Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
flX5YA1C09.exe

Overview

General Information

Sample name:flX5YA1C09.exe
renamed because original name is a hash value
Original sample name:2ab72b91ce16dd1252e5a054ac75752e.exe
Analysis ID:1538243
MD5:2ab72b91ce16dd1252e5a054ac75752e
SHA1:a9b72d4e2e3ced63e58d36e11d0bf5e8a3132f0f
SHA256:ef1550c124e6a450ffce5f4ffe0313962c73e2169b7f6e4b289bafa386912400
Tags:64exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • flX5YA1C09.exe (PID: 1468 cmdline: "C:\Users\user\Desktop\flX5YA1C09.exe" MD5: 2AB72B91CE16DD1252E5A054AC75752E)
    • conhost.exe (PID: 5100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6288 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2096 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5332 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6684 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6048 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5156 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 368 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5956 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 4416 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2760 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5260 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 4080 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3552 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3200 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6436 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5828 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1924 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2096 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6288 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5732 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5160 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5256 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5936 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 368 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2760 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4416 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 672 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3552 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3416 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6436 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3200 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5328 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5756 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 3984 cmdline: C:\Windows\system32\WerFault.exe -u -p 1468 -s 1012 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: flX5YA1C09.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: flX5YA1C09.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791569F8D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF791569F8D
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791569280 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF791569280
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156C260 CryptHashData,0_2_00007FF79156C260
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156C270 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF79156C270
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156C210 CryptAcquireContextA,CryptCreateHash,0_2_00007FF79156C210
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791586440 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF791586440
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791569350 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF791569350
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791585B20 CertOpenStore,GetLastError,CertCreateCertificateChainuser,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainuser,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF791585B20
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158CE90 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF79158CE90
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158EF80 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF79158EF80
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF79154F130
Source: flX5YA1C09.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF791578B50
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49721 version: TLS 1.2
Source: flX5YA1C09.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant ESP\x64\Release\EpicGames.pdb source: flX5YA1C09.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791541580 rand,rand,rand,SetConsoleTitleA,_invalid_parameter_noinfo_noreturn,GetConsoleWindow,GetWindowLongPtrA,SetWindowLongPtrA,SetLayeredWindowAttributes,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z,URLDownloadToFileA,system,system,Sleep,exit,URLDownloadToFileA,system,system,Sleep,exit,_invalid_parameter_noinfo_noreturn,0_2_00007FF791541580
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: flX5YA1C09.exeString found in binary or memory: http://185.101.104.122/esphvciforabronkz.exe
Source: flX5YA1C09.exeString found in binary or memory: http://185.101.104.122/esphvciforabronkz.exeC:
Source: flX5YA1C09.exeString found in binary or memory: http://185.101.104.122/esphvcionbronkz.exe
Source: flX5YA1C09.exeString found in binary or memory: http://185.101.104.122/esphvcionbronkz.exeC:
Source: Amcache.hve.38.drString found in binary or memory: http://upx.sf.net
Source: flX5YA1C09.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: flX5YA1C09.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/64
Source: flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ITECT
Source: flX5YA1C09.exe, flX5YA1C09.exe, 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmp, flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/gramW
Source: flX5YA1C09.exe, 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/p
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49721 version: TLS 1.2
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158CE90 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF79158CE90
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915415800_2_00007FF791541580
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79155F5E00_2_00007FF79155F5E0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915589D00_2_00007FF7915589D0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915569D00_2_00007FF7915569D0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791557D100_2_00007FF791557D10
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791569F8D0_2_00007FF791569F8D
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79157D2700_2_00007FF79157D270
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79153D2A00_2_00007FF79153D2A0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915654300_2_00007FF791565430
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915533800_2_00007FF791553380
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915506500_2_00007FF791550650
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156C6200_2_00007FF79156C620
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915795700_2_00007FF791579570
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915816000_2_00007FF791581600
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915805D00_2_00007FF7915805D0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915395AD0_2_00007FF7915395AD
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915598900_2_00007FF791559890
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915628E00_2_00007FF7915628E0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79153978B0_2_00007FF79153978B
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791574A400_2_00007FF791574A40
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915489E00_2_00007FF7915489E0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79153AC4D0_2_00007FF79153AC4D
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791567D100_2_00007FF791567D10
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791585B200_2_00007FF791585B20
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79153EBC00_2_00007FF79153EBC0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158CE900_2_00007FF79158CE90
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79153DE300_2_00007FF79153DE30
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158EF100_2_00007FF79158EF10
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156A04C0_2_00007FF79156A04C
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79156A0550_2_00007FF79156A055
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915310000_2_00007FF791531000
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791558ED0 appears 36 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF7915559C0 appears 381 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791555B40 appears 327 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF79155A460 appears 34 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791543080 appears 49 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791558E00 appears 46 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF79155A2F0 appears 37 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791590286 appears 47 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF79155A380 appears 33 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: String function: 00007FF791550290 appears 70 times
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1468 -s 1012
Source: classification engineClassification label: mal56.evad.winEXE@67/22@1/2
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791542690 GetLastError,_errno,FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF791542690
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1468
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5100:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8dd36976-5025-4431-9558-94be19ff8c12Jump to behavior
Source: flX5YA1C09.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\flX5YA1C09.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: flX5YA1C09.exeReversingLabs: Detection: 26%
Source: flX5YA1C09.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\flX5YA1C09.exe "C:\Users\user\Desktop\flX5YA1C09.exe"
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1468 -s 1012
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: flX5YA1C09.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: flX5YA1C09.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: flX5YA1C09.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant ESP\x64\Release\EpicGames.pdb source: flX5YA1C09.exe
Source: flX5YA1C09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: flX5YA1C09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: flX5YA1C09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: flX5YA1C09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: flX5YA1C09.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915586B0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7915586B0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79154C3F4 push rax; ret 0_2_00007FF79154C3F5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Users\user\Desktop\flX5YA1C09.exeAPI coverage: 4.3 %
Source: Amcache.hve.38.drBinary or memory string: VMware
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.38.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.38.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.38.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.38.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.38.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.38.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.38.drBinary or memory string: vmci.sys
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.38.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.38.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: VMware20,1
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.38.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.38.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.38.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.38.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.38.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.38.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791590138 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF791590138
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791590138 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF791590138
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF7915586B0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7915586B0
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158FA44 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF79158FA44
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158FD9C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79158FD9C
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158FF44 SetUnhandledExceptionFilter,0_2_00007FF79158FF44
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\flX5YA1C09.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79158FFB4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF79158FFB4
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791564AB0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF791564AB0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791557680 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF791557680
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79157B54D calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF79157B54D
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF79157B7A0 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF79157B7A0
Source: C:\Users\user\Desktop\flX5YA1C09.exeCode function: 0_2_00007FF791574A40 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF791574A40
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538243 Sample: flX5YA1C09.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 56 34 keyauth.win 2->34 40 Multi AV Scanner detection for submitted file 2->40 42 Machine Learning detection for sample 2->42 44 AI detected suspicious sample 2->44 8 flX5YA1C09.exe 1 2->8         started        signatures3 process4 dnsIp5 36 keyauth.win 172.67.72.57, 443, 49721 CLOUDFLARENETUS United States 8->36 38 127.0.0.1 unknown unknown 8->38 11 WerFault.exe 19 16 8->11         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 17 other processes 8->18 process6 file7 32 C:\ProgramData\Microsoft\...\Report.wer, Unicode 11->32 dropped 20 taskkill.exe 1 14->20         started        22 taskkill.exe 1 16->22         started        24 taskkill.exe 1 18->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 10 other processes 18->30 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
flX5YA1C09.exe26%ReversingLabsWin64.Trojan.Generic
flX5YA1C09.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    keyauth.win
    172.67.72.57
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://keyauth.win/api/1.1/false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.101.104.122/esphvciforabronkz.exeflX5YA1C09.exefalse
            unknown
            https://keyauth.win/api/1.1/ITECTflX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.101.104.122/esphvcionbronkz.exeflX5YA1C09.exefalse
                unknown
                https://keyauth.win/api/1.1/64flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://185.101.104.122/esphvcionbronkz.exeC:flX5YA1C09.exefalse
                    unknown
                    http://upx.sf.netAmcache.hve.38.drfalse
                    • URL Reputation: safe
                    unknown
                    https://keyauth.win/api/1.2/gramWflX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://185.101.104.122/esphvciforabronkz.exeC:flX5YA1C09.exefalse
                        unknown
                        https://keyauth.win/api/1.2/pflX5YA1C09.exe, 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpfalse
                          unknown
                          https://curl.haxx.se/docs/http-cookies.htmlflX5YA1C09.exefalse
                          • URL Reputation: safe
                          unknown
                          https://curl.haxx.se/docs/http-cookies.html#flX5YA1C09.exefalse
                            unknown
                            https://keyauth.win/api/1.2/flX5YA1C09.exe, flX5YA1C09.exe, 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmp, flX5YA1C09.exe, 00000000.00000002.2311388651.0000016082A2C000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              172.67.72.57
                              keyauth.winUnited States
                              13335CLOUDFLARENETUSfalse
                              IP
                              127.0.0.1
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1538243
                              Start date and time:2024-10-20 21:20:10 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 39s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:41
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:flX5YA1C09.exe
                              renamed because original name is a hash value
                              Original Sample Name:2ab72b91ce16dd1252e5a054ac75752e.exe
                              Detection:MAL
                              Classification:mal56.evad.winEXE@67/22@1/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 42
                              • Number of non-executed functions: 218
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 52.182.143.212
                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, ocsp.edge.digicert.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • VT rate limit hit for: flX5YA1C09.exe
                              TimeTypeDescription
                              15:21:21API Interceptor1x Sleep call for process: WerFault.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              172.67.72.57Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                    fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                              aj.exeGet hashmaliciousUnknownBrowse
                                                Loader (3).exeGet hashmaliciousUnknownBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  keyauth.winG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  fp2e7a.wpc.phicdn.netfile.exeGet hashmaliciousUnknownBrowse
                                                  • 192.229.221.95
                                                  SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 192.229.221.95
                                                  SecuriteInfo.com.PUA.Tool.RemoteControl.20.4973.23208.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 192.229.221.95
                                                  SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 192.229.221.95
                                                  SecuriteInfo.com.PUA.Tool.RemoteControl.20.4973.23208.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 192.229.221.95
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                  • 192.229.221.95
                                                  http://kongtuke.comGet hashmaliciousUnknownBrowse
                                                  • 192.229.221.95
                                                  whrbuflqwhah.exeGet hashmaliciousUnknownBrowse
                                                  • 192.229.221.95
                                                  76Kobq8opu.exeGet hashmaliciousUnknownBrowse
                                                  • 192.229.221.95
                                                  2WWOAq4c3b.exeGet hashmaliciousLummaCBrowse
                                                  • 192.229.221.95
                                                  bg.microsoft.map.fastly.netsims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                  • 199.232.210.172
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 199.232.214.172
                                                  http://kongtuke.comGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  76Kobq8opu.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  76Kobq8opu.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.214.172
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 199.232.210.172
                                                  https://sub.investorscabirigroup.com/4WQbos10596ktJI775idiwtbqpkk1528WGTFCWTFRKDXPVO305927/749609o14Get hashmaliciousPhisherBrowse
                                                  • 199.232.214.172
                                                  SecuriteInfo.com.Win64.MalwareX-gen.9093.5876.exeGet hashmaliciousUnknownBrowse
                                                  • 199.232.210.172
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  sims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.75.40
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.206.204
                                                  RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                  • 104.26.12.205
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0eG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                  • 172.67.72.57
                                                  gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  ojSv9FmOwn.lnkGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  a1OueQJq4d.exeGet hashmaliciousDCRatBrowse
                                                  • 172.67.72.57
                                                  oIDX88LpSs.exeGet hashmaliciousXWormBrowse
                                                  • 172.67.72.57
                                                  hKWBNgRd7p.exeGet hashmaliciousXWormBrowse
                                                  • 172.67.72.57
                                                  No context
                                                  Process:C:\Windows\System32\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9989196732181074
                                                  Encrypted:false
                                                  SSDEEP:96:74FmXAJ6PsBh8z75fQbQXIDcQNc6GcEOcw3X+HbHg/8BRTf3o8Fa9KifQvH+DFdO:s4G6Pf0jCUAjvVm8zuiFVZ24lO8L
                                                  MD5:D4EEA43C6D13EEB3C3DA1A888F6EADF3
                                                  SHA1:3B2AA851D572D4CC7EFA3668A9B8E4C81B335B0C
                                                  SHA-256:1A06BB69A0B9711B750E2B4C346A6861A1647D73F9FF80B1EA26B4289BD43E84
                                                  SHA-512:0F8D02CC1CC21527DC2825541AF33879998C4F5951482698B0EB1CA9C413FE8539E1570FCDFA7572244B7715CAFC6A868313564A6503E860AB7DAD5268F9501D
                                                  Malicious:true
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.5.6.7.6.0.4.0.2.1.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.5.6.7.6.7.1.2.0.9.3.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.a.4.8.e.a.0.-.4.b.d.8.-.4.f.b.0.-.9.f.d.2.-.b.2.6.a.7.4.e.9.2.6.a.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.3.1.1.e.2.1.1.-.f.7.c.3.-.4.4.9.b.-.8.6.0.a.-.b.f.5.f.3.9.b.1.c.c.b.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.f.l.X.5.Y.A.1.C.0.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.b.c.-.0.0.0.1.-.0.0.1.5.-.e.4.9.1.-.4.d.3.6.2.5.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.e.7.8.0.b.b.2.8.9.6.8.6.9.2.0.4.7.d.4.7.8.e.a.c.f.3.9.a.4.e.f.0.0.0.0.f.f.f.f.!.0.0.0.0.a.9.b.7.2.d.4.e.2.e.3.c.e.d.6.3.e.5.8.d.3.6.e.1.1.d.0.b.f.5.e.8.a.3.1.3.2.f.0.f.!.f.l.X.5.Y.A.1.C.0.9...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.8.
                                                  Process:C:\Windows\System32\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:21:16 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):106948
                                                  Entropy (8bit):1.6017360298464471
                                                  Encrypted:false
                                                  SSDEEP:384:0JKKOFDj81+20DMjbnRafpqwSRuKLBIihjj+kJAkBYpmrIrbW:gyf8s20HSRuKLBLjVKpm0b
                                                  MD5:4529676BF936B99A49941F7220BB959F
                                                  SHA1:F314297396CD324BB9CCA7B179C6CFB2A5ED288B
                                                  SHA-256:51C7F271E180FEBA698820B6ECF9D0A330E55EDAD0547CDC80D9187E0719254D
                                                  SHA-512:CA9984D5D6FFAA07F6325F91AC034FB6DF41952CA326C3A2259BEBEEF8F7AE04BB422CA59FDD751E02F5E2A50AAB26AF1FAF6D31A8F07B61CA9FAE3079B535DC
                                                  Malicious:false
                                                  Preview:MDMP..a..... .......,X.g............$...............,............J..........T.......8...........T...........p'..Tz.......................!..............................................................................eJ......T"......Lw......................T..........."X.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\System32\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):10138
                                                  Entropy (8bit):3.7148182515668258
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJmFaO6Y2D1Kphkgmf9+pr+89bC0h+f3Qim:R6lXJM16YgKpCgmf98BIfS
                                                  MD5:ABC89B928323F66B6223D326BF32946E
                                                  SHA1:59249ED0C5C239FA9D6C98F003B2F182625AEC5F
                                                  SHA-256:AE73307E20511B2868F882FD54EB55A417E6DFE3B32530F996F518A7A626600F
                                                  SHA-512:DE004C5AF18A65B473CF8B88E7E12E632B0CE3F1DD1C39D57301648358BF72F161075A8819D5FFC6A689507C3B2A40FC69C40534C14D13A17A54634A2FD9CD5D
                                                  Malicious:false
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.6.8.<./.P.i.
                                                  Process:C:\Windows\System32\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4645
                                                  Entropy (8bit):4.467744226737068
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zskJg771I9bQWpW8VYlYm8M4J1QmeQXZFVpmyq85lQ1QNl/iXjHOd:uIjfiI78p7VFJakZpmTaPiXjHOd
                                                  MD5:32F0003900DCE39DCEBD21FE39ADDA36
                                                  SHA1:88B521D67069882C318ED1D84D60F9CBB37F4F85
                                                  SHA-256:133D333FAA4C19FC12517A394580078DADD139C1639B275FAD939DFDF1571CC7
                                                  SHA-512:4B082A57F83FD62FFDF90D4EABB4C0AD7057F23429D82F920C8CB43BE22198F4F3E72C96B7F3DB2057CF2E449803FC4C2D8632BF423D95B857FDA6B1B6A7BFC8
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552143" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\System32\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.468735284041842
                                                  Encrypted:false
                                                  SSDEEP:6144:YzZfpi6ceLPx9skLmb0fxZWSP3aJG8nAgeiJRMMhA2zX4WABluuNSjDH5S:OZHtxZWOKnMM6bFpYj4
                                                  MD5:77E3835604A82A39AB556865220851D4
                                                  SHA1:EBF4C8D0E2FB8621875B5D2C5C866443C5105222
                                                  SHA-256:D1ADE13663A813BA8C878F3F192B291F631E8132A793018988B9A29A5139DFF5
                                                  SHA-512:444E94997467B5E790B8EE6268C2451906F967C323C4DBC9E97BD0F5ACA0A9734E2C0C142CB30708199656322AE9A6E69A6898D2A8BD6D8766D2E387415D4539
                                                  Malicious:false
                                                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...;%#.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\System32\cmd.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):44
                                                  Entropy (8bit):4.003997527334849
                                                  Encrypted:false
                                                  SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                                  MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                                  SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                                  SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                                  SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                                  Malicious:false
                                                  Preview:The system cannot find the file specified...
                                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                                  Entropy (8bit):6.423212701081575
                                                  TrID:
                                                  • Win64 Executable Console (202006/5) 92.65%
                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                  • DOS Executable Generic (2002/1) 0.92%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:flX5YA1C09.exe
                                                  File size:506'368 bytes
                                                  MD5:2ab72b91ce16dd1252e5a054ac75752e
                                                  SHA1:a9b72d4e2e3ced63e58d36e11d0bf5e8a3132f0f
                                                  SHA256:ef1550c124e6a450ffce5f4ffe0313962c73e2169b7f6e4b289bafa386912400
                                                  SHA512:83f8a0b269ce7755f973c0e67c5bb7ce7b8d62e4b534b8663d663168a1aaa5d8c1adaf5cfb122a3e2555464f4a7c939c3544d0b34c85aaa91d905fe951fb4e0c
                                                  SSDEEP:12288:EcRxIa0CO71s6Hxw2KJrSddWzF1H43DPb6+:EoxIoOhlG2KJ2WR+Pb6
                                                  TLSH:5BB46D96A7A807E9D1A7C03CC547C603E7B6B4991311DBDB43A4CA791F637E12E3A720
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x14005fa28
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x140000000
                                                  Subsystem:windows cui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x671280FD [Fri Oct 18 15:38:37 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                                  Instruction
                                                  dec eax
                                                  sub esp, 28h
                                                  call 00007F58B90800E8h
                                                  dec eax
                                                  add esp, 28h
                                                  jmp 00007F58B907F9D7h
                                                  int3
                                                  int3
                                                  jmp 00007F58B9080398h
                                                  int3
                                                  int3
                                                  int3
                                                  inc eax
                                                  push ebx
                                                  dec eax
                                                  sub esp, 20h
                                                  dec eax
                                                  mov ebx, ecx
                                                  xor ecx, ecx
                                                  call dword ptr [0000173Bh]
                                                  dec eax
                                                  mov ecx, ebx
                                                  call dword ptr [000016A2h]
                                                  call dword ptr [00001724h]
                                                  dec eax
                                                  mov ecx, eax
                                                  mov edx, C0000409h
                                                  dec eax
                                                  add esp, 20h
                                                  pop ebx
                                                  dec eax
                                                  jmp dword ptr [00001720h]
                                                  dec eax
                                                  mov dword ptr [esp+08h], ecx
                                                  dec eax
                                                  sub esp, 38h
                                                  mov ecx, 00000017h
                                                  call dword ptr [00001714h]
                                                  test eax, eax
                                                  je 00007F58B907FB69h
                                                  mov ecx, 00000002h
                                                  int 29h
                                                  dec eax
                                                  lea ecx, dword ptr [00018DC2h]
                                                  call 00007F58B907FD2Eh
                                                  dec eax
                                                  mov eax, dword ptr [esp+38h]
                                                  dec eax
                                                  mov dword ptr [00018EA9h], eax
                                                  dec eax
                                                  lea eax, dword ptr [esp+38h]
                                                  dec eax
                                                  add eax, 08h
                                                  dec eax
                                                  mov dword ptr [00018E39h], eax
                                                  dec eax
                                                  mov eax, dword ptr [00018E92h]
                                                  dec eax
                                                  mov dword ptr [00018D03h], eax
                                                  dec eax
                                                  mov eax, dword ptr [esp+40h]
                                                  dec eax
                                                  mov dword ptr [00018E07h], eax
                                                  mov dword ptr [00018CDDh], C0000409h
                                                  mov dword ptr [00018CD7h], 00000001h
                                                  mov dword ptr [000000E1h], 00000000h
                                                  Programming Language:
                                                  • [IMP] VS2008 SP1 build 30729
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffc00x70.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe800x140.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x5fdf80x5fe006e1e4d840b96fa78546683623c1ccd96False0.5328848191003911data6.336775963819167IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x610000x16b920x16c0052e99968a6c7e9d2b183e4b7669d7b0cFalse0.37964672046703296data5.5807888225661255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x780000xdf80x400187efa02209dcc291bd59d9caee44253False0.21484375data2.434631909806376IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .pdata0x790000x3f840x4000258717b56f67e0367f4feb0b60186654False0.482421875data5.779326294134831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x7e0000x4e40x60039326fb49822ad82593e9e49b5e608b8False0.5123697916666666data4.849267575521713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                  DLLImport
                                                  KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                                  USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                                  ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                                  SHELL32.dllShellExecuteA
                                                  MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                                  urlmon.dllURLDownloadToFileA
                                                  Normaliz.dllIdnToAscii
                                                  WLDAP32.dll
                                                  CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                                  WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                                  VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                                  VCRUNTIME140_1.dll__CxxFrameHandler4
                                                  api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                                  api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                                  api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                                  api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                                  api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                                  api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                                  api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                                  api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                                  api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 20, 2024 21:21:11.941822052 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:11.941884995 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:11.942189932 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:12.004559040 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:12.004600048 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:12.780273914 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:12.780354023 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:12.785415888 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:12.785432100 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:12.785697937 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:12.792165041 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:12.835402012 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:13.082602024 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:13.082658052 CEST44349721172.67.72.57192.168.2.6
                                                  Oct 20, 2024 21:21:13.082847118 CEST49721443192.168.2.6172.67.72.57
                                                  Oct 20, 2024 21:21:23.105897903 CEST49721443192.168.2.6172.67.72.57
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 20, 2024 21:21:11.911408901 CEST5452553192.168.2.61.1.1.1
                                                  Oct 20, 2024 21:21:11.919394970 CEST53545251.1.1.1192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Oct 20, 2024 21:21:11.911408901 CEST192.168.2.61.1.1.10xd8dbStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Oct 20, 2024 21:21:03.663131952 CEST1.1.1.1192.168.2.60xe72aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                  Oct 20, 2024 21:21:03.663131952 CEST1.1.1.1192.168.2.60xe72aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:21:05.348247051 CEST1.1.1.1192.168.2.60x5c53No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:21:05.348247051 CEST1.1.1.1192.168.2.60x5c53No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:21:11.919394970 CEST1.1.1.1192.168.2.60xd8dbNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:21:11.919394970 CEST1.1.1.1192.168.2.60xd8dbNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:21:11.919394970 CEST1.1.1.1192.168.2.60xd8dbNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                  • keyauth.win
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649721172.67.72.574431468C:\Users\user\Desktop\flX5YA1C09.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-20 19:21:12 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                                  Host: keyauth.win
                                                  Accept: */*
                                                  Content-Length: 58
                                                  Content-Type: application/x-www-form-urlencoded
                                                  2024-10-20 19:21:12 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 32 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                                  Data Ascii: type=init&ver=8.2&name=loader principal&ownerid=9WIvTVJa9m


