e
                                            • Opcode Fuzzy Hash: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                            • Instruction Fuzzy Hash: 59017513D29B8683EB15CFB5D8201782320FFE9F6CB056325DD6D812EAAF78A5D49200
                                            APIs
                                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF63D90C8C3), ref: 00007FF63D90CFB2
                                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF63D90C8C3), ref: 00007FF63D90D003
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupmalloc
                                            • String ID: (){ %*]
                                            • API String ID: 3515966317-731572209
                                            • Opcode ID: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                            • Instruction ID: e1d3683263d038d4b13b884db7b1ac2eb5296494b1072cea72aa38fb5f82aa0a
                                            • Opcode Fuzzy Hash: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                            • Instruction Fuzzy Hash: 95315912A0D68E54FF214BA574403792BD19F5ABD4F588131FB8E837CBEE2DA805E312
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: %ld
                                            • API String ID: 1865132094-1112595699
                                            • Opcode ID: b684a0f3a4480ac4010a0a53c987e4e88761b27135ebecd2b2aaf6e1a6ffc4de
                                            • Instruction ID: d093e96e421f6471360105fc2ea40e9e498efc613d14be94b598bae906ff02e4
                                            • Opcode Fuzzy Hash: b684a0f3a4480ac4010a0a53c987e4e88761b27135ebecd2b2aaf6e1a6ffc4de
                                            • Instruction Fuzzy Hash: 69318122E09A4A89FB76CB90A5603BA23E4AF44B54F494075DE5D837CAFF3CE444E710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupmalloc
                                            • String ID: identity
                                            • API String ID: 3515966317-1788209604
                                            • Opcode ID: 8690c95090deaf51d2efd87eea583d13a7b5cf8f3fd27f35376c74de60e9b24e
                                            • Instruction ID: 921dbcbac96d0bdf91ce90041be6f4d910ae16b741ab57f2167da1ac2fcea89b
                                            • Opcode Fuzzy Hash: 8690c95090deaf51d2efd87eea583d13a7b5cf8f3fd27f35376c74de60e9b24e
                                            • Instruction Fuzzy Hash: 68318165A09A4A81EB518B55E9403B967A4BF44FF8F194231CEAD833D9FE3CE4519300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: mallocrealloc
                                            • String ID:
                                            • API String ID: 948496778-3916222277
                                            • Opcode ID: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                            • Instruction ID: 0298780055c8f01e8c782168ba8247b6062eed218affaf03c38b01667bde8534
                                            • Opcode Fuzzy Hash: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                            • Instruction Fuzzy Hash: CA11D0B260AB8182DB549F55F00026973B4FB18FD4F484A35DA5E47789EF3CE8A0C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: getsockoptsetsockopt
                                            • String ID: @
                                            • API String ID: 194641219-2726393805
                                            • Opcode ID: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                            • Instruction ID: ca7d0907b25e518272a4f969c55ecf2487367a23ec4ce23cfede41909aab7b3d
                                            • Opcode Fuzzy Hash: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                            • Instruction Fuzzy Hash: AC1142B1A0828A86F720CF90F804669B7E4FF85758F544034DA48877DAEF7DE589DB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfree
                                            • String ID: TRUE
                                            • API String ID: 1865132094-3412697401
                                            • Opcode ID: b9bcba089e7daf5a5108d1bf9e552f43ea53acd441afa2f1c8325fcdf4de783d
                                            • Instruction ID: fd85170d8d212f70e5ab5f232039c60c58d53861255bea1e22b92b6f952d3906
                                            • Opcode Fuzzy Hash: b9bcba089e7daf5a5108d1bf9e552f43ea53acd441afa2f1c8325fcdf4de783d
                                            • Instruction Fuzzy Hash: DE019EB2A4A65D94FB028B95E9102782766BB05BE8F444432CE1E863CAEE3CD585E300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: _strdupfreemalloc
                                            • String ID: %s: %s
                                            • API String ID: 3985033223-1451338302
                                            • Opcode ID: c54095af87d9a4b0217f03e264ff0f02705c9544dec9f5f692171f7663123aa3
                                            • Instruction ID: 1f4074a8e67b987448deb4bf98986fdeb0e99f499a7b965cbcfd6a3d6559646a
                                            • Opcode Fuzzy Hash: c54095af87d9a4b0217f03e264ff0f02705c9544dec9f5f692171f7663123aa3
                                            • Instruction Fuzzy Hash: 65F0AF91A0C78986EA619782B8047E51394BF4ABD4F480031CE5E873DBAF3CE585A300
                                            APIs
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5757
                                              • Part of subcall function 00007FF63D8E5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D8EFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF63D8E1B61), ref: 00007FF63D8E5763
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EBC36
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EBC46
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF63D8EBC54
                                            • memset.VCRUNTIME140 ref: 00007FF63D8EBC8F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free$memset
                                            • String ID:
                                            • API String ID: 2717317152-0
                                            • Opcode ID: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                            • Instruction ID: 2b91ab523b66f65f6ba60fd184d1ddaae99919091987bbfcb2ec28aa0ec7fd26
                                            • Opcode Fuzzy Hash: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                            • Instruction Fuzzy Hash: 99212F32E28B95A3E704CB22DA402A87360FB99744F51A225EB9C43B52EF74F1F1D700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                            • Instruction ID: 9ab39fd6dfc0d88450b3938af1ca61b5ec4deac5b43ac57a97783a90d1fc24f8
                                            • Opcode Fuzzy Hash: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                            • Instruction Fuzzy Hash: 5411FE36A18A4981EB54DFA5E89023C63B4FF94F98F144131CA5E837AADF3CD895E340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                            • Instruction ID: 8784115a0c41c7da99867dc442e4ad70d98034360d74efdca0372c9c5c9f7275
                                            • Opcode Fuzzy Hash: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                            • Instruction Fuzzy Hash: 9F113A36624B44C6D750DF65E58026873A4FB84F88F084075DF8E97369CF38E899D740
                                            APIs
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D92093E), ref: 00007FF63D924866
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D92093E), ref: 00007FF63D924887
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D92093E), ref: 00007FF63D9248A2
                                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF63D92093E), ref: 00007FF63D9248B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2278030298.00007FF63D8D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63D8D0000, based on PE: true
                                            • Associated: 00000000.00000002.2278010747.00007FF63D8D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278086593.00007FF63D931000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278117777.00007FF63D948000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2278139919.00007FF63D949000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff63d8d0000_J1un7vGf29.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                            • Instruction ID: 9fe705b38f9aded912717ec534cc1cb04a82888d111eb5853e0a09934e0bce32
                                            • Opcode Fuzzy Hash: 2124235a9113e76acb7eecb01da0754f535a2c886931aa00cef68c70ac2a9cfc
                                            • Instruction Fuzzy Hash: 7F11B736624B4982EB14DF66E89003C73B4FF95F887104066CE5D83BAADF38D895E380