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:15:21:06
                                                  Start date:20/10/2024
                                                  Path:C:\Users\user\Desktop\flX5YA1C09.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\flX5YA1C09.exe"
                                                  Imagebase:0x7ff791530000
                                                  File size:506'368 bytes
                                                  MD5 hash:2AB72B91CE16DD1252E5A054AC75752E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:15:21:06
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff66e660000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:15:21:07
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:15:21:08
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerPro
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:15:21:08
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:15:21:08
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerProSdk
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:15:21:08
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:15
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:16
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:15:21:09
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:15:21:10
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:21
                                                  Start time:15:21:10
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerPro
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:22
                                                  Start time:15:21:10
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:23
                                                  Start time:15:21:10
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerProSdk
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:24
                                                  Start time:15:21:10
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:25
                                                  Start time:15:21:14
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:15:21:14
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:29
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:30
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\taskkill.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                  Imagebase:0x7ff624060000
                                                  File size:101'376 bytes
                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:31
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:32
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerPro
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:33
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:34
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\sc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:sc stop HTTPDebuggerProSdk
                                                  Imagebase:0x7ff699af0000
                                                  File size:72'192 bytes
                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:35
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                  Imagebase:0x7ff676220000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:38
                                                  Start time:15:21:15
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\WerFault.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 1468 -s 1012
                                                  Imagebase:0x7ff609560000
                                                  File size:570'736 bytes
                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$strchr$_strdup$callocmemcpystrstr
                                                    • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                                    • API String ID: 2045874074-4264080130
                                                    • Opcode ID: 4331d76cf981f97f77d3108d7678a40f23c061385753817b2e423e2649427988
                                                    • Instruction ID: e326b0acc2e60d9e119f49b5dfa631c27339bf3fcb41c3174fb013b1e7d50877
                                                    • Opcode Fuzzy Hash: 4331d76cf981f97f77d3108d7678a40f23c061385753817b2e423e2649427988
                                                    • Instruction Fuzzy Hash: 5303B121A08B8286FB74AB31D4502BDA7A1AF41BC4FC64036DE4D476B9DFBCE465C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$_strdupstrncmpstrtol
                                                    • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                                    • API String ID: 707411602-3372543188
                                                    • Opcode ID: 25a2e078a990ac9a65d758b5cfc621f7c6e1c9ce43f4154468b8d776fed08757
                                                    • Instruction ID: 216915d6566cac8cb155d63bccde698e039adf21cecdb155370eca9ea11a295f
                                                    • Opcode Fuzzy Hash: 25a2e078a990ac9a65d758b5cfc621f7c6e1c9ce43f4154468b8d776fed08757
                                                    • Instruction Fuzzy Hash: 25429C21A08B4286EB34AB31E8506B9B3A4FF45BD4FC24135DA1E477A4DFBCE564C760

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 870 7ff791541580-7ff7915415cc rand 871 7ff7915415d3-7ff7915415da 870->871 871->871 872 7ff7915415dc-7ff79154160e call 7ff7915405d0 rand 871->872 875 7ff791541610 872->875 876 7ff791541683-7ff79154169f SetConsoleTitleA 872->876 877 7ff791541612-7ff791541647 rand 875->877 878 7ff7915416a1-7ff7915416b2 876->878 879 7ff7915416d5-7ff791541750 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff791532af0 876->879 880 7ff791541669-7ff791541674 call 7ff7915406d0 877->880 881 7ff791541649-7ff791541667 877->881 882 7ff7915416d0 call 7ff79158f27c 878->882 883 7ff7915416b4-7ff7915416c7 878->883 885 7ff791541755-7ff791541957 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 GetStdHandle SetConsoleTextAttribute call 7ff791541ac0 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 879->885 886 7ff791541679-7ff79154167d 880->886 881->886 882->879 883->882 888 7ff7915416c9-7ff7915416cf _invalid_parameter_noinfo_noreturn 883->888 923 7ff791541959-7ff7915419d1 call 7ff791533d80 * 2 call 7ff791533b60 * 2 URLDownloadToFileA system * 2 Sleep exit 885->923 924 7ff7915419d2-7ff7915419d5 885->924 886->877 891 7ff79154167f 886->891 888->882 891->876 923->924 926 7ff7915419d7-7ff791541a4f call 7ff791533d80 * 2 call 7ff791533b60 * 2 URLDownloadToFileA system * 2 Sleep exit 924->926 927 7ff791541a50-7ff791541a58 924->927 926->927 929 7ff791541a5a-7ff791541a6b 927->929 930 7ff791541a8e-7ff791541ab0 call 7ff79158f5d0 927->930 933 7ff791541a89 call 7ff79158f27c 929->933 934 7ff791541a6d-7ff791541a80 929->934 933->930 934->933 938 7ff791541a82-7ff791541a88 _invalid_parameter_noinfo_noreturn 934->938 938->933
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                                    • String ID: Iniciar Valorant ESP (HVCI DESLIGADO): $ Iniciar Valorant ESP (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SeieHuSttinstialog.exe$C:\Windows\System32\SeuetingsHostialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/esphvciforabronkz.exe$http://185.101.104.122/esphvcionbronkz.exe$start C:\Windows\System32\SeieHuSttinstialog.exe$start C:\Windows\System32\SeuetingsHostialog.exe
                                                    • API String ID: 2233566951-2931392240
                                                    • Opcode ID: a0ccd1d23ba874ec03ef257653d175f206dabadea0ba06dd86c4f0158f85fb67
                                                    • Instruction ID: 978df7b95747943def99185b55008779d036d12726730a92a8a36be01f863ac5
                                                    • Opcode Fuzzy Hash: a0ccd1d23ba874ec03ef257653d175f206dabadea0ba06dd86c4f0158f85fb67
                                                    • Instruction Fuzzy Hash: 3EE19161E08A4381EB20FB71D8941B8B361AF847A4FC64235D51FC66F5DEFCA469C361

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 951 7ff7915589d0-7ff7915589ec 952 7ff7915589ee-7ff791558a00 WSAStartup 951->952 953 7ff791558a36-7ff791558a3d call 7ff7915824d0 951->953 954 7ff791558a19-7ff791558a35 call 7ff79158f5d0 952->954 955 7ff791558a02-7ff791558a09 952->955 962 7ff791558a43-7ff791558a70 GetModuleHandleA 953->962 963 7ff791558cff-7ff791558d16 call 7ff79158f5d0 953->963 957 7ff791558a0b-7ff791558a11 955->957 958 7ff791558a13 WSACleanup 955->958 957->953 957->958 958->954 965 7ff791558a7e-7ff791558ab3 GetProcAddress strpbrk 962->965 966 7ff791558a72-7ff791558a79 962->966 967 7ff791558adb-7ff791558ade 965->967 968 7ff791558ab5-7ff791558abb 965->968 970 7ff791558c03-7ff791558cf7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 966->970 973 7ff791558b0a-7ff791558b21 GetSystemDirectoryA 967->973 974 7ff791558ae0-7ff791558af3 GetProcAddress 967->974 971 7ff791558acd-7ff791558ad6 LoadLibraryA 968->971 972 7ff791558abd-7ff791558ac8 968->972 970->963 975 7ff791558bca-7ff791558bdc 971->975 972->975 977 7ff791558b27-7ff791558b3a malloc 973->977 978 7ff791558bc2 973->978 974->973 976 7ff791558af5-7ff791558b05 LoadLibraryExA 974->976 975->970 980 7ff791558bde-7ff791558bfc GetProcAddress 975->980 976->975 981 7ff791558b3c-7ff791558b4a GetSystemDirectoryA 977->981 982 7ff791558bb9-7ff791558bbc free 977->982 978->975 980->970 981->982 983 7ff791558b4c-7ff791558b56 981->983 982->978 984 7ff791558b60-7ff791558b69 983->984 984->984 985 7ff791558b6b-7ff791558b70 984->985 986 7ff791558b74-7ff791558b7b 985->986 986->986 987 7ff791558b7d-7ff791558b86 986->987 988 7ff791558b90-7ff791558b9c 987->988 988->988 989 7ff791558b9e-7ff791558ba4 988->989 990 7ff791558ba6-7ff791558bae 989->990 991 7ff791558bb0 LoadLibraryA 989->991 992 7ff791558bb6 990->992 991->992 992->982
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                                    • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                                    • API String ID: 2612373469-2794540096
                                                    • Opcode ID: e8985ec7fb3c371ba82b911c2ec9c70f227decb0dfb4da8fc6d992bb26964cff
                                                    • Instruction ID: 598c9e8ca4ce0b0f65271853b78021bde52822723c1e6ea41e227705ea65ddba
                                                    • Opcode Fuzzy Hash: e8985ec7fb3c371ba82b911c2ec9c70f227decb0dfb4da8fc6d992bb26964cff
                                                    • Instruction Fuzzy Hash: 34916261A0978286EB70AB32E4543B9B391FB89B90FC64135D94E47774EFBCE0658720

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1248 7ff791557d10-7ff791557d7d 1249 7ff791557d7f 1248->1249 1250 7ff791557d82-7ff791557d92 1248->1250 1249->1250 1251 7ff791557d94-7ff791557d9c 1250->1251 1252 7ff791557da1-7ff791557db9 memcpy 1250->1252 1251->1252 1253 7ff791557dbb-7ff791557de6 call 7ff7915462e0 * 2 1252->1253 1254 7ff791557de8-7ff791557dfb socket 1252->1254 1255 7ff791557dfe-7ff791557e0a 1253->1255 1254->1255 1257 7ff79155829f 1255->1257 1258 7ff791557e10-7ff791557e18 1255->1258 1262 7ff7915582a4-7ff7915582cd call 7ff79158f5d0 1257->1262 1260 7ff791557e27-7ff791557e30 1258->1260 1261 7ff791557e1a-7ff791557e22 call 7ff791564ce0 1258->1261 1264 7ff791557e40-7ff791557e49 1260->1264 1265 7ff791557e32-7ff791557e3d 1260->1265 1261->1260 1268 7ff791557e4b-7ff791557e4e 1264->1268 1269 7ff791557e5c-7ff791557e60 1264->1269 1265->1264 1272 7ff79155824a-7ff79155829d _errno * 3 call 7ff791542550 call 7ff7915559c0 call 7ff791556620 1268->1272 1273 7ff791557e54-7ff791557e5a 1268->1273 1274 7ff791557e65-7ff791557e77 call 7ff791581210 1269->1274 1272->1262 1273->1274 1274->1272 1281 7ff791557e7d-7ff791557ea5 htons call 7ff791555b40 1274->1281 1286 7ff791557eac-7ff791557eb1 1281->1286 1287 7ff791557ea7-7ff791557eaa 1281->1287 1289 7ff791557f1e 1286->1289 1290 7ff791557eb3-7ff791557ebd 1286->1290 1287->1286 1287->1289 1292 7ff791557f21-7ff791557f3d 1289->1292 1291 7ff791557ebf-7ff791557eeb setsockopt 1290->1291 1290->1292 1293 7ff791557eed-7ff791557f14 WSAGetLastError call 7ff791542550 call 7ff791555b40 1291->1293 1294 7ff791557f19-7ff791557f1c 1291->1294 1295 7ff791557f6d-7ff791557f70 1292->1295 1296 7ff791557f3f-7ff791557f53 call 7ff791558850 1292->1296 1293->1294 1294->1292 1297 7ff791557fc4-7ff791557fc7 1295->1297 1298 7ff791557f72-7ff791557f97 getsockopt 1295->1298 1311 7ff791557f55-7ff791557f5f 1296->1311 1312 7ff791557f61-7ff791557f6b 1296->1312 1303 7ff791557fcd-7ff791557fd4 1297->1303 1304 7ff7915580af-7ff7915580b6 1297->1304 1301 7ff791557f99-7ff791557fa1 1298->1301 1302 7ff791557fa3-7ff791557fbe setsockopt 1298->1302 1301->1297 1301->1302 1302->1297 1303->1304 1309 7ff791557fda-7ff791558005 setsockopt 1303->1309 1307 7ff7915580b8-7ff7915580e5 call 7ff7915462e0 * 2 1304->1307 1308 7ff7915580ea-7ff7915580f1 1304->1308 1341 7ff7915580e7 1307->1341 1342 7ff791558135-7ff791558137 1307->1342 1316 7ff7915580f8-7ff791558118 call 7ff791581180 call 7ff791557680 1308->1316 1317 7ff7915580f3-7ff7915580f6 1308->1317 1314 7ff79155801e-7ff791558092 call 7ff7915583c0 * 2 WSAIoctl 1309->1314 1315 7ff791558007-7ff791558019 call 7ff791555b40 1309->1315 1311->1297 1312->1298 1314->1304 1338 7ff791558094-7ff7915580aa WSAGetLastError call 7ff791555b40 1314->1338 1315->1304 1321 7ff79155814e-7ff791558178 call 7ff791564ce0 call 7ff79155d800 1316->1321 1335 7ff79155811a-7ff791558128 call 7ff791556620 1316->1335 1317->1316 1317->1321 1343 7ff79155817a-7ff79155818a call 7ff791545840 1321->1343 1344 7ff79155818f-7ff791558192 1321->1344 1335->1257 1351 7ff79155812e-7ff791558130 1335->1351 1338->1304 1341->1308 1342->1308 1348 7ff791558139-7ff791558149 call 7ff791556620 1342->1348 1343->1344 1345 7ff791558198-7ff7915581a0 1344->1345 1346 7ff79155823f-7ff791558248 1344->1346 1345->1346 1350 7ff7915581a6-7ff7915581ad 1345->1350 1346->1262 1348->1262 1353 7ff7915581d8-7ff7915581e3 WSAGetLastError 1350->1353 1354 7ff7915581af-7ff7915581c4 connect 1350->1354 1351->1262 1357 7ff7915581e5-7ff7915581ee 1353->1357 1358 7ff791558232-7ff791558234 1353->1358 1354->1353 1356 7ff7915581c6-7ff7915581c8 1354->1356 1359 7ff79155823b-7ff79155823d 1356->1359 1360 7ff7915581ca-7ff7915581d3 1356->1360 1357->1358 1361 7ff7915581f0-7ff791558230 call 7ff791542550 call 7ff791555b40 call 7ff791556620 1357->1361 1358->1359 1359->1262 1360->1262 1361->1262
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                                    • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                                    • API String ID: 3453287622-3868455274
                                                    • Opcode ID: 13fbb7af70b5c68f2c31b92b67b3173c801f34fb863e3f20c1c82c9e9a3d679c
                                                    • Instruction ID: 7b66376772ef09c8d32c2cde89ca8b6de7af22d0d9535297e76e68530402cef8
                                                    • Opcode Fuzzy Hash: 13fbb7af70b5c68f2c31b92b67b3173c801f34fb863e3f20c1c82c9e9a3d679c
                                                    • Instruction Fuzzy Hash: B0F1BF71A0868286E730EB35D4642BDB7A0FB44794FC24035EA4D87AB4DFBCE555CB20

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,?,?,00007FF79158250A,?,?,?,?,00007FF791558A3B), ref: 00007FF7915586C4
                                                    • GetProcAddress.KERNEL32(?,?,00007FF79158250A,?,?,?,?,00007FF791558A3B), ref: 00007FF7915586E9
                                                    • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF79158250A,?,?,?,?,00007FF791558A3B), ref: 00007FF7915586FC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProcstrpbrk
                                                    • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                                    • API String ID: 27745253-3327535076
                                                    • Opcode ID: 4dd7a7bec3778505651e24fe35f71610763a5e881d0948d01e6d731c7a0f3486
                                                    • Instruction ID: ac40eca4d8b832926e03eb57aa929a6f82b412db21dec94d60890231f7194bdc
                                                    • Opcode Fuzzy Hash: 4dd7a7bec3778505651e24fe35f71610763a5e881d0948d01e6d731c7a0f3486
                                                    • Instruction Fuzzy Hash: A541E652B09A4286EB25AF33A850139A791EF45FE1FC94130DE0E077B0DE7DE4A6C320

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1905 7ff791564ab0-7ff791564afe socket 1906 7ff791564b05-7ff791564b5e htonl setsockopt 1905->1906 1907 7ff791564b00 1905->1907 1909 7ff791564c8b-7ff791564ca7 closesocket * 3 1906->1909 1910 7ff791564b64-7ff791564b79 bind 1906->1910 1908 7ff791564cb4-7ff791564cd2 call 7ff79158f5d0 1907->1908 1911 7ff791564cac 1909->1911 1910->1909 1913 7ff791564b7f-7ff791564b95 getsockname 1910->1913 1911->1908 1913->1909 1915 7ff791564b9b-7ff791564baa listen 1913->1915 1915->1909 1916 7ff791564bb0-7ff791564bc5 socket 1915->1916 1916->1909 1917 7ff791564bcb-7ff791564be0 connect 1916->1917 1917->1909 1918 7ff791564be6-7ff791564bfc accept 1917->1918 1918->1909 1919 7ff791564c02-7ff791564c1e call 7ff791558ed0 1918->1919 1922 7ff791564c25-7ff791564c2c 1919->1922 1922->1922 1923 7ff791564c2e-7ff791564c48 send 1922->1923 1923->1909 1924 7ff791564c4a-7ff791564c66 recv 1923->1924 1924->1909 1925 7ff791564c68-7ff791564c7c memcmp 1924->1925 1925->1909 1926 7ff791564c7e-7ff791564c89 closesocket 1925->1926 1926->1911
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                                    • String ID:
                                                    • API String ID: 3699910901-0
                                                    • Opcode ID: 134dca1b78ca657fffabd6dfe8f524be0cec472b378b214e5a4b578b0c111f4b
                                                    • Instruction ID: 1bfa28484012e79a4fdbc8b4adbdb0b7850c3654971243d7eabc79a4dbbd1ec8
                                                    • Opcode Fuzzy Hash: 134dca1b78ca657fffabd6dfe8f524be0cec472b378b214e5a4b578b0c111f4b
                                                    • Instruction Fuzzy Hash: 57515F31608A4286E760AB35E584169B3A1EB84BB4FD54330EA7F43BF8DFBCD8558750

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1927 7ff7915569d0-7ff791556a1d 1928 7ff791556a28-7ff791556a63 call 7ff79155d800 1927->1928 1929 7ff791556a1f-7ff791556a23 1927->1929 1935 7ff791556a68-7ff791556a6b 1928->1935 1936 7ff791556a65 1928->1936 1930 7ff791556f46-7ff791556f64 call 7ff79158f5d0 1929->1930 1937 7ff791556a6d-7ff791556a70 1935->1937 1938 7ff791556a88 1935->1938 1936->1935 1939 7ff791556a83-7ff791556a86 1937->1939 1940 7ff791556a72-7ff791556a75 1937->1940 1941 7ff791556a8b-7ff791556ab7 call 7ff79155d890 1938->1941 1939->1941 1940->1941 1942 7ff791556a77-7ff791556a81 1940->1942 1945 7ff791556ab9-7ff791556acd call 7ff7915559c0 1941->1945 1946 7ff791556ad2-7ff791556ada 1941->1946 1942->1941 1953 7ff791556f36-7ff791556f3e 1945->1953 1948 7ff791556adc-7ff791556aee call 7ff791557ba0 1946->1948 1949 7ff791556b09-7ff791556b27 1946->1949 1957 7ff791556af0-7ff791556af2 1948->1957 1958 7ff791556b02-7ff791556b04 1948->1958 1952 7ff791556b30-7ff791556b45 1949->1952 1955 7ff791556b4b-7ff791556b5f call 7ff791566030 1952->1955 1956 7ff791556dca 1952->1956 1953->1930 1967 7ff791556b65-7ff791556b90 call 7ff79155d890 1955->1967 1968 7ff791556ce0-7ff791556ce3 1955->1968 1960 7ff791556dce-7ff791556ddf 1956->1960 1957->1958 1962 7ff791556af4-7ff791556afd call 7ff791557cb0 1957->1962 1958->1953 1960->1952 1961 7ff791556de5-7ff791556de7 1960->1961 1964 7ff791556f2c 1961->1964 1965 7ff791556ded-7ff791556e04 call 7ff7915582d0 1961->1965 1962->1958 1973 7ff791556f2e 1964->1973 1983 7ff791556eb7-7ff791556eb9 1965->1983 1984 7ff791556e0a-7ff791556e11 1965->1984 1979 7ff791556ba9-7ff791556bac 1967->1979 1980 7ff791556b92-7ff791556ba4 call 7ff791555b40 1967->1980 1970 7ff791556d54-7ff791556d9a SleepEx getsockopt 1968->1970 1971 7ff791556ce5-7ff791556cec 1968->1971 1977 7ff791556d9c-7ff791556da4 WSAGetLastError 1970->1977 1978 7ff791556da6 1970->1978 1971->1970 1975 7ff791556cee-7ff791556cf0 1971->1975 1973->1953 1981 7ff791556cf6-7ff791556d3c SleepEx getsockopt 1975->1981 1982 7ff791556bff-7ff791556c01 1975->1982 1985 7ff791556daa-7ff791556dac 1977->1985 1978->1985 1991 7ff791556bfb 1979->1991 1992 7ff791556bae-7ff791556bb5 1979->1992 1980->1979 1987 7ff791556d4b-7ff791556d4f 1981->1987 1988 7ff791556d3e-7ff791556d46 WSAGetLastError 1981->1988 1982->1956 1995 7ff791556c07-7ff791556c1c WSASetLastError 1982->1995 1983->1973 1989 7ff791556ebb-7ff791556ec2 1984->1989 1990 7ff791556e17-7ff791556e1e 1984->1990 1993 7ff791556dae-7ff791556db4 1985->1993 1994 7ff791556e23-7ff791556e71 1985->1994 1987->1982 1988->1982 1996 7ff791556ecd-7ff791556ed4 1989->1996 1997 7ff791556ec4-7ff791556ecb 1989->1997 1999 7ff791556ee6-7ff791556f29 call 7ff791542550 call 7ff7915559c0 1990->1999 1991->1982 1992->1991 2000 7ff791556bb7-7ff791556be3 call 7ff79155d890 1992->2000 1993->1994 2003 7ff791556db6-7ff791556dc5 call 7ff791555b40 1993->2003 2001 7ff791556e73-7ff791556e7b call 7ff791556620 1994->2001 2002 7ff791556e86-7ff791556e9b call 7ff791557ba0 1994->2002 1995->1956 2004 7ff791556c22-7ff791556c8c call 7ff79155ebf0 call 7ff791542550 call 7ff791555b40 1995->2004 2006 7ff791556ed6-7ff791556edd 1996->2006 2007 7ff791556edf 1996->2007 1997->1999 1999->1964 2000->1991 2021 7ff791556be5-7ff791556bf6 call 7ff7915582d0 2000->2021 2001->2002 2002->1973 2022 7ff791556ea1-7ff791556ea3 2002->2022 2003->1956 2030 7ff791556cae-7ff791556cc4 call 7ff7915582d0 2004->2030 2031 7ff791556c8e-7ff791556c95 2004->2031 2006->1999 2007->1999 2021->1991 2022->1973 2026 7ff791556ea9-7ff791556eb2 call 7ff791557cb0 2022->2026 2026->1983 2037 7ff791556cd7-7ff791556cdb 2030->2037 2038 7ff791556cc6-7ff791556cd1 2030->2038 2031->2030 2032 7ff791556c97-7ff791556c9e 2031->2032 2034 7ff791556ca0-7ff791556ca3 2032->2034 2034->2030 2036 7ff791556ca5-7ff791556cac 2034->2036 2036->2030 2036->2034 2037->1960 2038->1956 2038->2037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                                    • API String ID: 0-3307081561
                                                    • Opcode ID: 4364df8d52fc6405048d3634ce423f9be7205a83e27d6a22880c12e7e853aef9
                                                    • Instruction ID: 89054c82cc11a875d26cc56be4e2ce7c1a2ad3d65b0de53088cafbf712dae9ef
                                                    • Opcode Fuzzy Hash: 4364df8d52fc6405048d3634ce423f9be7205a83e27d6a22880c12e7e853aef9
                                                    • Instruction Fuzzy Hash: 1AE1E171A186C282EB34AB35D4602B9A7A0FB487A4FC54235EA5E077E5DFBCE461C710

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 994 7ff791532af0-7ff791532b3f call 7ff791532890 997 7ff7915330f8-7ff791533167 call 7ff791533170 Sleep exit 994->997 998 7ff791532b45-7ff791532b4a 994->998 1003 7ff791533168-7ff79153316f call 7ff791531a40 997->1003 998->997 1000 7ff791532b50-7ff791532c6e call 7ff7915331b0 call 7ff791533c80 call 7ff791533320 call 7ff791533c80 call 7ff791533420 call 7ff791533c80 998->1000 1017 7ff791532c70-7ff791532c81 1000->1017 1018 7ff791532ca4-7ff791532cbd 1000->1018 1019 7ff791532c9f call 7ff79158f27c 1017->1019 1020 7ff791532c83-7ff791532c96 1017->1020 1021 7ff791532cbf-7ff791532cd1 1018->1021 1022 7ff791532cf5-7ff791532cfd 1018->1022 1019->1018 1020->1019 1027 7ff791532c98-7ff791532c9e _invalid_parameter_noinfo_noreturn 1020->1027 1023 7ff791532cef-7ff791532cf4 call 7ff79158f27c 1021->1023 1024 7ff791532cd3-7ff791532ce6 1021->1024 1025 7ff791532cff-7ff791532d10 1022->1025 1026 7ff791532d33-7ff791532d4b 1022->1026 1023->1022 1024->1023 1029 7ff791532ce8-7ff791532cee _invalid_parameter_noinfo_noreturn 1024->1029 1031 7ff791532d2e call 7ff79158f27c 1025->1031 1032 7ff791532d12-7ff791532d25 1025->1032 1033 7ff791532d4d-7ff791532d5e 1026->1033 1034 7ff791532d82-7ff791532d8a 1026->1034 1027->1019 1029->1023 1031->1026 1032->1031 1038 7ff791532d27-7ff791532d2d _invalid_parameter_noinfo_noreturn 1032->1038 1040 7ff791532d7c-7ff791532d81 call 7ff79158f27c 1033->1040 1041 7ff791532d60-7ff791532d73 1033->1041 1035 7ff791532d8c-7ff791532d9d 1034->1035 1036 7ff791532dc0-7ff791532e07 1034->1036 1043 7ff791532dbb call 7ff79158f27c 1035->1043 1044 7ff791532d9f-7ff791532db2 1035->1044 1045 7ff791532e09-7ff791532e16 1036->1045 1046 7ff791532e18-7ff791532e3b 1036->1046 1038->1031 1040->1034 1041->1040 1047 7ff791532d75-7ff791532d7b _invalid_parameter_noinfo_noreturn 1041->1047 1043->1036 1044->1043 1049 7ff791532db4-7ff791532dba _invalid_parameter_noinfo_noreturn 1044->1049 1051 7ff791532e92-7ff791532eab call 7ff7915335a0 call 7ff791532890 1045->1051 1052 7ff791532e3d-7ff791532e44 1046->1052 1053 7ff791532e6f-7ff791532e72 1046->1053 1047->1040 1049->1043 1065 7ff791532eb0-7ff791532ee8 call 7ff791534c20 call 7ff791534910 1051->1065 1052->1003 1057 7ff791532e4a-7ff791532e58 call 7ff79158f240 1052->1057 1054 7ff791532e7b 1053->1054 1055 7ff791532e74-7ff791532e79 call 7ff79158f240 1053->1055 1059 7ff791532e7e-7ff791532e8d memcpy 1054->1059 1055->1059 1066 7ff791532e5a-7ff791532e66 1057->1066 1067 7ff791532e68-7ff791532e6e _invalid_parameter_noinfo_noreturn 1057->1067 1059->1051 1072 7ff791532eee-7ff791532efd call 7ff791534910 1065->1072 1073 7ff791532ff3-7ff791533063 call 7ff791534910 call 7ff79158f240 call 7ff791534360 call 7ff791535a50 call 7ff791533ea0 1065->1073 1066->1059 1067->1053 1078 7ff791532eff-7ff791532f03 1072->1078 1079 7ff791532f05 1072->1079 1099 7ff7915330b1-7ff7915330f7 call 7ff791534910 call 7ff791534d50 call 7ff791533b60 MessageBoxA call 7ff791533d20 exit 1073->1099 1100 7ff791533065-7ff7915330b0 call 7ff791534910 call 7ff7915349f0 call 7ff791533b60 ShellExecuteA exit 1073->1100 1081 7ff791532f08-7ff791532f11 1078->1081 1079->1081 1083 7ff791532f16-7ff791532f39 call 7ff791534360 call 7ff791533ea0 1081->1083 1084 7ff791532f13 1081->1084 1095 7ff791532f3b-7ff791532f4c 1083->1095 1096 7ff791532f6f-7ff791532f83 1083->1096 1084->1083 1101 7ff791532f6a call 7ff79158f27c 1095->1101 1102 7ff791532f4e-7ff791532f61 1095->1102 1097 7ff791532fb9-7ff791532ff2 call 7ff79158f5d0 1096->1097 1098 7ff791532f85-7ff791532f93 1096->1098 1104 7ff791532fb1-7ff791532fb4 call 7ff79158f27c 1098->1104 1105 7ff791532f95-7ff791532fa8 1098->1105 1099->997 1100->1099 1101->1096 1102->1101 1109 7ff791532f63-7ff791532f69 _invalid_parameter_noinfo_noreturn 1102->1109 1104->1097 1105->1104 1110 7ff791532faa-7ff791532fb0 _invalid_parameter_noinfo_noreturn 1105->1110 1109->1101 1110->1104
                                                    APIs
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915328F7
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532967
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915329C7
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532A17
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532A67
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532C98
                                                      • Part of subcall function 00007FF791534910: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915349D0
                                                      • Part of subcall function 00007FF79158F240: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79153443E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF79158F25A
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532CE8
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532D27
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532D75
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532DB4
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532E68
                                                    • memcpy.VCRUNTIME140 ref: 00007FF791532E8D
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532F63
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532FAA
                                                    • ShellExecuteA.SHELL32 ref: 00007FF7915330A2
                                                    • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915330AA
                                                    • MessageBoxA.USER32 ref: 00007FF7915330E0
                                                    • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915330F1
                                                    • Sleep.KERNEL32 ref: 00007FF791533159
                                                    • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791533161
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF791533168
                                                      • Part of subcall function 00007FF7915331B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915332BF
                                                      • Part of subcall function 00007FF7915331B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791533300
                                                      • Part of subcall function 00007FF791533C80: memcpy.VCRUNTIME140 ref: 00007FF791533CD3
                                                      • Part of subcall function 00007FF791533320: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791533400
                                                      • Part of subcall function 00007FF791533420: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791533500
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                                    • String ID: Failure$download$invalidver$message$open$sessionid$success
                                                    • API String ID: 3283070336-3881042241
                                                    • Opcode ID: 337789b302f75f523bb674596e188a8674e470494e6e28e9ddfb9047656d617b
                                                    • Instruction ID: a4fb1730dc24b87788152c6e6bd3780d12306981db853598f342c3ccdd22bbe8
                                                    • Opcode Fuzzy Hash: 337789b302f75f523bb674596e188a8674e470494e6e28e9ddfb9047656d617b
                                                    • Instruction Fuzzy Hash: 9402F362A08B8285FB20AB78D4443ADB761FB447E4FC25235DAAD07AE5DFBCD091C350

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1125 7ff79156b610-7ff79156b68d 1126 7ff79156b6ae-7ff79156b6b3 1125->1126 1127 7ff79156b68f-7ff79156b693 1125->1127 1129 7ff79156b6b5-7ff79156b6cd call 7ff791555b40 1126->1129 1130 7ff79156b6d2-7ff79156b6d6 1126->1130 1127->1126 1128 7ff79156b695-7ff79156b6a9 call 7ff791555b40 1127->1128 1143 7ff79156bafc-7ff79156bb09 1128->1143 1140 7ff79156baf3-7ff79156baf6 1129->1140 1131 7ff79156b6d8-7ff79156b6ec call 7ff791555b40 1130->1131 1132 7ff79156b6f1-7ff79156b6f4 1130->1132 1131->1140 1137 7ff79156ba0a 1132->1137 1138 7ff79156b6fa-7ff79156b6fe 1132->1138 1144 7ff79156ba12-7ff79156ba1a 1137->1144 1138->1137 1142 7ff79156b704-7ff79156b719 1138->1142 1140->1143 1147 7ff79156bc15-7ff79156bc1b 1140->1147 1145 7ff79156b71b-7ff79156b71e 1142->1145 1146 7ff79156b720-7ff79156b74b realloc 1142->1146 1143->1147 1148 7ff79156bb0f-7ff79156bb13 1143->1148 1150 7ff79156ba1e 1144->1150 1145->1146 1153 7ff79156b79d-7ff79156b7b2 call 7ff791555d40 1145->1153 1154 7ff79156b74d-7ff79156b769 call 7ff7915559c0 1146->1154 1155 7ff79156b76e-7ff79156b79b 1146->1155 1151 7ff79156bc2d-7ff79156bc43 1147->1151 1152 7ff79156bc1d-7ff79156bc20 1147->1152 1148->1147 1149 7ff79156bb19-7ff79156bb1d 1148->1149 1149->1147 1156 7ff79156bb23-7ff79156bb38 call 7ff791558850 1149->1156 1157 7ff79156ba26-7ff79156ba2c 1150->1157 1159 7ff79156bc8b-7ff79156bc91 1151->1159 1160 7ff79156bc45-7ff79156bc89 memcpy * 2 1151->1160 1152->1151 1158 7ff79156bc22-7ff79156bc2a 1152->1158 1163 7ff79156b7b7-7ff79156b7bd 1153->1163 1154->1143 1155->1153 1185 7ff79156bbfe-7ff79156bc10 call 7ff791555b40 1156->1185 1186 7ff79156bb3e-7ff79156bb40 1156->1186 1165 7ff79156bac2-7ff79156bac8 1157->1165 1166 7ff79156ba32-7ff79156ba47 call 7ff791555b40 1157->1166 1158->1151 1169 7ff79156bca5-7ff79156bca8 1159->1169 1170 7ff79156bc93-7ff79156bc96 1159->1170 1167 7ff79156bcb5-7ff79156bcd7 call 7ff79158f5d0 1160->1167 1173 7ff79156b7c3-7ff79156b7cf 1163->1173 1174 7ff79156b9c2-7ff79156b9ca 1163->1174 1177 7ff79156bace-7ff79156bade 1165->1177 1178 7ff79156b7f0-7ff79156b7ff 1165->1178 1198 7ff79156ba49-7ff79156ba4c 1166->1198 1199 7ff79156ba52-7ff79156ba62 1166->1199 1171 7ff79156bcaa-7ff79156bcae 1169->1171 1172 7ff79156bcb0-7ff79156bcb2 1169->1172 1170->1169 1180 7ff79156bc98-7ff79156bca0 1170->1180 1171->1172 1172->1167 1181 7ff79156b7e9-7ff79156b7ee 1173->1181 1182 7ff79156b7d1-7ff79156b7d7 1173->1182 1183 7ff79156b9cc-7ff79156b9dd 1174->1183 1184 7ff79156b9e2 1174->1184 1177->1140 1189 7ff79156bae0-7ff79156bae4 1177->1189 1178->1140 1188 7ff79156b805-7ff79156b807 1178->1188 1180->1169 1181->1178 1191 7ff79156b7dd-7ff79156b7e4 call 7ff791555b40 1182->1191 1192 7ff79156b9ae-7ff79156b9bd call 7ff791555b40 1182->1192 1183->1178 1184->1181 1193 7ff79156b9e8-7ff79156ba05 1184->1193 1185->1147 1186->1185 1194 7ff79156bb46-7ff79156bb52 1186->1194 1188->1140 1196 7ff79156b80d-7ff79156b810 1188->1196 1197 7ff79156baeb 1189->1197 1191->1181 1192->1181 1193->1178 1194->1147 1201 7ff79156b822-7ff79156b8a0 call 7ff791558410 1196->1201 1202 7ff79156b812-7ff79156b816 1196->1202 1203 7ff79156baee call 7ff791555b40 1197->1203 1198->1199 1204 7ff79156bbd2-7ff79156bbd9 1198->1204 1206 7ff79156bbea-7ff79156bbf9 1199->1206 1207 7ff79156ba68-7ff79156baa9 call 7ff791555b40 call 7ff791569ad0 1199->1207 1218 7ff79156b8b4-7ff79156b8b9 1201->1218 1219 7ff79156b8a2-7ff79156b8a7 1201->1219 1202->1201 1210 7ff79156b818-7ff79156b81c 1202->1210 1203->1140 1204->1197 1206->1203 1220 7ff79156bbde-7ff79156bbe5 1207->1220 1221 7ff79156baaf-7ff79156babd call 7ff791555b40 1207->1221 1210->1140 1210->1201 1223 7ff79156b95e-7ff79156b962 1218->1223 1224 7ff79156b8bf-7ff79156b8e9 1218->1224 1219->1218 1222 7ff79156b8a9-7ff79156b8ae 1219->1222 1220->1203 1221->1178 1222->1218 1226 7ff79156bb57-7ff79156bb5d 1222->1226 1223->1144 1230 7ff79156b968-7ff79156b96d 1223->1230 1227 7ff79156b8eb-7ff79156b8ee 1224->1227 1228 7ff79156b8f0-7ff79156b90b realloc 1224->1228 1234 7ff79156bb86-7ff79156bbb1 call 7ff791541d60 call 7ff791555b40 1226->1234 1235 7ff79156bb5f-7ff79156bb70 1226->1235 1227->1228 1231 7ff79156b935-7ff79156b939 1227->1231 1232 7ff79156bbb6-7ff79156bbcd call 7ff7915559c0 1228->1232 1233 7ff79156b911-7ff79156b931 1228->1233 1230->1144 1236 7ff79156b973-7ff79156b985 1230->1236 1238 7ff79156b93b-7ff79156b958 memcpy 1231->1238 1239 7ff79156b95c 1231->1239 1232->1140 1233->1231 1234->1140 1240 7ff79156bb7a-7ff79156bb81 1235->1240 1241 7ff79156bb72 1235->1241 1236->1157 1243 7ff79156b98b-7ff79156b9ac memcpy 1236->1243 1238->1239 1239->1223 1240->1197 1241->1240 1243->1150
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                                    • API String ID: 3510742995-857957974
                                                    • Opcode ID: 468c7f387ab69de67b9c46178fe798ccc1586622e1c440d156092cfc90ce2348
                                                    • Instruction ID: 732a4d0550fed4e12480024e36ca5085e3a27fd674ca81bdd8a436a0e13c5bac
                                                    • Opcode Fuzzy Hash: 468c7f387ab69de67b9c46178fe798ccc1586622e1c440d156092cfc90ce2348
                                                    • Instruction Fuzzy Hash: 1702DD72B18E8585EB70EB2AD4543AAB7A4FB40BD0F920536DA4D473B0DFB8D451C750

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1368 7ff79156aaa0-7ff79156ab0e 1369 7ff79156ab30 1368->1369 1370 7ff79156ab10-7ff79156ab25 1368->1370 1372 7ff79156ab37-7ff79156ab51 1369->1372 1370->1369 1371 7ff79156ab27-7ff79156ab2e 1370->1371 1371->1372 1373 7ff79156b21b 1372->1373 1374 7ff79156ab57-7ff79156ab5c 1372->1374 1374->1373 1375 7ff79156ab62-7ff79156ab70 1374->1375 1376 7ff79156abb2-7ff79156abb6 1375->1376 1377 7ff79156ab72-7ff79156abac malloc 1375->1377 1379 7ff79156abb8-7ff79156abfd malloc 1376->1379 1380 7ff79156ac03-7ff79156ac14 1376->1380 1377->1376 1378 7ff79156b20f 1377->1378 1378->1373 1379->1378 1379->1380 1381 7ff79156ac88-7ff79156ac8a 1380->1381 1382 7ff79156ac16-7ff79156ac30 realloc 1380->1382 1385 7ff79156ac8c-7ff79156acb0 call 7ff791555d40 1381->1385 1386 7ff79156acea-7ff79156ad91 call 7ff791558410 malloc 1381->1386 1383 7ff79156ac32-7ff79156ac3c call 7ff7915559c0 1382->1383 1384 7ff79156ac70-7ff79156ac86 1382->1384 1391 7ff79156ac41 1383->1391 1384->1381 1392 7ff79156acb5-7ff79156acb8 1385->1392 1386->1378 1393 7ff79156ad97-7ff79156adb1 memcpy 1386->1393 1394 7ff79156ac46-7ff79156ac6f call 7ff79158f5d0 1391->1394 1395 7ff79156acbe-7ff79156acc0 1392->1395 1396 7ff79156af2f-7ff79156af36 1392->1396 1393->1391 1397 7ff79156adb7-7ff79156ae23 free 1393->1397 1399 7ff79156af16-7ff79156af2a call 7ff7915559c0 1395->1399 1400 7ff79156acc6-7ff79156acce 1395->1400 1401 7ff79156af3c-7ff79156af48 1396->1401 1402 7ff79156b208-7ff79156b20a 1396->1402 1408 7ff79156ae29-7ff79156ae30 1397->1408 1409 7ff79156b1f3-7ff79156b1fa 1397->1409 1399->1394 1400->1399 1405 7ff79156acd4-7ff79156ace6 1400->1405 1401->1394 1402->1394 1405->1386 1411 7ff79156b19c-7ff79156b1a8 1408->1411 1412 7ff79156ae36-7ff79156ae3d 1408->1412 1410 7ff79156b1fe 1409->1410 1410->1402 1415 7ff79156b1db-7ff79156b1ee 1411->1415 1416 7ff79156b1aa-7ff79156b1d6 call 7ff791541d60 call 7ff7915559c0 1411->1416 1413 7ff79156ae48-7ff79156ae4f 1412->1413 1414 7ff79156ae3f-7ff79156ae42 1412->1414 1418 7ff79156ae50-7ff79156ae54 1413->1418 1414->1413 1417 7ff79156af4d-7ff79156af54 1414->1417 1415->1394 1416->1394 1420 7ff79156af56-7ff79156af5d 1417->1420 1421 7ff79156af94-7ff79156afbd call 7ff791541d60 call 7ff7915559c0 1417->1421 1422 7ff79156ae56-7ff79156ae5a 1418->1422 1423 7ff79156ae93-7ff79156ae9a 1418->1423 1420->1416 1425 7ff79156af63-7ff79156af8f call 7ff791541d60 call 7ff7915559c0 1420->1425 1421->1391 1422->1423 1429 7ff79156ae5c-7ff79156ae77 call 7ff791556280 1422->1429 1426 7ff79156ae9c 1423->1426 1427 7ff79156aea9-7ff79156aeb2 1423->1427 1425->1394 1426->1427 1427->1418 1433 7ff79156aeb4-7ff79156aeb8 1427->1433 1440 7ff79156ae7c-7ff79156ae82 1429->1440 1437 7ff79156aebe-7ff79156aec3 1433->1437 1438 7ff79156afe8-7ff79156afef 1433->1438 1437->1438 1442 7ff79156aec9-7ff79156aeda 1437->1442 1444 7ff79156aff7-7ff79156affe 1438->1444 1445 7ff79156ae88-7ff79156ae8d 1440->1445 1446 7ff79156afc2-7ff79156afe3 call 7ff7915559c0 1440->1446 1442->1444 1449 7ff79156aee0-7ff79156af04 memcpy 1442->1449 1444->1410 1447 7ff79156b004-7ff79156b007 1444->1447 1445->1423 1445->1446 1446->1394 1451 7ff79156b009 1447->1451 1452 7ff79156b013-7ff79156b01b 1447->1452 1449->1447 1453 7ff79156af0a-7ff79156af0f 1449->1453 1451->1452 1455 7ff79156b01d-7ff79156b037 1452->1455 1456 7ff79156b043 1452->1456 1453->1399 1455->1456 1457 7ff79156b039-7ff79156b041 1455->1457 1458 7ff79156b04b-7ff79156b04e 1456->1458 1457->1458 1459 7ff79156b054-7ff79156b085 1458->1459 1460 7ff79156b170-7ff79156b178 1458->1460 1465 7ff79156b08b-7ff79156b093 1459->1465 1466 7ff79156b143-7ff79156b16e call 7ff791541d60 call 7ff7915559c0 1459->1466 1460->1402 1461 7ff79156b17e-7ff79156b189 1460->1461 1461->1402 1462 7ff79156b18b-7ff79156b197 call 7ff791585b20 1461->1462 1462->1394 1465->1466 1469 7ff79156b099-7ff79156b09c 1465->1469 1472 7ff79156b115-7ff79156b118 1466->1472 1471 7ff79156b09e-7ff79156b0a5 1469->1471 1469->1472 1476 7ff79156b0a7-7ff79156b0ce memset call 7ff791588500 1471->1476 1477 7ff79156b110 1471->1477 1474 7ff79156b11a CertFreeCertificateContext 1472->1474 1475 7ff79156b120-7ff79156b122 1472->1475 1474->1475 1475->1460 1479 7ff79156b124-7ff79156b135 call 7ff7915559c0 1475->1479 1483 7ff79156b10b 1476->1483 1484 7ff79156b0d0-7ff79156b0da 1476->1484 1477->1472 1479->1394 1483->1477 1486 7ff79156b0dc-7ff79156b0e6 1484->1486 1487 7ff79156b13a-7ff79156b141 1484->1487 1486->1487 1489 7ff79156b0e8-7ff79156b0fa call 7ff79154f130 1486->1489 1488 7ff79156b103-7ff79156b106 call 7ff7915559c0 1487->1488 1488->1483 1489->1483 1493 7ff79156b0fc 1489->1493 1493->1488
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                                    • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                                    • API String ID: 860210379-3059304359
                                                    • Opcode ID: a284abad33f343ce1916dba049f66a931e121b00332314a9f25fae0c54c3845f
                                                    • Instruction ID: bb9df86c43f15fc8e1de2843c1e158d614bf58ad80af1933d42a202e7b9c2bb0
                                                    • Opcode Fuzzy Hash: a284abad33f343ce1916dba049f66a931e121b00332314a9f25fae0c54c3845f
                                                    • Instruction Fuzzy Hash: E4129D72A08F8186EB74AB39D8503AEB7A0FB44B84F910136DA5E477A4DFBCE451C750

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1494 7ff791569cc0-7ff791569d30 1495 7ff791569d32-7ff791569d44 1494->1495 1496 7ff791569d4f 1494->1496 1495->1496 1498 7ff791569d46-7ff791569d4d 1495->1498 1497 7ff791569d56-7ff791569d70 call 7ff791558850 1496->1497 1501 7ff791569d81-7ff791569d88 1497->1501 1502 7ff791569d72-7ff791569d7c call 7ff791555b40 1497->1502 1498->1497 1504 7ff791569d8a-7ff791569daa GetModuleHandleA GetProcAddress 1501->1504 1505 7ff791569dc8 1501->1505 1502->1501 1504->1505 1506 7ff791569dac-7ff791569dc2 call 7ff791558850 1504->1506 1507 7ff791569dca-7ff791569ddb 1505->1507 1506->1505 1516 7ff791569dc4-7ff791569dc6 1506->1516 1509 7ff791569ddd-7ff791569df5 1507->1509 1510 7ff791569e00 1507->1510 1509->1510 1513 7ff791569df7-7ff791569dfe 1509->1513 1511 7ff791569e07-7ff791569e0a 1510->1511 1514 7ff791569e4b-7ff791569e52 1511->1514 1515 7ff791569e0c-7ff791569e23 call 7ff791558850 1511->1515 1513->1511 1518 7ff791569e56-7ff791569e67 1514->1518 1522 7ff791569e25-7ff791569e30 1515->1522 1523 7ff791569e32-7ff791569e46 call 7ff7915559c0 1515->1523 1516->1507 1520 7ff791569e8c 1518->1520 1521 7ff791569e69-7ff791569e81 1518->1521 1525 7ff791569e93-7ff791569e95 1520->1525 1521->1520 1524 7ff791569e83-7ff791569e8a 1521->1524 1522->1518 1535 7ff79156aa4d-7ff79156aa76 call 7ff79158f5d0 1523->1535 1524->1525 1527 7ff791569e97-7ff791569eb3 call 7ff7915503b0 call 7ff79154fdd0 1525->1527 1528 7ff791569ed8-7ff791569ee2 1525->1528 1554 7ff791569eb5-7ff791569ecd 1527->1554 1555 7ff791569ed0-7ff791569ed3 call 7ff7915503e0 1527->1555 1531 7ff79156a757-7ff79156a76e call 7ff791567950 1528->1531 1532 7ff791569ee8-7ff791569f13 1528->1532 1547 7ff79156a783-7ff79156a78d call 7ff791555b40 1531->1547 1548 7ff79156a770-7ff79156a781 call 7ff791567950 1531->1548 1536 7ff791569f4b 1532->1536 1537 7ff791569f15-7ff791569f2c 1532->1537 1543 7ff791569f50-7ff791569f5a 1536->1543 1541 7ff791569f2e-7ff791569f33 1537->1541 1542 7ff791569f35-7ff791569f3c 1537->1542 1541->1543 1550 7ff791569f3e-7ff791569f43 1542->1550 1551 7ff791569f45-7ff791569f49 1542->1551 1544 7ff791569f5c-7ff791569f5f 1543->1544 1545 7ff791569f62-7ff791569f6d 1543->1545 1544->1545 1552 7ff791569f73-7ff791569f88 1545->1552 1553 7ff79156a73f-7ff79156a74e call 7ff7915559c0 1545->1553 1561 7ff79156a792-7ff79156a79d 1547->1561 1548->1547 1548->1561 1550->1543 1551->1543 1552->1553 1567 7ff79156aa48 1553->1567 1554->1555 1555->1528 1562 7ff79156a826-7ff79156a838 1561->1562 1563 7ff79156a7a3-7ff79156a824 call 7ff791555b40 call 7ff7915583d0 1561->1563 1566 7ff79156a83d-7ff79156a895 calloc 1562->1566 1563->1566 1569 7ff79156a897-7ff79156a8a1 call 7ff7915559c0 1566->1569 1570 7ff79156a8b0-7ff79156a8b3 1566->1570 1567->1535 1574 7ff79156a8a6-7ff79156a8ab 1569->1574 1573 7ff79156a8b5-7ff79156a913 1570->1573 1570->1574 1577 7ff79156a9bc-7ff79156a9d8 call 7ff791556280 1573->1577 1578 7ff79156a919-7ff79156a948 free 1573->1578 1574->1535 1584 7ff79156a9dd-7ff79156a9fa 1577->1584 1580 7ff79156a94a-7ff79156a950 1578->1580 1581 7ff79156a996-7ff79156a9b7 call 7ff791541d60 call 7ff7915559c0 1578->1581 1582 7ff79156a952-7ff79156a96b call 7ff791541d60 call 7ff7915559c0 1580->1582 1583 7ff79156a970-7ff79156a991 call 7ff791541d60 call 7ff7915559c0 1580->1583 1581->1535 1582->1567 1583->1535 1594 7ff79156a9fc-7ff79156a9ff 1584->1594 1595 7ff79156aa39-7ff79156aa43 call 7ff7915559c0 1584->1595 1594->1595 1599 7ff79156aa01-7ff79156aa37 1594->1599 1595->1567 1599->1535
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                                    • API String ID: 1646373207-2477831187
                                                    • Opcode ID: 2a96a85dd682720a2a0395f41ca8cbf193f7a3b01dc20dd8288eab63dec27fe3
                                                    • Instruction ID: 2fd9d84b3f67bc318bb3d49022cc4c729c7648f32636bf913e4751c30f4af739
                                                    • Opcode Fuzzy Hash: 2a96a85dd682720a2a0395f41ca8cbf193f7a3b01dc20dd8288eab63dec27fe3
                                                    • Instruction Fuzzy Hash: 0402E032A08B818AE720AB35D8503FEB7A4FB44788F824136DA5D477A5DFBCE564C750

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1602 7ff79154b300-7ff79154b34b calloc 1603 7ff79154b48e-7ff79154b497 _errno 1602->1603 1604 7ff79154b351-7ff79154b3da malloc 1602->1604 1605 7ff79154b499-7ff79154b4b5 1603->1605 1606 7ff79154b3dc-7ff79154b401 InitializeCriticalSectionEx call 7ff791564ab0 1604->1606 1607 7ff79154b417-7ff79154b41e 1604->1607 1617 7ff79154b407-7ff79154b40f 1606->1617 1618 7ff79154b4b6-7ff79154b4ca _strdup 1606->1618 1608 7ff79154b430-7ff79154b441 free 1607->1608 1609 7ff79154b420-7ff79154b42a DeleteCriticalSection free 1607->1609 1611 7ff79154b448-7ff79154b450 1608->1611 1612 7ff79154b443 call 7ff7915686d0 1608->1612 1609->1608 1615 7ff79154b458-7ff79154b488 free 1611->1615 1616 7ff79154b452 closesocket 1611->1616 1612->1611 1615->1603 1616->1615 1617->1607 1618->1607 1619 7ff79154b4d0-7ff79154b4f0 free _strdup 1618->1619 1620 7ff79154b51e-7ff79154b528 1619->1620 1621 7ff79154b4f2-7ff79154b501 call 7ff791568da0 1619->1621 1622 7ff79154b52a-7ff79154b552 EnterCriticalSection LeaveCriticalSection 1620->1622 1623 7ff79154b5a1-7ff79154b5bc free 1620->1623 1627 7ff79154b506-7ff79154b50c 1621->1627 1625 7ff79154b554-7ff79154b55c CloseHandle 1622->1625 1626 7ff79154b565-7ff79154b568 1622->1626 1623->1603 1628 7ff79154b588-7ff79154b58b 1625->1628 1629 7ff79154b56a-7ff79154b56d call 7ff791568df0 1626->1629 1630 7ff79154b572-7ff79154b582 call 7ff79154b180 free 1626->1630 1631 7ff79154b55e-7ff79154b560 1627->1631 1632 7ff79154b50e-7ff79154b51b _errno 1627->1632 1635 7ff79154b58d-7ff79154b593 call 7ff791545b50 1628->1635 1636 7ff79154b598-7ff79154b59b closesocket 1628->1636 1629->1630 1630->1628 1631->1605 1632->1620 1635->1636 1636->1623
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                                    • String ID:
                                                    • API String ID: 259767416-0
                                                    • Opcode ID: 0f176e75cecbb76cdcc7bf5b0f645a93cc3ee423f56b65c4fd695de7eb201e46
                                                    • Instruction ID: 39b8268c0613a9733b327f36b1afd456675fc6cd9ef9b16413efe827f4e2e793
                                                    • Opcode Fuzzy Hash: 0f176e75cecbb76cdcc7bf5b0f645a93cc3ee423f56b65c4fd695de7eb201e46
                                                    • Instruction Fuzzy Hash: 69813E32D09B8182E734EF21E550269B360FB94754F965235DB9E037A1EFB8E5E48350
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                                    • API String ID: 0-760484938
                                                    • Opcode ID: 6b313b1ff0a45369b508b08826f8d8bd13a0b577d4460adc72fd130e75a4694e
                                                    • Instruction ID: 3e5ff9254d9ae2f3bed85da7cdf459800c60aae8372f5f9e88a45259e3f7f490
                                                    • Opcode Fuzzy Hash: 6b313b1ff0a45369b508b08826f8d8bd13a0b577d4460adc72fd130e75a4694e
                                                    • Instruction Fuzzy Hash: 3E42D722B09BC291EBA9AB3195603B9B7A0FB45B84F850035DE5D477A5DFBCE470C320

                                                    Control-flow Graph

                                                    APIs
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791541BB1,?,?,?,?,00007FF7915335E1), ref: 00007FF791551918
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791551961
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: callocfree
                                                    • String ID: <$<$<$`$v
                                                    • API String ID: 306872129-2056843887
                                                    • Opcode ID: 595ef5842befdeb713a6ddf656bd9ecb5cca7743d9590fe775feb76880473611
                                                    • Instruction ID: 916b835c25f50f2efc98154ac1648f1a4eda0df41f270473655df3740e194504
                                                    • Opcode Fuzzy Hash: 595ef5842befdeb713a6ddf656bd9ecb5cca7743d9590fe775feb76880473611
                                                    • Instruction Fuzzy Hash: 34915C32908BC186E3109F34D4443E877A0FB55B5CF595238DF991B7AADFBAA0A4C720

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_errnogetpeernamegetsockname
                                                    • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                                    • API String ID: 2911674258-670633250
                                                    • Opcode ID: bbe4ceb424cf4d9b4c806e7f93ced93b9e3da9280fb0904b96d2e48ee7c611fa
                                                    • Instruction ID: 33734c910f1482fe534e2a72cdfd158835985a3c21854b5a20eae5479d4a121f
                                                    • Opcode Fuzzy Hash: bbe4ceb424cf4d9b4c806e7f93ced93b9e3da9280fb0904b96d2e48ee7c611fa
                                                    • Instruction Fuzzy Hash: F8919F72A18BC182D720DF35D4502E973A0FB89B88F895236EF4C47665EF78E195CB21

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2074 7ff791568720-7ff79156874d getaddrinfo 2075 7ff791568753-7ff791568765 2074->2075 2076 7ff7915688e4-7ff7915688f1 2074->2076 2077 7ff79156876b 2075->2077 2078 7ff7915688c4-7ff7915688cd WSASetLastError 2075->2078 2079 7ff791568770-7ff791568776 2077->2079 2080 7ff7915688d3-7ff7915688e0 2078->2080 2081 7ff79156877d-7ff791568780 2079->2081 2082 7ff791568778-7ff79156877b 2079->2082 2080->2076 2084 7ff791568786 2081->2084 2085 7ff791568831-7ff791568838 2081->2085 2083 7ff791568789-7ff79156878d 2082->2083 2083->2085 2087 7ff791568793-7ff79156879a 2083->2087 2084->2083 2085->2079 2086 7ff79156883e 2085->2086 2088 7ff791568872-7ff79156887f 2086->2088 2087->2085 2089 7ff7915687a0-7ff7915687a3 2087->2089 2090 7ff791568887-7ff79156888a 2088->2090 2091 7ff791568881 freeaddrinfo 2088->2091 2089->2085 2092 7ff7915687a9-7ff7915687ba malloc 2089->2092 2093 7ff79156888c-7ff79156888f 2090->2093 2094 7ff7915688bf-7ff7915688c2 2090->2094 2091->2090 2095 7ff79156886c 2092->2095 2096 7ff7915687c0-7ff7915687f5 malloc 2092->2096 2097 7ff7915688ba-7ff7915688bd 2093->2097 2098 7ff791568891-7ff7915688b8 free * 3 2093->2098 2094->2078 2094->2080 2095->2088 2099 7ff79156885b-7ff79156886a free 2096->2099 2100 7ff7915687f7-7ff79156880d memcpy 2096->2100 2097->2080 2098->2097 2098->2098 2099->2088 2101 7ff79156881e-7ff791568828 2100->2101 2102 7ff79156880f-7ff79156881c _strdup 2100->2102 2103 7ff79156882e 2101->2103 2104 7ff79156882a 2101->2104 2102->2101 2105 7ff791568840-7ff791568859 free * 2 2102->2105 2103->2085 2104->2103 2105->2088
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                                    • String ID:
                                                    • API String ID: 2364279375-0
                                                    • Opcode ID: 1e773e6d1ef13c63b1b75f1c94382ef1f413d9554964dd35fc4ea277ad229414
                                                    • Instruction ID: cc3627621de7f1adfc415b36adb827a5c2a7e08f1c0c5461e116c82a35da37e3
                                                    • Opcode Fuzzy Hash: 1e773e6d1ef13c63b1b75f1c94382ef1f413d9554964dd35fc4ea277ad229414
                                                    • Instruction Fuzzy Hash: 2D513D36A49B4282EB75AF61A55013AF7A0FB48BD4F8A4435CE8E13760DF7CE464C760

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2106 7ff791566030-7ff791566075 2107 7ff7915660ab-7ff7915660c5 2106->2107 2108 7ff791566077-7ff79156607a 2106->2108 2110 7ff7915660dc-7ff7915660f7 2107->2110 2111 7ff7915660c7-7ff7915660d7 2107->2111 2108->2107 2109 7ff79156607c-7ff79156607f 2108->2109 2109->2107 2112 7ff791566081-7ff791566084 2109->2112 2113 7ff7915660fd-7ff791566102 2110->2113 2114 7ff791566187-7ff791566193 2110->2114 2111->2110 2115 7ff7915660a4-7ff7915660a6 2112->2115 2116 7ff791566086 2112->2116 2119 7ff791566117-7ff79156611a 2113->2119 2120 7ff791566104-7ff79156610e 2113->2120 2117 7ff791566195-7ff7915661a9 2114->2117 2118 7ff7915661e0-7ff7915661ea 2114->2118 2125 7ff79156634d 2115->2125 2123 7ff79156609b-7ff79156609e Sleep 2116->2123 2124 7ff791566088-7ff791566096 WSASetLastError 2116->2124 2126 7ff7915661ab 2117->2126 2127 7ff7915661bf-7ff7915661c1 2117->2127 2121 7ff7915661ec-7ff7915661ef 2118->2121 2122 7ff791566223-7ff79156622b 2118->2122 2129 7ff79156611c-7ff791566120 2119->2129 2130 7ff79156613d-7ff791566142 2119->2130 2120->2119 2128 7ff791566110-7ff791566115 2120->2128 2121->2122 2135 7ff7915661f1-7ff7915661f3 2121->2135 2136 7ff79156622d-7ff791566230 2122->2136 2137 7ff791566232 2122->2137 2123->2115 2124->2125 2132 7ff79156634f-7ff79156636f call 7ff79158f5d0 2125->2132 2138 7ff7915661b0-7ff7915661b7 2126->2138 2139 7ff7915661d9-7ff7915661dc 2127->2139 2140 7ff7915661c3-7ff7915661c6 2127->2140 2128->2119 2128->2120 2129->2130 2131 7ff791566122-7ff791566136 2129->2131 2133 7ff791566154-7ff79156615e 2130->2133 2134 7ff791566144-7ff79156614b 2130->2134 2131->2130 2144 7ff79156617b-7ff791566183 2133->2144 2145 7ff791566160-7ff791566168 2133->2145 2134->2133 2142 7ff79156614d-7ff791566152 2134->2142 2135->2122 2143 7ff7915661f5-7ff7915661f8 2135->2143 2146 7ff79156626a-7ff79156629a select 2136->2146 2147 7ff791566234-7ff79156625e 2137->2147 2148 7ff791566260-7ff791566263 2137->2148 2138->2127 2149 7ff7915661b9-7ff7915661bd 2138->2149 2139->2118 2140->2139 2150 7ff7915661c8-7ff7915661d5 2140->2150 2142->2133 2142->2134 2153 7ff7915661fa-7ff7915661fc 2143->2153 2154 7ff791566201 2143->2154 2144->2114 2145->2144 2155 7ff79156616a-7ff791566177 2145->2155 2151 7ff7915662a0-7ff7915662aa 2146->2151 2147->2146 2148->2146 2156 7ff791566265 2148->2156 2149->2127 2149->2138 2150->2139 2157 7ff7915662ac-7ff7915662af 2151->2157 2158 7ff7915662b4 2151->2158 2153->2151 2159 7ff791566203-7ff791566211 WSASetLastError 2154->2159 2160 7ff791566216-7ff791566221 Sleep 2154->2160 2155->2144 2156->2146 2157->2132 2161 7ff7915662bd-7ff7915662c0 2158->2161 2162 7ff7915662b6-7ff7915662b8 2158->2162 2159->2151 2160->2151 2163 7ff7915662ef-7ff7915662f2 2161->2163 2164 7ff7915662c2-7ff7915662ea __WSAFDIsSet * 2 2161->2164 2162->2132 2166 7ff79156631e-7ff791566321 2163->2166 2167 7ff7915662f4-7ff791566305 __WSAFDIsSet 2163->2167 2164->2163 2165 7ff7915662ec 2164->2165 2165->2163 2166->2125 2170 7ff791566323-7ff791566334 __WSAFDIsSet 2166->2170 2168 7ff791566307 2167->2168 2169 7ff79156630a-7ff791566319 __WSAFDIsSet 2167->2169 2168->2169 2169->2166 2171 7ff79156631b 2169->2171 2172 7ff791566339-7ff791566348 __WSAFDIsSet 2170->2172 2173 7ff791566336 2170->2173 2171->2166 2172->2125 2174 7ff79156634a 2172->2174 2173->2172 2174->2125
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: abd993cd88855e34aa5c9e26aa33cbd17ae10345d58ff1a7757adbdaf51f28e4
                                                    • Instruction ID: aac827bb5ca988fc5eba24a754f67195fe6337c46007fac09d103a774169260b
                                                    • Opcode Fuzzy Hash: abd993cd88855e34aa5c9e26aa33cbd17ae10345d58ff1a7757adbdaf51f28e4
                                                    • Instruction Fuzzy Hash: F7912B31B0CE828AEB796E3599502B9E294FF843D4FD14134D91E87BE4DFBCD9618250
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc
                                                    • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                                    • API String ID: 2635317215-3812100122
                                                    • Opcode ID: 68643da3fc30b0570181909e97d04cfee4669a67e8130e0b2375fa1add1ed4f3
                                                    • Instruction ID: 850fcb22376dc724975b0d51e047074e079470a35169d4c5dc67c6b9b7d36efe
                                                    • Opcode Fuzzy Hash: 68643da3fc30b0570181909e97d04cfee4669a67e8130e0b2375fa1add1ed4f3
                                                    • Instruction Fuzzy Hash: 0351B561A0C78282F729AB359560379BBA0FB44790F950031EB8D437B0DF7DE4758720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: system
                                                    • String ID: .8$h%49
                                                    • API String ID: 3377271179-4206735779
                                                    • Opcode ID: ec42c300fd7f31bbc5d13404be995d8a02917175fa4a498dfd81fcda4fec176c
                                                    • Instruction ID: 0c814b9b92b6bfe5303eded5f0e7d99b5c3fec5f1fc5424565e466b2a6a0f575
                                                    • Opcode Fuzzy Hash: ec42c300fd7f31bbc5d13404be995d8a02917175fa4a498dfd81fcda4fec176c
                                                    • Instruction Fuzzy Hash: 0D618D22E18BD689F311DF78E8451BCBB70FB89748F855229CFC926D25EBA81109C395
                                                    APIs
                                                      • Part of subcall function 00007FF791568720: getaddrinfo.WS2_32 ref: 00007FF791568742
                                                      • Part of subcall function 00007FF791568720: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF7915687AE
                                                      • Part of subcall function 00007FF791568720: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF7915687E8
                                                      • Part of subcall function 00007FF791568720: memcpy.VCRUNTIME140(?,?,?,00007FF79154B245), ref: 00007FF791568801
                                                      • Part of subcall function 00007FF791568720: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF79156880F
                                                      • Part of subcall function 00007FF791568720: freeaddrinfo.WS2_32(?,?,?,00007FF79154B245), ref: 00007FF791568881
                                                      • Part of subcall function 00007FF791568720: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF791568895
                                                      • Part of subcall function 00007FF791568720: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF79156889F
                                                      • Part of subcall function 00007FF791568720: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79154B245), ref: 00007FF7915688AC
                                                    • WSAGetLastError.WS2_32 ref: 00007FF79154B24B
                                                    • WSAGetLastError.WS2_32 ref: 00007FF79154B255
                                                    • EnterCriticalSection.KERNEL32 ref: 00007FF79154B270
                                                    • LeaveCriticalSection.KERNEL32 ref: 00007FF79154B27F
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79154B290
                                                    • send.WS2_32 ref: 00007FF79154B2B3
                                                    • WSAGetLastError.WS2_32 ref: 00007FF79154B2BD
                                                    • LeaveCriticalSection.KERNEL32 ref: 00007FF79154B2D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                                    • String ID:
                                                    • API String ID: 506363382-0
                                                    • Opcode ID: f7c4e5cbcd272fddd2bef9543e2f47016aea2c4402c0e504b2cf3b49b58bb64f
                                                    • Instruction ID: c2125080378c4f2414e5fca2396a730fcd2cd41376274c6a33a87a20188532b7
                                                    • Opcode Fuzzy Hash: f7c4e5cbcd272fddd2bef9543e2f47016aea2c4402c0e504b2cf3b49b58bb64f
                                                    • Instruction Fuzzy Hash: 68316F31A0CA4686E760AF35E490269B7A0FF84BE8FD50131DA0E836B4DFBCD465C761
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 9f3e151cb250e305114643fab4248131c4be06f32a009a1ddd31ca33c14a965e
                                                    • Instruction ID: 4c7cc324e204a8f9fc0dd7e3eef09db6c990a0e2d4a55e32a971ceb2b7857385
                                                    • Opcode Fuzzy Hash: 9f3e151cb250e305114643fab4248131c4be06f32a009a1ddd31ca33c14a965e
                                                    • Instruction Fuzzy Hash: C1A14DB1A78A4286EB795B34D808379E295FF44BD4F914234E92E877E4DFBCD9208350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemallocmemcpy
                                                    • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                                    • API String ID: 3056473165-3891197721
                                                    • Opcode ID: 4498ad4dcdc6d00945403b8a38ce96c10f752aea999d50e9d10c8de5344d2721
                                                    • Instruction ID: 1434908aafbf3e97d905a9c3abe0de32ff584781458180a21494b2498525c4d5
                                                    • Opcode Fuzzy Hash: 4498ad4dcdc6d00945403b8a38ce96c10f752aea999d50e9d10c8de5344d2721
                                                    • Instruction Fuzzy Hash: CB719E72B04F018AEB20DB75D4506ADB3A1FB48BA8F814635DE2D477E4EE78E416C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                                    • String ID:
                                                    • API String ID: 1328870896-0
                                                    • Opcode ID: 5c1bf33a8262fb8a9265364dfe8b970797fd310612fa06bab78109a3e82c9b51
                                                    • Instruction ID: 199d8f6ea9b24330783f5b68b96c661e84c5ab259161d214971970155d09f7d9
                                                    • Opcode Fuzzy Hash: 5c1bf33a8262fb8a9265364dfe8b970797fd310612fa06bab78109a3e82c9b51
                                                    • Instruction Fuzzy Hash: 70315121A0C24382FB34BB74D4513B9D391AF49784FC604B6D64E4BAF7DEEDA4658231
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %s$Connection #%ld to host %s left intact
                                                    • API String ID: 1294909896-118628944
                                                    • Opcode ID: 2ac45d0b3f8141cfc778614bb871165b0eab50eb157bb3d071267177eaa47ccd
                                                    • Instruction ID: 484a7448a18e908c83d1fddf0e6e287042ee94009dc16f9873ee664818461a7c
                                                    • Opcode Fuzzy Hash: 2ac45d0b3f8141cfc778614bb871165b0eab50eb157bb3d071267177eaa47ccd
                                                    • Instruction Fuzzy Hash: 41916132A0868196EB78BB35D5503BEA3D1FB44B84FD64431DE5E076A9CFB8E4708760
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79155120B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791551221
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155103D
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155105A
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155106E
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155108A
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF7915510A7
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF7915510CA
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF7915510DE
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF7915510F2
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF791551118
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155112C
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF791551140
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155118F
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF79155119C
                                                      • Part of subcall function 00007FF791550FC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791551645), ref: 00007FF7915511C5
                                                    • memset.VCRUNTIME140 ref: 00007FF791551255
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$memset
                                                    • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                                    • API String ID: 2717317152-3248832348
                                                    • Opcode ID: cc270fcbb0397121c5c20b5635b5bdad10aec92339a197071a10f1228c485e1c
                                                    • Instruction ID: 2823f42cfa62ade917fb1e9ced93b73383598472cfdf1d60454b25ec00b18e00
                                                    • Opcode Fuzzy Hash: cc270fcbb0397121c5c20b5635b5bdad10aec92339a197071a10f1228c485e1c
                                                    • Instruction Fuzzy Hash: 4571A56290CBC181E761EF3594603BDAB50FB41B94F8A4131EF5E4B6A6DFBCE4618360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$memcpy
                                                    • String ID: 1.1
                                                    • API String ID: 4107583993-2150719395
                                                    • Opcode ID: d6f711ccd9c413a7139487ff782507654feef34da79e39076222df88c29a3976
                                                    • Instruction ID: 60476c8b1b3902e52df7eb251b4d4629ffa4219c7a6470ddc7b15ef9b8d26909
                                                    • Opcode Fuzzy Hash: d6f711ccd9c413a7139487ff782507654feef34da79e39076222df88c29a3976
                                                    • Instruction Fuzzy Hash: EB515C72608E8586D7759B22E5903BEB3A0FB85BC4F854031DE9E87764DF7CE0A48390
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastmallocrecvsend
                                                    • String ID: Send failure: %s
                                                    • API String ID: 25851408-857917747
                                                    • Opcode ID: bad8e2b9f78913238dd4996b2fe71e1ef4ab40e2601b9c16876674bf2ad8640e
                                                    • Instruction ID: 9a6bc18993ebce001db5a35150eb8c4875ab7cb15477271b52bb3120103ab14d
                                                    • Opcode Fuzzy Hash: bad8e2b9f78913238dd4996b2fe71e1ef4ab40e2601b9c16876674bf2ad8640e
                                                    • Instruction Fuzzy Hash: 2741A072A05B8145EB70AF35E850779A6A0BB48BA8FC64235DE6D473A4DF7CE460C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Resolving timed out after %I64d milliseconds
                                                    • API String ID: 1294909896-3343404259
                                                    • Opcode ID: 19717ebffcfcd34a4d805cd54382aed297bd2d9e9f6d8c6c265517247b27b987
                                                    • Instruction ID: da42485f37334501872726742fc779dd136201e92a9719fce9732a64b1b240da
                                                    • Opcode Fuzzy Hash: 19717ebffcfcd34a4d805cd54382aed297bd2d9e9f6d8c6c265517247b27b987
                                                    • Instruction Fuzzy Hash: E3D1C361A0864285FB35AF7990503BDA3A1FF40B88FA55531DE0D076FADFB8E461C360
                                                    APIs
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915328F7
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532967
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915329C7
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532A17
                                                      • Part of subcall function 00007FF791532890: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532A67
                                                    • MessageBoxA.USER32 ref: 00007FF791533777
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915337DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                                    • String ID: keyauth.win$null
                                                    • API String ID: 3545939226-2841560827
                                                    • Opcode ID: bf5030269bfb94014387a5e0b6dca6bb52eb33e27260a3917493ef355fe1072e
                                                    • Instruction ID: 61a11c1b1f537cb19dd39e5fac5478171c883767c4be15018dd991cf7fd8cebe
                                                    • Opcode Fuzzy Hash: bf5030269bfb94014387a5e0b6dca6bb52eb33e27260a3917493ef355fe1072e
                                                    • Instruction Fuzzy Hash: 62512262B18B5285FB24EF74D4443AC6321FB05B88F914034DE4E1BFA6DFBC91A28350
                                                    APIs
                                                      • Part of subcall function 00007FF7915586B0: GetModuleHandleA.KERNEL32(?,?,?,00007FF79158250A,?,?,?,?,00007FF791558A3B), ref: 00007FF7915586C4
                                                    • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF791558A3B), ref: 00007FF791582520
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: AddressCallerHandleModuleProc
                                                    • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                                    • API String ID: 2084706301-3788156360
                                                    • Opcode ID: 12e6e9e73077aa2a7666adcfea8b6f5d0d830d8a478b057c344a7f6495247157
                                                    • Instruction ID: b00875ba261321a3589a49291b2e8b4a64d0983ff14a0c3fa84ae4d605ebc05d
                                                    • Opcode Fuzzy Hash: 12e6e9e73077aa2a7666adcfea8b6f5d0d830d8a478b057c344a7f6495247157
                                                    • Instruction Fuzzy Hash: CEF019A0E49A0241EF34BB25A8A1770A690AF15754FCA5434C40D467B0EEFCA1B9C361
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Resolving timed out after %I64d milliseconds
                                                    • API String ID: 0-3343404259
                                                    • Opcode ID: bf286e0b73a6494ad10689257a95318e8ba2473458c6853e381d0df7356fe23f
                                                    • Instruction ID: 951fe397d84c6832ad941a96adc7cbc6a96718fc10587bb13053cabb9c0a47f2
                                                    • Opcode Fuzzy Hash: bf286e0b73a6494ad10689257a95318e8ba2473458c6853e381d0df7356fe23f
                                                    • Instruction Fuzzy Hash: 1EB19431A0864285FB74AE79945437DA3A1EF41B88FE65436DE0E472F9DFB8E460C360
                                                    APIs
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791561420
                                                      • Part of subcall function 00007FF7915619B0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791561A0A
                                                      • Part of subcall function 00007FF791561760: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7915617F8
                                                      • Part of subcall function 00007FF791561760: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791561801
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$calloc
                                                    • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                                    • API String ID: 3095843317-1242256665
                                                    • Opcode ID: 668fe629a6c5635f8bcc055ccf6d4ab737424927742c2c5532dfbb9c0fb4f5a2
                                                    • Instruction ID: 4020add08da4500c1e8d747f21448701589b312215ca1dcafc2fe5690bc23efe
                                                    • Opcode Fuzzy Hash: 668fe629a6c5635f8bcc055ccf6d4ab737424927742c2c5532dfbb9c0fb4f5a2
                                                    • Instruction Fuzzy Hash: D841CB31A0CA8246E770EB75A4403BDB7A1AFC53C4FD54032DA4D876A9DEBCD414C760
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: closesocket$calloc
                                                    • String ID:
                                                    • API String ID: 2958813939-0
                                                    • Opcode ID: 09ff459787c39bcac5a193e56dccf02f8fcae5eab16e60d055e2f91dbe07d781
                                                    • Instruction ID: 5b72422d4528cc2dfb1ab7f79d64036da5379883f5f3054ac40f54fc9f088c63
                                                    • Opcode Fuzzy Hash: 09ff459787c39bcac5a193e56dccf02f8fcae5eab16e60d055e2f91dbe07d781
                                                    • Instruction Fuzzy Hash: FF41A432A18A4281E760FF31D4502E9A361FF84764FDA4231EE5D472E6EFBCD5558320
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                                    • API String ID: 0-3791222319
                                                    • Opcode ID: 794b31f334c449281c11ab67f53f58ecb1c6e5dddef2efe126c2f8c9882ce586
                                                    • Instruction ID: 25bca8945e0e31f053e68f52d19e58bfbb06f157006fa27f97c0cd50bcbae3d6
                                                    • Opcode Fuzzy Hash: 794b31f334c449281c11ab67f53f58ecb1c6e5dddef2efe126c2f8c9882ce586
                                                    • Instruction Fuzzy Hash: 6C518331A0CA8689FB74AB31D540279A791FB547E4FD64231DA2D472F8DEBCE461C3A0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freerecv
                                                    • String ID:
                                                    • API String ID: 2032557106-0
                                                    • Opcode ID: cd816d89feecff3239274105a464d5646439d9ed679fb7c2ede5c68852553d24
                                                    • Instruction ID: 1052db56fcea113d10a995d30260ae0e48ec0a6f18f8a32a9cde3bafaa4fc796
                                                    • Opcode Fuzzy Hash: cd816d89feecff3239274105a464d5646439d9ed679fb7c2ede5c68852553d24
                                                    • Instruction Fuzzy Hash: 06C11872A1C68246EB759B3594003BAB3A0FB447A4FE54235DE6E437E4EFBCE8518710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                                    • API String ID: 1294909896-3248832348
                                                    • Opcode ID: fd4f73bd826b4c077320aa3d596d2b804dab94e412b9ceaa2e6d3a22cfc135d9
                                                    • Instruction ID: 2eea94f0aa1b946edb950a6422a07f8f66150a537e0a62699f3a40a05f857669
                                                    • Opcode Fuzzy Hash: fd4f73bd826b4c077320aa3d596d2b804dab94e412b9ceaa2e6d3a22cfc135d9
                                                    • Instruction Fuzzy Hash: CC51A362A0CAC181E7619F35D4543ADA761EB84B98F8D4131EF5D0B3A9DFBDE4A0C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastrecv
                                                    • String ID:
                                                    • API String ID: 2514157807-0
                                                    • Opcode ID: 0aa2688d59615133f2fe807de81fb86dcc8fb5fa5c2b9f8e0691a090646b3fe9
                                                    • Instruction ID: d6f630fee0a626805599f3d50fbf4af951443f6cad7fa40cf70e282a5dc435d9
                                                    • Opcode Fuzzy Hash: 0aa2688d59615133f2fe807de81fb86dcc8fb5fa5c2b9f8e0691a090646b3fe9
                                                    • Instruction Fuzzy Hash: 64E0DF61F0850543FF2967B0A8A433821909B44772F894734CA3BC63D0EAAC45E24711
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: closesocket
                                                    • String ID:
                                                    • API String ID: 2781271927-0
                                                    • Opcode ID: fa1ceb3494bdb5e2b5588c90cedee802df93630bbcbbbbf70f66840aa7ca4111
                                                    • Instruction ID: c3cbe8cd95042bbceb3345c939547aaaaba46c02455682ba71591428b38bdf15
                                                    • Opcode Fuzzy Hash: fa1ceb3494bdb5e2b5588c90cedee802df93630bbcbbbbf70f66840aa7ca4111
                                                    • Instruction Fuzzy Hash: 4D01B92170958181EB64EB3AE19837DA360EF88B84FD98031D70D476E5CF78D4B58711
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: socket
                                                    • String ID:
                                                    • API String ID: 98920635-0
                                                    • Opcode ID: 4d238160c39bfdfa5611c95737f48be4a37f7ccb382ea55052af28b17d8103be
                                                    • Instruction ID: 06baa404c7ceac828b4f860cb4023af26b43b86cc3506d077f5a1495bb9d6c86
                                                    • Opcode Fuzzy Hash: 4d238160c39bfdfa5611c95737f48be4a37f7ccb382ea55052af28b17d8103be
                                                    • Instruction Fuzzy Hash: 95E09B35F0654181DF58773584911B97351AB45734FC54371D53D033E1CE7D91669B10
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _beginthreadex
                                                    • String ID:
                                                    • API String ID: 3014514943-0
                                                    • Opcode ID: cfbc4027307d02d34c0302ee7ff44f02ab6a9c9a70f40e165d9c6015fd17f9c6
                                                    • Instruction ID: 738ae044b97a45184ba8bfa1490631a4e4790de4d6eb484595be78f5874cd93c
                                                    • Opcode Fuzzy Hash: cfbc4027307d02d34c0302ee7ff44f02ab6a9c9a70f40e165d9c6015fd17f9c6
                                                    • Instruction Fuzzy Hash: 0CD02B63B19A0083DF20DF72A840029E351B788774B884338AE7D827F0DB3CD1554600
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ioctlsocket
                                                    • String ID:
                                                    • API String ID: 3577187118-0
                                                    • Opcode ID: 17f50192cd42546436bcc8703bc05093b79cd1f5c006f56d2a4872af3a0c65db
                                                    • Instruction ID: a253d1b9bc069982cd6eb5708ae8bdc13e4d42e2c4f6005b105d1290a1e46311
                                                    • Opcode Fuzzy Hash: 17f50192cd42546436bcc8703bc05093b79cd1f5c006f56d2a4872af3a0c65db
                                                    • Instruction Fuzzy Hash: DEC08026F14581C2D3446F7154C5087A771ABC4214FD55435D24B82134DD3CC2F58B51
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                                    • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                                    • API String ID: 3939785054-690044944
                                                    • Opcode ID: 5b10492e9d13c9207e1088f14adb912909160a337de8a4a85d45928daba8dc60
                                                    • Instruction ID: b8fb97b6fe5171a2cc2ff01db3c8ac7e263004bc471ac0af8e95fe0605c08387
                                                    • Opcode Fuzzy Hash: 5b10492e9d13c9207e1088f14adb912909160a337de8a4a85d45928daba8dc60
                                                    • Instruction Fuzzy Hash: 95C29F71B08A8685FBB0AB3184543F9A791EF41BD8FCA4135DA4D0B2E5DEBCE465C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                                    • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                                    • API String ID: 2059720140-3844637060
                                                    • Opcode ID: 13625babc66ce8b67016afff6feda551413290e79ca40fbb8271c466a71a9eab
                                                    • Instruction ID: 9eda508247fc3b4e552b49fdf86432e2e9bf6f1a6466c69da863c57d290410a8
                                                    • Opcode Fuzzy Hash: 13625babc66ce8b67016afff6feda551413290e79ca40fbb8271c466a71a9eab
                                                    • Instruction Fuzzy Hash: 9B729221A0878285FB71AB76D4413B9E7A1EF49794FE64131CA8E026F5DFBCE465C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$#211$fwrite$#217calloc
                                                    • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                                    • API String ID: 2742731861-78870445
                                                    • Opcode ID: a5ed48b24d81f4e908d087d24bba8ba3817cdfdc58985adb09e109c54026b3de
                                                    • Instruction ID: 4ee65752b31af1480450cd3f6170ebbbd26544c4f1e431016ead80e45b67adca
                                                    • Opcode Fuzzy Hash: a5ed48b24d81f4e908d087d24bba8ba3817cdfdc58985adb09e109c54026b3de
                                                    • Instruction Fuzzy Hash: FD427075B08B4286EB20AF72D4552B9A3A1FB48B98FC24131DE0E57764DFBCE565C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                                    • String ID: array$number overflow parsing '$object$object key$object separator
                                                    • API String ID: 1664669839-85532522
                                                    • Opcode ID: 7938b585ea422cc6f3a6a7add729e8ff58aa22cf9f245d6fb80868b8fc622a11
                                                    • Instruction ID: 601575cfa05fa489b999c0467a36febb82292a8f2d85cd5b8eca8e4ae01dfe33
                                                    • Opcode Fuzzy Hash: 7938b585ea422cc6f3a6a7add729e8ff58aa22cf9f245d6fb80868b8fc622a11
                                                    • Instruction Fuzzy Hash: 23A2B262A18B86C6FB20EB78D4443ADA361FB457A4F814235DA5D47AF9DFBCD092C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$File$FreeLibraryRead$HandleMultipleNamedObjectsPeekPipeStartupTypeWaitcallocsend
                                                    • String ID: $FreeLibrary(wsock2) failed (%u)$Time-out$WS2_32.DLL$WSACloseEvent$WSACloseEvent failed (%d)$WSACreateEvent$WSACreateEvent failed (%d)$WSAEnumNetworkEvents$WSAEnumNetworkEvents failed (%d)$WSAEventSelect$WSAStartup failed (%d)$failed to find WSACloseEvent function (%u)$failed to find WSACreateEvent function (%u)$failed to find WSAEnumNetworkEvents function (%u)$failed to find WSAEventSelect function (%u)$failed to load WS2_32.DLL (%u)$insufficient winsock version to support telnet
                                                    • API String ID: 1025660337-777782649
                                                    • Opcode ID: 550f2c67cbf4eacfeb1f291bfb3308f574507ad6f4b237ccfdc5e5a888c2ce55
                                                    • Instruction ID: f166369e1dc40951334891d93d61660e25d03fca595b2a3ec1c62002676cfc9c
                                                    • Opcode Fuzzy Hash: 550f2c67cbf4eacfeb1f291bfb3308f574507ad6f4b237ccfdc5e5a888c2ce55
                                                    • Instruction Fuzzy Hash: 8C128D71A0868281FB74AF35D4453B9A3A0FB45BA4FC64135DA4E477A8DFBCE260C721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                                    • String ID: array$number overflow parsing '$object$object key$object separator
                                                    • API String ID: 969624648-85532522
                                                    • Opcode ID: b6405eb53252c832b477e2a874fc3f5117e1c1e6332d5424c1ae42ea86489818
                                                    • Instruction ID: e6e553caadde70c2034c6fbab5a1d26475b2b790d5ab14156fc349234a8d1e97
                                                    • Opcode Fuzzy Hash: b6405eb53252c832b477e2a874fc3f5117e1c1e6332d5424c1ae42ea86489818
                                                    • Instruction Fuzzy Hash: 0492D562A18B85C6EB20EB78D4443ADA361FB457A4F814331EA6D47AF9DFBCD191C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Cert$Certificate$Chain$ErrorFreeLast$userStore$CloseContextCreateNameOpenString
                                                    • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain user: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                                    • API String ID: 561913010-2037819326
                                                    • Opcode ID: 3a24102a71b2336525493ae6322cc3c9751243c14857b0a6db1e5b77c088f834
                                                    • Instruction ID: 6bac6f788b03354b5f43574af4a0046025ff4d9a5968915be2f1494ced81e022
                                                    • Opcode Fuzzy Hash: 3a24102a71b2336525493ae6322cc3c9751243c14857b0a6db1e5b77c088f834
                                                    • Instruction Fuzzy Hash: D042AF72A18B4281EB30AB35E4402BDB7A1FB44B94FD24175DA5E07BA4DFBCE564C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastcallocfreegetsockname
                                                    • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                                    • API String ID: 2454324209-2383553807
                                                    • Opcode ID: bc7f489ceed5bebf9c9863e670abb60b4cf958572d0b222b88b322ebab1f6a85
                                                    • Instruction ID: abe9b653ae9ff6dfd064943a97f62d6b0ebf2121b2f8da36621bc8a763effff7
                                                    • Opcode Fuzzy Hash: bc7f489ceed5bebf9c9863e670abb60b4cf958572d0b222b88b322ebab1f6a85
                                                    • Instruction Fuzzy Hash: 7322F861A1C79282EB71BB31E4512BEA3A1FB45784FC64031EA4E477A5DFBCE614C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemallocstrncmp
                                                    • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                                    • API String ID: 1436789207-471711153
                                                    • Opcode ID: 5718b6b6f752219127d3f7c3aef787116c5d1319bd537024bb3abce0b2116589
                                                    • Instruction ID: 6dbbf7f15ac5d028f910fac7aa47a13411fd12ccc11fcc38ac18fa5b88122270
                                                    • Opcode Fuzzy Hash: 5718b6b6f752219127d3f7c3aef787116c5d1319bd537024bb3abce0b2116589
                                                    • Instruction Fuzzy Hash: 0BA19321B0975282FB71AB3E9854279A690AF45BD0FDA4032DD0E077F5EEBCE4658321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CreateFile_errnofree
                                                    • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                                    • API String ID: 1377488173-902404565
                                                    • Opcode ID: ac78859fa66405f88d6f75566aaaa946de7ed8a9283dd0255f9ad792d3f6f640
                                                    • Instruction ID: bfb58853df0f1164038780102104d8a471a0b6fccb3337693939f0ebb75a5acd
                                                    • Opcode Fuzzy Hash: ac78859fa66405f88d6f75566aaaa946de7ed8a9283dd0255f9ad792d3f6f640
                                                    • Instruction Fuzzy Hash: 66B1D261B1875282EB30BB36E4402A9A3A1BF44B94FC24175DE4D47BB4DFBCE524CB60
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                                    • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                                    • API String ID: 1339443121-1021110354
                                                    • Opcode ID: 63f72fa3398d8ceef60335f8fa278a53e7f9e04807cccb105859d0ec52c817d2
                                                    • Instruction ID: ac5585cace535f93e75847a3be454aea10e77ce522bf9ce68785088d79864376
                                                    • Opcode Fuzzy Hash: 63f72fa3398d8ceef60335f8fa278a53e7f9e04807cccb105859d0ec52c817d2
                                                    • Instruction Fuzzy Hash: 86027361B0D78185EBB1EB31A4643B9E7A4EF45788F8A0035EA4D077A5DFBCE464C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                                    • API String ID: 2190258309-2223379150
                                                    • Opcode ID: bedccf1a70ff9c3f2b5c259966900d26fbe34891b2c4630689b9baf8c93e7900
                                                    • Instruction ID: 350a9cff08847406ff0d3e15aecd8fe8b488352c63219c250390c8665323e66f
                                                    • Opcode Fuzzy Hash: bedccf1a70ff9c3f2b5c259966900d26fbe34891b2c4630689b9baf8c93e7900
                                                    • Instruction Fuzzy Hash: E9125232A08B4589EB20EF31D4946B9B7A4FB44B88F860075DE8E83B64DF7CD565C750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strncmp$memset
                                                    • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                                    • API String ID: 3268688168-2769131373
                                                    • Opcode ID: a009f355f28fcdbed4830991bce268b31999afd17b13938416f8c2b76571fec4
                                                    • Instruction ID: 477cd732e688823d738e4e83d6fb09e7b75efda6a5ec8ad88c9c786ae1b81b0a
                                                    • Opcode Fuzzy Hash: a009f355f28fcdbed4830991bce268b31999afd17b13938416f8c2b76571fec4
                                                    • Instruction Fuzzy Hash: 29E10522E1879285EB20EB35E4602B9A360FB89798FC25135EE4E43775DFBCE560C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                                    • String ID: array$number overflow parsing '$object
                                                    • API String ID: 958247072-579821726
                                                    • Opcode ID: 1a1b3e7b08e8a81959f7a818605a5613a4a02452d5d215884fc2aa604402ac4f
                                                    • Instruction ID: 11b9a7c2c7d99005d4e0ed0ae3c38ee3a032f5df36292e318029755b0060c650
                                                    • Opcode Fuzzy Hash: 1a1b3e7b08e8a81959f7a818605a5613a4a02452d5d215884fc2aa604402ac4f
                                                    • Instruction Fuzzy Hash: 7732C262A18B86C5EF20EB78D4443EDA361FB457A4F814231DA5D47AE9DFBCE192C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup$fclosefgetsfopen
                                                    • String ID: $default$login$machine$password
                                                    • API String ID: 431015889-155862542
                                                    • Opcode ID: 472ef1703f35c10f5f2dbf96da624fa7af97885e13d21ee44607018ada29ea5b
                                                    • Instruction ID: e0c0c21c4c1443c037ec5bba8ef6bcaf4713c8b80e177abba413e2265c260d8d
                                                    • Opcode Fuzzy Hash: 472ef1703f35c10f5f2dbf96da624fa7af97885e13d21ee44607018ada29ea5b
                                                    • Instruction Fuzzy Hash: 41A1BB21A1D68287FB71BF31955037AE690BF84794FCA0075DE4D46AB4EFBCE4A48720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _errno$strtol
                                                    • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                                    • API String ID: 3596500743-988243589
                                                    • Opcode ID: 668185a7090efd165fcdfc5cb0ff828d1f3255aaee98c408e1fb7102ef338266
                                                    • Instruction ID: 484ddf050b5eefff7bf4a93cb73239a41350b6903b96638a433b179cd045c12b
                                                    • Opcode Fuzzy Hash: 668185a7090efd165fcdfc5cb0ff828d1f3255aaee98c408e1fb7102ef338266
                                                    • Instruction Fuzzy Hash: 83F1D772F14A118AEB34EB74C8001BCB7A1BB54798F914236DE1E577F4DEB8A8258790
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                                    • String ID: @
                                                    • API String ID: 2041421932-2766056989
                                                    • Opcode ID: 67306df46e49f998d9e297aeff22ced6ffcf112999a3d86a2419870b5b05507d
                                                    • Instruction ID: 84465dc32133056880241789f23f3a88a006234dc9851dd48dfbcba34d65b143
                                                    • Opcode Fuzzy Hash: 67306df46e49f998d9e297aeff22ced6ffcf112999a3d86a2419870b5b05507d
                                                    • Instruction Fuzzy Hash: 79318D32708A8186EB60DF21E484A6AB764FBC4BD0F854131EE8E53B28DF7CD4258B50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_errno$FormatMessagestrchr
                                                    • String ID: Unknown error %u (0x%08X)
                                                    • API String ID: 1897771742-1058733786
                                                    • Opcode ID: b2cd3c313b156e4dadc1f13d62458ab67304cc37dc745d7a934235903b4d774f
                                                    • Instruction ID: 1864e364e4d902c4c43928cbf7e07e80da5a7413498869618d9985a614c6f661
                                                    • Opcode Fuzzy Hash: b2cd3c313b156e4dadc1f13d62458ab67304cc37dc745d7a934235903b4d774f
                                                    • Instruction Fuzzy Hash: BD214162A0C79186EB31AF32B40422ABA90BF44BD0FDA4534DA4A537B5CFBCD461C661
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                                    • API String ID: 0-2774518510
                                                    • Opcode ID: 93af53c4d5fbc85e99a08436875279f0cb014a5722ddeba43d349e832a4efbe2
                                                    • Instruction ID: 3084d251ab0719b02b86e0817dd0c26862f12b9e0636fecfdede270d178452ff
                                                    • Opcode Fuzzy Hash: 93af53c4d5fbc85e99a08436875279f0cb014a5722ddeba43d349e832a4efbe2
                                                    • Instruction Fuzzy Hash: F342D762A0C7C24AEF75AA3581703B9B791EB43744F9A4035EE5D072A5DFBCA870D720
                                                    APIs
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF79156C618,?,?,?,?,?,?,00007FF79158385E), ref: 00007FF79156C696
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF79156C618,?,?,?,?,?,?,00007FF79158385E), ref: 00007FF79156C7FD
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79156C95C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfreemalloc
                                                    • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                                    • API String ID: 3985033223-3943651191
                                                    • Opcode ID: c4fc4088351705819caa032675a141e4bac6c062f06e1160b91af0015c5f2b01
                                                    • Instruction ID: 428e1dd1afd2b922e96675d17bb83bdc999f19d24339772ff56e4fc5fd89d6ed
                                                    • Opcode Fuzzy Hash: c4fc4088351705819caa032675a141e4bac6c062f06e1160b91af0015c5f2b01
                                                    • Instruction Fuzzy Hash: 4691F532908AD185E731AB35A4003BAEBA0EB457E4F894235DAAD477E6CF7DD411C750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc$ErrorLastbind
                                                    • String ID: bind() failed; %s
                                                    • API String ID: 2604820300-1141498939
                                                    • Opcode ID: 1f7ad452108c972423b21787ed8b4d38d2cdafae232374323f13c919f82a3405
                                                    • Instruction ID: 9705a909f6407b3bcdbba543b0a008559d79a08584f874139de6d6fdf0ff6abc
                                                    • Opcode Fuzzy Hash: 1f7ad452108c972423b21787ed8b4d38d2cdafae232374323f13c919f82a3405
                                                    • Instruction Fuzzy Hash: A151C032A08B8686EB34AF31D4513B9B2A0FB48B84F854035DA5D477A5EFBCE5718360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc$ErrorLastbind
                                                    • String ID: bind() failed; %s
                                                    • API String ID: 2604820300-1141498939
                                                    • Opcode ID: 3a03a8b82e15973fec8229579a3ff0e8406018c67cfd6d32475717b64ebbb72d
                                                    • Instruction ID: bb708388ea4df82a0f25b6380c369c1f05b44c840852f9f1a6bcdbf764b4433a
                                                    • Opcode Fuzzy Hash: 3a03a8b82e15973fec8229579a3ff0e8406018c67cfd6d32475717b64ebbb72d
                                                    • Instruction Fuzzy Hash: 4B51B372A0878586FB24AB35D4553ACA7A0FB48B84F894039CB4D47791EFBCE5728721
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                                    • API String ID: 0-2102732564
                                                    • Opcode ID: 1af1bb0d0e0d98739592db4711d353d8e8562c20c4bb7a1eb49d8873c58bd183
                                                    • Instruction ID: d1bb993e24961f1e773359e2ea1031dea2cad0b3cfdd55d43eef3d2e0b2aee66
                                                    • Opcode Fuzzy Hash: 1af1bb0d0e0d98739592db4711d353d8e8562c20c4bb7a1eb49d8873c58bd183
                                                    • Instruction Fuzzy Hash: D121A1D1E69D4A87FF34E7B9E4187F582229B547C0EC60532E80E063B1DEEC6579C2A1
                                                    APIs
                                                    Strings
                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7915901BB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                    • API String ID: 1848478996-631824599
                                                    • Opcode ID: c1f79a6cffa7702fddec966376d19884062fa61c452987c0d8b36de73eef2cfc
                                                    • Instruction ID: c090a09db6b948dcff56177baa90f0f849d0596802d38774c5f1fe751ff5ea4d
                                                    • Opcode Fuzzy Hash: c1f79a6cffa7702fddec966376d19884062fa61c452987c0d8b36de73eef2cfc
                                                    • Instruction Fuzzy Hash: 63118F32A14B92A3E764AB32DA44379B2A4FF04751FC14539C64D82A60EFBCE474C721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Crypt$Context$Release$AcquireRandom
                                                    • String ID: @
                                                    • API String ID: 2916321625-2766056989
                                                    • Opcode ID: 69f15f9a9a7c8eed39e0ad55252fea188c9025dac10a69dddba328bd9e155241
                                                    • Instruction ID: 17ff108d0b4c14822f1297384ca04a963f8551e27f057e6ad3986d476b470e05
                                                    • Opcode Fuzzy Hash: 69f15f9a9a7c8eed39e0ad55252fea188c9025dac10a69dddba328bd9e155241
                                                    • Instruction Fuzzy Hash: 38F08661B08A8182EB209B71F444326E760EFC8BE4F854031DE8D86678DFBDC0958710
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                                    • API String ID: 0-1379995092
                                                    • Opcode ID: e2543ab63c006391ad31cdf878f6cac353a24e61942cf3d8081366c01b72d374
                                                    • Instruction ID: 7c3b6e7ab1f599594583a988dfbcc82767b77d909675dc317379b7d167e50e69
                                                    • Opcode Fuzzy Hash: e2543ab63c006391ad31cdf878f6cac353a24e61942cf3d8081366c01b72d374
                                                    • Instruction Fuzzy Hash: 88422732A0CA8345E7357A389560379E791FF80794FD24230EE5E476E8DFBCE9618620
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                                    • String ID:
                                                    • API String ID: 2110207923-0
                                                    • Opcode ID: a46e2648ee86e2c0f37e498fedcf08a1eab206583e9d07077b8b6bb761982f86
                                                    • Instruction ID: 69baabab37fe4919bd9335e7b68bb0f550d3fb6d4d253e4539a8fda7aba07b26
                                                    • Opcode Fuzzy Hash: a46e2648ee86e2c0f37e498fedcf08a1eab206583e9d07077b8b6bb761982f86
                                                    • Instruction Fuzzy Hash: 3D017136609A8182EB20DF70E45432AF330FB85BD8F944531DA9E46A68CF7ED458CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Crypt$AcquireContextCreateHash
                                                    • String ID: @
                                                    • API String ID: 1914063823-2766056989
                                                    • Opcode ID: d52e61fd25a7f916a7c5133771f9c384b00007c652c18fd4c669bfa2446a9d06
                                                    • Instruction ID: d9b1352c464415ff2e7d4cd8d0667f7d3a8d52eac058822f63230ae1b9c013c7
                                                    • Opcode Fuzzy Hash: d52e61fd25a7f916a7c5133771f9c384b00007c652c18fd4c669bfa2446a9d06
                                                    • Instruction Fuzzy Hash: 36E0D861B1469243F7305B71E401B16A350FB84788FC58030CE8C4BA28DF7DC0618B14
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _getpidhtons
                                                    • String ID:
                                                    • API String ID: 3416910171-0
                                                    • Opcode ID: 894d725f8ee9e73b7dadf653a1e1c9b1c15954cc7323a323571c3c5b5ae29e7b
                                                    • Instruction ID: be006d704ae8b3b3c2e3a02e577c6151d3eb77429a347fd55d48aa7c677db22b
                                                    • Opcode Fuzzy Hash: 894d725f8ee9e73b7dadf653a1e1c9b1c15954cc7323a323571c3c5b5ae29e7b
                                                    • Instruction Fuzzy Hash: B6117C26A247D0CAD304CF35E4401AD77B0FB5CB88F44962AFB8987B18EB78D6A0C745
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                                    • Instruction ID: 7003c8a70c7b014fc105ebf1f9820d0bbf5dec161cf0e3ddac4f2f79c91ae324
                                                    • Opcode Fuzzy Hash: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                                    • Instruction Fuzzy Hash: 67611662B09B8482DB20EB29E4442B9A3B1FB597D4F928235DF5D47798EF7CE452C310
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cc5c030e877256e00af56ed4cc02a429cec546e0181575966b7d8f1db798952c
                                                    • Instruction ID: cab09ebc68f535b48bfbfa621617cf76abbfe8c6871e1f8449aebc9578f6d1c6
                                                    • Opcode Fuzzy Hash: cc5c030e877256e00af56ed4cc02a429cec546e0181575966b7d8f1db798952c
                                                    • Instruction Fuzzy Hash: 48A02431F05C45C0D3104710F1D0D105350F7CC7343C14031C40D45430CD35D041C300
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strcmp$strncpy$strchr
                                                    • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                                    • API String ID: 1395212091-3550120021
                                                    • Opcode ID: 6bcc64522f23e78bcfa6ba4e59cb95d37b9f069fa90228527b8c1784a677c993
                                                    • Instruction ID: e416dbda5f753b96ae3c6ad9a5c4f54f3e1483a5521eae14ffe50fd5b9413d3b
                                                    • Opcode Fuzzy Hash: 6bcc64522f23e78bcfa6ba4e59cb95d37b9f069fa90228527b8c1784a677c993
                                                    • Instruction Fuzzy Hash: A0120B10B1C91799FF70B734D8401BD92A5AF217C8FC64432E90E865B9EEEDE525C3A2
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$CounterPerformanceQuery
                                                    • String ID: Closing connection %ld
                                                    • API String ID: 3490100708-2599090834
                                                    • Opcode ID: 66c61368546927fd1359d02804c66d771c8356d5d4f876d0107812fdc61f390a
                                                    • Instruction ID: db7692e5a3d354bd4467c31d06826c8d810cc8eea9eeaf5f1707ffc414d9df88
                                                    • Opcode Fuzzy Hash: 66c61368546927fd1359d02804c66d771c8356d5d4f876d0107812fdc61f390a
                                                    • Instruction Fuzzy Hash: 54C11135948B8182E750AF31E8502AD7374FB85F99F894131EE9E0B7A9DF78D1A5C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree$strpbrk
                                                    • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                                    • API String ID: 2737852498-2994854565
                                                    • Opcode ID: 4b1ba4ef0e754902e9302bdf50899b8d13fa6e43f69a0c1b50311882c7b3448f
                                                    • Instruction ID: 785d323c974c5c7a1d550096a661a6a7e7882736dc4996d68772757d09c45a49
                                                    • Opcode Fuzzy Hash: 4b1ba4ef0e754902e9302bdf50899b8d13fa6e43f69a0c1b50311882c7b3448f
                                                    • Instruction Fuzzy Hash: 62D19E21A4975282FF31EB3198516BDA3A4BF46B88FC60131DD4D077A5EFBCA665C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: c5a734ebc3141eec67d9ddda7a187d959a8a3341b828b34bb7aac0f917821ae4
                                                    • Instruction ID: 07a2d3850076ef7b51c1d31e59dc136460b437455cbf6de058ba17028f753fbb
                                                    • Opcode Fuzzy Hash: c5a734ebc3141eec67d9ddda7a187d959a8a3341b828b34bb7aac0f917821ae4
                                                    • Instruction Fuzzy Hash: 6271CE35588B8181D750AF31E8942BD73B8FB85F99F890135DE8E467289F7891B9C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc$_strdupfreehtonsmemset
                                                    • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                                    • API String ID: 130798683-4053692942
                                                    • Opcode ID: 6d7251bca27c3864009dc5819f83b51b1917a2211a130594af636cb1cef71ed5
                                                    • Instruction ID: 90d661ba2cb3a7cefcff869be828a38758331ca1c95ce99e855f7b6c91b61cc4
                                                    • Opcode Fuzzy Hash: 6d7251bca27c3864009dc5819f83b51b1917a2211a130594af636cb1cef71ed5
                                                    • Instruction Fuzzy Hash: A9E18E32B086868AEB70AF31D4503BAB7A4FB44B84FC64135DA4D47AA4DFBCE565C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                                    • String ID: array$number overflow parsing '$object
                                                    • API String ID: 1346393832-579821726
                                                    • Opcode ID: 7c1e61ec83b13dd7f40079cca3bc6a8e34c64a4870a3b8b424a60f3ed375657d
                                                    • Instruction ID: 83d443111be84be980bc74c79c7ce20b01c61b596d199d5de9cc64d19dfe3e3a
                                                    • Opcode Fuzzy Hash: 7c1e61ec83b13dd7f40079cca3bc6a8e34c64a4870a3b8b424a60f3ed375657d
                                                    • Instruction Fuzzy Hash: F612B362A18B8685FB24EB78D4443ADA361FB457A4F814231DA6D47AF9DFBCD092C310
                                                    APIs
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DBE6
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DC0C
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DC1D
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DC8B
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DCBC
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DCDC
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DCEE
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DD50
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DDC1
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DDD8
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DE93
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DF07
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79157D31F), ref: 00007FF79157DF10
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$free$_strdupcalloc
                                                    • String ID: LDAP$base$one$onetree$sub$subtree
                                                    • API String ID: 112326314-884163498
                                                    • Opcode ID: 91fa15a27f89d16a131c80c7ea3614bffe45f23341aa2a250908849b6735146f
                                                    • Instruction ID: 3369ba5e4e66e3997bcd44fc840ae16088d94faade4ccb61f1b8ac0981aaf8d2
                                                    • Opcode Fuzzy Hash: 91fa15a27f89d16a131c80c7ea3614bffe45f23341aa2a250908849b6735146f
                                                    • Instruction Fuzzy Hash: 22B1B222A09B8286FB71AB359401279B3A4FF48780FC64535DE4D47BA4EFBCE565C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                                    • API String ID: 1294909896-115817326
                                                    • Opcode ID: 9a5dd6769044de479a70182053e2c0233660193c77bad4688d5a90c86bd59f2e
                                                    • Instruction ID: c9d80064cc09efb75bf8be96969dc6ce02d49fcf64543eab350a9c05d3a6dc16
                                                    • Opcode Fuzzy Hash: 9a5dd6769044de479a70182053e2c0233660193c77bad4688d5a90c86bd59f2e
                                                    • Instruction Fuzzy Hash: A9916021A0CA9281FB72AB3594503B9A390AB457D4FD64032DA4C07BB1DFACE876C761
                                                    APIs
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                    • memcpy.VCRUNTIME140 ref: 00007FF7915364D6
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF791536568
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7915365A9
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915366F3
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791536732
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791536780
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915367C1
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153681E
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915368D8
                                                      • Part of subcall function 00007FF79158F240: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79153443E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF79158F25A
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791536919
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915369E6
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791536A27
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF791536A4A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                                    • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                                    • API String ID: 264867259-3075834232
                                                    • Opcode ID: 884d4d64e130a3a33ebe2cb778bf15f05b6b893c67567ab1d6d0e446da3762d5
                                                    • Instruction ID: 15b731af1ffc06e4d02b5721b645f166b134aad8e8b6b3f2a4e72280feb73738
                                                    • Opcode Fuzzy Hash: 884d4d64e130a3a33ebe2cb778bf15f05b6b893c67567ab1d6d0e446da3762d5
                                                    • Instruction Fuzzy Hash: 8012D262F08A4685FB24AB75E4403ADA761EB447E8FC14335DA6D03BE9DFBCE1958310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                                    • String ID:
                                                    • API String ID: 1087521380-0
                                                    • Opcode ID: 42819f0de227d83307235c09ff20fa97e44c3f3a0c70684837e499fa3a50fdd4
                                                    • Instruction ID: 9f014971d31633531edd767e4cb3bd220f97e2380ca02bcdc00c12785dcd93ff
                                                    • Opcode Fuzzy Hash: 42819f0de227d83307235c09ff20fa97e44c3f3a0c70684837e499fa3a50fdd4
                                                    • Instruction Fuzzy Hash: 45B1A425A0AB4245FF75AB329551279A7E0AF49B94F9A0134CE5E037E8DFBCE474C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchrstrrchr$_strdupstrstr
                                                    • String ID: .$/$/$/$?
                                                    • API String ID: 2325335452-1821401756
                                                    • Opcode ID: ccdfae4e3a0ac5480a9ebe09bf72e98d54eb1acbdd30c7ab6d6d7971d1566612
                                                    • Instruction ID: 15734dcf263d0ed84e2d1b326896f567f88268fa9c0a588fb0bfcf947cb0b006
                                                    • Opcode Fuzzy Hash: ccdfae4e3a0ac5480a9ebe09bf72e98d54eb1acbdd30c7ab6d6d7971d1566612
                                                    • Instruction Fuzzy Hash: F981D412A0C38246FB756B359606339DA92EF45784FCA8070CE4D067E2EEBCB5658321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$free
                                                    • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                                    • API String ID: 3578582447-31095704
                                                    • Opcode ID: e8f4a5cf3743ac80dc76b9dd15f71b43485728e1c7c409c8df704b1d45515fd7
                                                    • Instruction ID: b20ffe3cedbd5756fbc8063017106325afa23cd8a111390ecb782d9b50523063
                                                    • Opcode Fuzzy Hash: e8f4a5cf3743ac80dc76b9dd15f71b43485728e1c7c409c8df704b1d45515fd7
                                                    • Instruction Fuzzy Hash: 3281AF21A0878240FB31BB3195112B9E296AF45BD4FCA5131DD4D077FAEEACE621C331
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: dbd2a01beb44ae9c484da9ddd037785085b283a78c2108060b64aeb10dd90823
                                                    • Instruction ID: f0134b9a3896d37502444572e79237c4f8932a4323080deac2a4f8701975c8eb
                                                    • Opcode Fuzzy Hash: dbd2a01beb44ae9c484da9ddd037785085b283a78c2108060b64aeb10dd90823
                                                    • Instruction Fuzzy Hash: 6E91E236648B8193E7499F30E9902ADB368FB48F89F440135EF9D47764DF74A2B58320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                                    • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                                    • API String ID: 1094891576-1753329177
                                                    • Opcode ID: 6f855ceec02e5d1c5cf6e97d7d867732ca543a345b7f70c80b9cd5be2d54186d
                                                    • Instruction ID: 909d207288908e991c3ce601134a32b259be9c3f93559703cfcd280b8f76ac09
                                                    • Opcode Fuzzy Hash: 6f855ceec02e5d1c5cf6e97d7d867732ca543a345b7f70c80b9cd5be2d54186d
                                                    • Instruction Fuzzy Hash: 9DD1D522A1868645EF71AB31D5203F9E360FB44798FC68132EA5E17AE5DFBCE415C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                                    • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                                    • API String ID: 3103143820-2414412286
                                                    • Opcode ID: 88e657e133bf61caa3a5ffb93747923844effb511450c2bf531675a80efeffa8
                                                    • Instruction ID: eaf30ed71e3eaebf15b82e827b9d470e2fab7e259aff14c53e56442214c94b64
                                                    • Opcode Fuzzy Hash: 88e657e133bf61caa3a5ffb93747923844effb511450c2bf531675a80efeffa8
                                                    • Instruction Fuzzy Hash: 1CD1B422B0C68292EBB4AB35E5512B9F7A0FB45794F810032EA4D03B65DFBCE674C711
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                                    • API String ID: 1294909896-874090715
                                                    • Opcode ID: e9fe8bcaccbab45bfa6111f1acaa2d1480d37b1e05d67242dc53f3fae66d293c
                                                    • Instruction ID: 7b54c68a1c351a27d79c61c49be27a9cee93fe8a6666d678e75651841551fd3f
                                                    • Opcode Fuzzy Hash: e9fe8bcaccbab45bfa6111f1acaa2d1480d37b1e05d67242dc53f3fae66d293c
                                                    • Instruction Fuzzy Hash: ABA1BD22E0C65285FB21FB31E4505BDA7A5BB44798FC64431EE0D53AA5EFBCE9648320
                                                    APIs
                                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A453
                                                    • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A4CD
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A4F1
                                                    • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A540
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A57A
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A58C
                                                    • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A59F
                                                    • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A5BA
                                                    • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A5D0
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154A5D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                                    • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                                    • API String ID: 1368378007-4087121635
                                                    • Opcode ID: 0848c39e1e35fc6b94b29dfdee7cce67205fe9ab1c0595f78b98a1fc77592385
                                                    • Instruction ID: bd2ced17d59ffe66315fdafec48d30bf3269c3051ca572f6581418d53847951a
                                                    • Opcode Fuzzy Hash: 0848c39e1e35fc6b94b29dfdee7cce67205fe9ab1c0595f78b98a1fc77592385
                                                    • Instruction Fuzzy Hash: 39516321A0D64245FFB5BB3299942BAA2A0BF45BD4FD64431DD0F477B0EFBCE4258260
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                                    • API String ID: 0-3760664348
                                                    • Opcode ID: 33a5bea1ac593d9cd732afc852774ccc744dd55d3b203ab22b10a6d70a5f732d
                                                    • Instruction ID: eab4f2c02d56032ad51cae1570dbd6b1d848ea0cf0d673352da0cf6341857fb1
                                                    • Opcode Fuzzy Hash: 33a5bea1ac593d9cd732afc852774ccc744dd55d3b203ab22b10a6d70a5f732d
                                                    • Instruction Fuzzy Hash: B3E1E2A190CA8189EB74AF35D050379BBA0EB45784FC58136EA4D077B5CFBCE464CB60
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153561E
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153564C
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153565A
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791535694
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915356E5
                                                    • memset.VCRUNTIME140 ref: 00007FF791535513
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                      • Part of subcall function 00007FF791536360: memcpy.VCRUNTIME140 ref: 00007FF7915364D6
                                                      • Part of subcall function 00007FF791532000: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532171
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791535852
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153587E
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153588C
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915358C7
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153591A
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791535A01
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF791535A19
                                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF791535A26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                                    • String ID: value
                                                    • API String ID: 2102519606-494360628
                                                    • Opcode ID: 69eea14589571b447657b7d147a33fd280fb5a3c08a5820789b19d2ce2bc6e59
                                                    • Instruction ID: 77e6442d9a9f4411a54c96b839b0749fc237f16232a6c58ddbfc39958fdeb221
                                                    • Opcode Fuzzy Hash: 69eea14589571b447657b7d147a33fd280fb5a3c08a5820789b19d2ce2bc6e59
                                                    • Instruction Fuzzy Hash: 62F1F962A18B8185FB20EB74E4403ADA760FB857B4F915231EA9D43AF9DFBCD195C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                                    • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                                    • API String ID: 2572311694-3353508759
                                                    • Opcode ID: 84a0a7e78fd404ba2a119c487caa6af3f86973d57e28830e8e7364884e293f92
                                                    • Instruction ID: 7d8515c60d940c0c1f41787aa34a455b890a74fc76cad29d82d687c3895641cd
                                                    • Opcode Fuzzy Hash: 84a0a7e78fd404ba2a119c487caa6af3f86973d57e28830e8e7364884e293f92
                                                    • Instruction Fuzzy Hash: 25B1B161B08E8282EB70AB35D8103B9A3A1EF84BD5FC64132D94D477A4DFBCE455C7A0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$strchr$_strdup
                                                    • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                                    • API String ID: 1922034842-2519073162
                                                    • Opcode ID: 55d68476e77e030ead976d7ce9c390be74ab7be76865675c77030afcc710caa6
                                                    • Instruction ID: ffd7ad6a707e7260b38804b15101336a0f114af7eaf0d9ebef3b855a6299c484
                                                    • Opcode Fuzzy Hash: 55d68476e77e030ead976d7ce9c390be74ab7be76865675c77030afcc710caa6
                                                    • Instruction Fuzzy Hash: D7919A21A08A4245FB71BB31D49037DA7A0AF91BC4FC64031CE4E8B6B5EEBCE525C361
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID:
                                                    • API String ID: 2653869212-0
                                                    • Opcode ID: a147aac26919b0f1c38b59227e6e8f7bc4977919d8996d7f10e718cdd5e66146
                                                    • Instruction ID: 9c8cbf332c9b4e5be5e300e9adbb4cffc3c08f24f3c8b62735b209f323961ae5
                                                    • Opcode Fuzzy Hash: a147aac26919b0f1c38b59227e6e8f7bc4977919d8996d7f10e718cdd5e66146
                                                    • Instruction Fuzzy Hash: 2CB13B32A0AB8196FB65EF29E554369B3A0FB44B54F950136CB8D47BA0DF7CE0748360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdupmalloc
                                                    • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                                    • API String ID: 111713529-3006446216
                                                    • Opcode ID: 37e8d70bddd260822cb3e5423af062e5691996698d2b4960dbb5117c7c7aab1b
                                                    • Instruction ID: c2420dd327bbe7c413ed2809d0c41cace01c2e2a96b20ae4a43f4eeb67449964
                                                    • Opcode Fuzzy Hash: 37e8d70bddd260822cb3e5423af062e5691996698d2b4960dbb5117c7c7aab1b
                                                    • Instruction Fuzzy Hash: 2071DA66E0D7C285FB21AB3594042B9FBA1EF45748FDA4072CA8E03772DE6CE165C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                                    • API String ID: 2190258309-1086287758
                                                    • Opcode ID: 6fe04d466f9de332a77138c64db72be395503f3e81040d299b23a551850e43aa
                                                    • Instruction ID: b482e07ddf3f90512d54f817ee92c3b5159cd70212cf7f4b58b7ec74d751c25b
                                                    • Opcode Fuzzy Hash: 6fe04d466f9de332a77138c64db72be395503f3e81040d299b23a551850e43aa
                                                    • Instruction Fuzzy Hash: 70B12132A08B468AEB20AF75E8902ADB7B4FB48B94F810035DE4E47B64DF7CD565C750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                                    • API String ID: 1294909896-1220118048
                                                    • Opcode ID: 35af8839f0ad4e13f6ccc940b75cc49f4155902fa16ea1e5167c3a1ddd2ec708
                                                    • Instruction ID: 26fbba892d3ae57e3f098799d2063b3c8794f69c81d77f8682d44dfb2718f2bf
                                                    • Opcode Fuzzy Hash: 35af8839f0ad4e13f6ccc940b75cc49f4155902fa16ea1e5167c3a1ddd2ec708
                                                    • Instruction Fuzzy Hash: 64715C61A0C74682EB34FB7195401B9A351FF89B80FC54072EE8D07BA9EFBCE521C660
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdupmalloc
                                                    • String ID:
                                                    • API String ID: 111713529-0
                                                    • Opcode ID: a220ef980d97c336bb61ed3e073871ae36a0110a5c128f20a6c0c3245b06c8c1
                                                    • Instruction ID: 449040c0d379cb4cc19e22ee6b582ff4d19e4f1edd1621683a4133545de4b7a6
                                                    • Opcode Fuzzy Hash: a220ef980d97c336bb61ed3e073871ae36a0110a5c128f20a6c0c3245b06c8c1
                                                    • Instruction Fuzzy Hash: DE616C76A45B4182EB25EF26E44452DB3A4FB48B95F864035CF8D43B60EFBCE4A5C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                                    • API String ID: 1294909896-2312071747
                                                    • Opcode ID: e42146504e070dac4c609b6460658906fe02d1a0aca4d53f740276dafcef5f16
                                                    • Instruction ID: 03d88aec8c68b34ceeee4e90aa587cd2e5a9267a8b2b8e3f56c944a5198add1a
                                                    • Opcode Fuzzy Hash: e42146504e070dac4c609b6460658906fe02d1a0aca4d53f740276dafcef5f16
                                                    • Instruction Fuzzy Hash: 7BD1C461A0C78245EB74BB3195913B9A791FB413A4FC20631DA6F837E2DFBCE5648321
                                                    APIs
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                      • Part of subcall function 00007FF791536360: memcpy.VCRUNTIME140 ref: 00007FF7915364D6
                                                      • Part of subcall function 00007FF791532000: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532171
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153A8A1
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153A8CF
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153A8DD
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153A917
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153A974
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153AA2D
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153AA5B
                                                    • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79153AA69
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153AAA3
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153AAF4
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153AB3E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                                    • String ID: value
                                                    • API String ID: 3212548336-494360628
                                                    • Opcode ID: b86305704a2081543833dd945491b022b734e9d019d359bb9389a3b0748bd819
                                                    • Instruction ID: 4a9c2966acfa684c25a355299176af630e00f06bcc12206a1dd7a136ffdd351c
                                                    • Opcode Fuzzy Hash: b86305704a2081543833dd945491b022b734e9d019d359bb9389a3b0748bd819
                                                    • Instruction Fuzzy Hash: FCA19222A18A4586FB20EB78E4443ADA361FB457B4F910731DA6D43AF9DFBCD092C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                                    • String ID: Unknown error %d (%#x)
                                                    • API String ID: 4262108436-2414550090
                                                    • Opcode ID: 07a3e6cbba628c85def731112674b20e539a41a9152effcbd6561618a3fe6171
                                                    • Instruction ID: 1a0c7f67424394a1f85988ffa0c82173bfc094ab5c07b0489895c8754c7d44ff
                                                    • Opcode Fuzzy Hash: 07a3e6cbba628c85def731112674b20e539a41a9152effcbd6561618a3fe6171
                                                    • Instruction Fuzzy Hash: 6431AF21A0866285EF257F31B810279E691AF84F90FDA4435CE4E4BBE5DEBCE421C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$calloc$malloc
                                                    • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                                    • API String ID: 3103867982-1477229593
                                                    • Opcode ID: be202954af5afef578d3fda2cf1742c2465f7f1582f3dceee6ea873e827d8603
                                                    • Instruction ID: 4863b157b1f984bfd97d6a81e8dcd85d99d4bb291b19162faf73165433f717f8
                                                    • Opcode Fuzzy Hash: be202954af5afef578d3fda2cf1742c2465f7f1582f3dceee6ea873e827d8603
                                                    • Instruction Fuzzy Hash: 04C17072A05B4186EB21EF75E4402ADB7B4FB44B88F810076DE4D47B68DFB8D865C790
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                                    • API String ID: 2190258309-1457932261
                                                    • Opcode ID: 90c683ed628edd05eee638d2d473ada20245a5175e9331b5212fab1e1c23a4b5
                                                    • Instruction ID: 32cf8b8a61a85db6b43fa60176644ac7ccf9f135ae973a9812493cfd522ba5eb
                                                    • Opcode Fuzzy Hash: 90c683ed628edd05eee638d2d473ada20245a5175e9331b5212fab1e1c23a4b5
                                                    • Instruction Fuzzy Hash: B661E161A0878285EB31AB31E8447FAB3A1BB45794FC54575CD4E07BA5EFBCE164C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                                    • API String ID: 1294909896-3837278924
                                                    • Opcode ID: 1820f4d42e87d89d51ca5d45a598d15fe1c3d8f54c2fe123ad055be94eb0b458
                                                    • Instruction ID: a6a41f0ea12a555db328514e0c5bd84a38c2b3fe3a56f8f4987d43c932fa2af9
                                                    • Opcode Fuzzy Hash: 1820f4d42e87d89d51ca5d45a598d15fe1c3d8f54c2fe123ad055be94eb0b458
                                                    • Instruction Fuzzy Hash: EDD1B362A08AC285EB21DF34D0403B9B7A1FB45B98FC68132CA5D477A5DFBCD655C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastsend
                                                    • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                                    • API String ID: 1802528911-931584821
                                                    • Opcode ID: c9d7d531f4bda765586f201d62c922e680e0a503d9d61c691f3087e0ef080336
                                                    • Instruction ID: a0fd13e5bcfab22b50f19db085d02902a1c4ccbc36e469eddde275b49cdbf086
                                                    • Opcode Fuzzy Hash: c9d7d531f4bda765586f201d62c922e680e0a503d9d61c691f3087e0ef080336
                                                    • Instruction Fuzzy Hash: 5191A222608AC185F731AF24E4457EAA3A1FB447A8F890231EE4D07BA5DFBCD255C750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: sendto$_time64
                                                    • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                                    • API String ID: 2327272419-1785996722
                                                    • Opcode ID: 4dfb3d0c330fb7bae6d336b1dfb1b7d74036dc2250991759a54dc6b0462ee2eb
                                                    • Instruction ID: a61b8e6f13db370b3d5220915b6c4dc0782deba84e61681772b1719a57eb91fc
                                                    • Opcode Fuzzy Hash: 4dfb3d0c330fb7bae6d336b1dfb1b7d74036dc2250991759a54dc6b0462ee2eb
                                                    • Instruction Fuzzy Hash: DD91AA72608782C6D721DF39D4503A9BBA0FB88B88F858132DA4D8B768DF79D516C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                                    • API String ID: 3510742995-1652449680
                                                    • Opcode ID: e47f53414ed1b213568cc64cf61c9f89f4be9add219a6ef7daa0ce3f09731cfe
                                                    • Instruction ID: 7b0b807d5dd9464ed05fee0f398d7c2e82b2ebbfaa7e0f57675a1a38f084710b
                                                    • Opcode Fuzzy Hash: e47f53414ed1b213568cc64cf61c9f89f4be9add219a6ef7daa0ce3f09731cfe
                                                    • Instruction Fuzzy Hash: 45A18171A18A8281E770AF30D4643F9B351EB85B94FDA0131ED4E4B2A5EFBCE465C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                                    • API String ID: 1294909896-3146291949
                                                    • Opcode ID: 39d108f7ef6bee2c7c75311daece297296a6f6b8611281b7dd85ef189c69a579
                                                    • Instruction ID: 70cc5d5f788fdcf2dc4093fdbafc3ad1a1d611339c6e4773e0811545158d61d6
                                                    • Opcode Fuzzy Hash: 39d108f7ef6bee2c7c75311daece297296a6f6b8611281b7dd85ef189c69a579
                                                    • Instruction Fuzzy Hash: 5F916E21A0CE4285FB74BB3195503B9A2A0FF457C4F864835DA9D476A5EFFCE461C3A0
                                                    APIs
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555D4
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555EA
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555FE
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555612
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555626
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79155563A
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79155564E
                                                      • Part of subcall function 00007FF7915555C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555662
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791554662
                                                      • Part of subcall function 00007FF79157E590: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5A5
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5BF
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5DA
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5F6
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E612
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E62A
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E642
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E65A
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E672
                                                      • Part of subcall function 00007FF79157E590: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E68A
                                                      • Part of subcall function 00007FF79157E590: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E6A4
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF791554866
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7915548A9
                                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7915549EE
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF791554A6B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$free$callocstrtoul
                                                    • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                                    • API String ID: 954404409-4150109901
                                                    • Opcode ID: 8dc1ee1bd944df6d93852fd348251f1ddf18e2558975760cbf580229279dbdaa
                                                    • Instruction ID: 26270ac1e73eba9e8c3955b8b7cc5ca55b55ea3e35813b9079b025bbaab35a2b
                                                    • Opcode Fuzzy Hash: 8dc1ee1bd944df6d93852fd348251f1ddf18e2558975760cbf580229279dbdaa
                                                    • Instruction Fuzzy Hash: FAC1A431A0C68286EB7AAB31D5613F9A390FB45744F854031EA0D4B6A5EFBCF975C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc$_time64calloctolower
                                                    • String ID: :%u$Shuffling %i addresses
                                                    • API String ID: 133842801-338667637
                                                    • Opcode ID: 533c27ae44850a2ed3ff981f35d7db46656ead4ac9f49beca8792eb01a1426fd
                                                    • Instruction ID: f8c2742299331bf243a4ed9a8a0c8e0ad7931069de736f9f21446ecb488d4f6c
                                                    • Opcode Fuzzy Hash: 533c27ae44850a2ed3ff981f35d7db46656ead4ac9f49beca8792eb01a1426fd
                                                    • Instruction Fuzzy Hash: CC71A272A08A4281EB20AF21E5107A9E761FB48B94FC68531DE4E077A5EFBCE455D710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                                    • API String ID: 1294909896-1896214517
                                                    • Opcode ID: d736805c5c88d0744446b6d40205f69f1f7ebc070f4f0a308762f5cdb5e4a9bd
                                                    • Instruction ID: 79da9047486a7a32debf83b667ad798375bccb663db2e9e80eab53cab9f7386b
                                                    • Opcode Fuzzy Hash: d736805c5c88d0744446b6d40205f69f1f7ebc070f4f0a308762f5cdb5e4a9bd
                                                    • Instruction Fuzzy Hash: B6D19172A0978286EB70EF20E4403A9B7A4FB84754F860176DE8C07BA8DFBCD555C725
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                                    • API String ID: 2190258309-1670639106
                                                    • Opcode ID: 0463735639b977c753d8d2a3a11af8177f0cd73d3052a1dbbd747a58cf5a7cd0
                                                    • Instruction ID: c4af43ba8ec34b70970e6f6e89da6d149690480fef9b0ef09bd7c8d266d739c8
                                                    • Opcode Fuzzy Hash: 0463735639b977c753d8d2a3a11af8177f0cd73d3052a1dbbd747a58cf5a7cd0
                                                    • Instruction Fuzzy Hash: 74A17522908E8285EB71AF31D4443B8A790FB447D8F851431EACE47AA5DFBDD4A5C3A1
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F14B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F1B1
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F1BF
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F2BD
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F326
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F33E
                                                      • Part of subcall function 00007FF79157E290: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79157E2A0
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F366
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F37D
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F3A2
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F3EF
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79157F404
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F54C
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F556
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F560
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F56A
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F574
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F57E
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F588
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F592
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F59C
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F5A6
                                                      • Part of subcall function 00007FF79157F540: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F5B0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$calloc$_strdup
                                                    • String ID: ,$:
                                                    • API String ID: 2460172880-4193410690
                                                    • Opcode ID: 5075bd5def5fdaba7dde46dc608fff5f5a6b59d6e4ebdcca4be625b992156916
                                                    • Instruction ID: be6cad6926b410301b45aa55fc95022446ddd7cc956e78ddbb9b4c4c283d8a67
                                                    • Opcode Fuzzy Hash: 5075bd5def5fdaba7dde46dc608fff5f5a6b59d6e4ebdcca4be625b992156916
                                                    • Instruction Fuzzy Hash: 88519512E0CB8643F731EB3599152B9A361BF55B84F859231CE9D12762EFACF2E48310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$free$strrchr$_access_stat64
                                                    • String ID:
                                                    • API String ID: 2557200964-0
                                                    • Opcode ID: cc4b452e149309618ec8c3712edcd5cb9bf37e33a6947b0d1c5560d217043fe1
                                                    • Instruction ID: 70f54ab6dd701b0dbf5c8f15ddcee3eafe9740cd650b0b37be1e92bfc13f9c50
                                                    • Opcode Fuzzy Hash: cc4b452e149309618ec8c3712edcd5cb9bf37e33a6947b0d1c5560d217043fe1
                                                    • Instruction Fuzzy Hash: 5D416721B09B4286FB34BB22A450279A2A0FF84B90FD94134CE5D477E4EFBCE4759320
                                                    APIs
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5A5
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5BF
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5DA
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E5F6
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E612
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E62A
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E642
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E65A
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E672
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E68A
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791554605,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79157E6A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$callocfree
                                                    • String ID:
                                                    • API String ID: 1183638330-0
                                                    • Opcode ID: e8f427a333ce762d7badb517e59f7dcc838bae5e2cdd9ab2595d001bfb5aa8f8
                                                    • Instruction ID: 995ff11c34b039073540d89b0ae759d5ccbb91c1e6cc4aa86ba89515409139cd
                                                    • Opcode Fuzzy Hash: e8f427a333ce762d7badb517e59f7dcc838bae5e2cdd9ab2595d001bfb5aa8f8
                                                    • Instruction Fuzzy Hash: 32311C61A4AB0282EF79EF75B155138A3E4FF48B51B8A4539CA0E06760EF7CF5748360
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$mallocmemcpy$strchr
                                                    • String ID:
                                                    • API String ID: 1615377186-0
                                                    • Opcode ID: a1c8201b6f3bee42d03bc2cddec8e108a6debc594936fa0ea32eb25cad6b4c42
                                                    • Instruction ID: a8c54ad8171ac43141a8de9bd06a8a7d098281f10f27c21f15dda4326623e240
                                                    • Opcode Fuzzy Hash: a1c8201b6f3bee42d03bc2cddec8e108a6debc594936fa0ea32eb25cad6b4c42
                                                    • Instruction Fuzzy Hash: 0D51B021B09B8545EF75BF25E564279EAA1BF44BC0F894430EE4E87764EF7CE4258320
                                                    APIs
                                                    Strings
                                                    • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF791553D59
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID: Couldn't find host %s in the .netrc file; using defaults
                                                    • API String ID: 2653869212-3983049644
                                                    • Opcode ID: 1d04505e495145950235f57996710238a2d0b300f5824eb49bbb70f89b12f21d
                                                    • Instruction ID: 319ef6aa9665fb7115aa8a10712164f66286c0ebc0e7416a5bfcfe0d61f6bc10
                                                    • Opcode Fuzzy Hash: 1d04505e495145950235f57996710238a2d0b300f5824eb49bbb70f89b12f21d
                                                    • Instruction Fuzzy Hash: C5619162A08B8286E7B59B35D46436EBBB0FB44B84F8A4035DB8D47761DF7CE465C320
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                                    • API String ID: 0-1262176364
                                                    • Opcode ID: 05ecc57f50b54b6a61a3d957fe0d199e0b50a32a6b995c18ca7873081ea11a20
                                                    • Instruction ID: cd1dc19c89f36eafee245d80f543b75d104bea2b6da38c17742d2ba9b2dbb4f3
                                                    • Opcode Fuzzy Hash: 05ecc57f50b54b6a61a3d957fe0d199e0b50a32a6b995c18ca7873081ea11a20
                                                    • Instruction Fuzzy Hash: 8B41B026B08682C6EB32BB75E4411BDE360EF41B90FC64031DA4D07765EFBCEA648760
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79156455A), ref: 00007FF79155856F
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79156455A), ref: 00007FF7915585C1
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79156455A), ref: 00007FF7915585E5
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79156455A), ref: 00007FF791558635
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79156455A), ref: 00007FF791558678
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdupstrchr
                                                    • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                                    • API String ID: 153040452-3976116069
                                                    • Opcode ID: d6103e72cbcc8da1c03c811d2a32d5e7c51357ccb556e916a0c4d7afa04c659c
                                                    • Instruction ID: ff0c45b13c15d8f0c5c2354bd8a48d0ed93d5bfb7bf759425c38389387eabcc8
                                                    • Opcode Fuzzy Hash: d6103e72cbcc8da1c03c811d2a32d5e7c51357ccb556e916a0c4d7afa04c659c
                                                    • Instruction Fuzzy Hash: F4418422608B8596EB31AF22E4403AAB7A0FB45B84FD50435EE8D477A4DF7CD566C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$FALSE$Public Key Algorithm$TRUE
                                                    • API String ID: 2653869212-571364039
                                                    • Opcode ID: 5f6cd9eea9399512c4b55156c81aa350a10a22d77529dec60b8d559df1f0e6c4
                                                    • Instruction ID: ffd60b7e4fa836b43eed981eb9b6ead406fc5d4cf0ccaa71e3c5011133943910
                                                    • Opcode Fuzzy Hash: 5f6cd9eea9399512c4b55156c81aa350a10a22d77529dec60b8d559df1f0e6c4
                                                    • Instruction Fuzzy Hash: 2E418B61B0878285EB71AB71E8142F9A762FB05788FC50875CE4D1BB75EFBCE1648320
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791577A58
                                                      • Part of subcall function 00007FF791555890: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7915616A5,?,?,00000000,00007FF791561A05), ref: 00007FF7915558A5
                                                      • Part of subcall function 00007FF791555890: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7915616A5,?,?,00000000,00007FF791561A05), ref: 00007FF7915558BB
                                                    • memcpy.VCRUNTIME140 ref: 00007FF791577878
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7915779C9
                                                    • memcpy.VCRUNTIME140 ref: 00007FF791577A92
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791577A9E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$memcpy$realloc
                                                    • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                                    • API String ID: 657767516-1165944077
                                                    • Opcode ID: 9bfac1b8935d38e05f7c8cc7b36c632f584987af3c1d6f6e04fd8e0473ac4191
                                                    • Instruction ID: fd3912964892afc43288d7ab9549a22fe90ecd2305784d9680885005842c0085
                                                    • Opcode Fuzzy Hash: 9bfac1b8935d38e05f7c8cc7b36c632f584987af3c1d6f6e04fd8e0473ac4191
                                                    • Instruction Fuzzy Hash: 7F717E22B09B8596E768EB35E8047A9B7E4FB45B90F864031EA9D47B60DF7CE570C310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_time64
                                                    • String ID:
                                                    • API String ID: 3087401894-0
                                                    • Opcode ID: 86c66ed6b67c00c6454814930aa6bca85f803e729afe4de3d907f376009a996e
                                                    • Instruction ID: fef2d6efb834b795b89175cedb3b1f3fdf526e80a2901a716ba9fb8342be950e
                                                    • Opcode Fuzzy Hash: 86c66ed6b67c00c6454814930aa6bca85f803e729afe4de3d907f376009a996e
                                                    • Instruction Fuzzy Hash: CF213036A48A4281EB61AF32E94012DB370FB48FD5F960431CE8E03B64DEBCD4A5C350
                                                    APIs
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158E35A
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158E3A8
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158E40B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158E549
                                                      • Part of subcall function 00007FF7915822F0: strchr.VCRUNTIME140(00000000,?,?,00007FF7915818AF), ref: 00007FF791582336
                                                      • Part of subcall function 00007FF7915822F0: strchr.VCRUNTIME140(00000000,?,?,00007FF7915818AF), ref: 00007FF791582346
                                                      • Part of subcall function 00007FF7915822F0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF7915818AF), ref: 00007FF791582370
                                                      • Part of subcall function 00007FF7915822F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7915823A5
                                                      • Part of subcall function 00007FF7915822F0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7915823CA
                                                      • Part of subcall function 00007FF7915822F0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7915823EC
                                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79158E5D4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$callocmallocstrchr$freestrncpy
                                                    • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                                    • API String ID: 370574955-353107822
                                                    • Opcode ID: e08d8f20e358e8bf9012f0280b8371e18ffbfdb4ce6c661bcb27ea5806dce58a
                                                    • Instruction ID: 9e316a42505f0db73797e010dadc1c5e83ef033a29bd9653837b66a0fe7c1143
                                                    • Opcode Fuzzy Hash: e08d8f20e358e8bf9012f0280b8371e18ffbfdb4ce6c661bcb27ea5806dce58a
                                                    • Instruction Fuzzy Hash: A7A17F32A08B458AEB60EF35E44026DB7B5FB44B88F814036DE4D53B68EF78E465C760
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                                    • API String ID: 0-808606891
                                                    • Opcode ID: 67ce05d3a95ab737e48459ce580bc1aa4f779d63d5c69efeefdcd26c81937c2d
                                                    • Instruction ID: 18d38942b1330651098f88ff78cdc94d6c1e0dfe607107521d6f0209757d4728
                                                    • Opcode Fuzzy Hash: 67ce05d3a95ab737e48459ce580bc1aa4f779d63d5c69efeefdcd26c81937c2d
                                                    • Instruction Fuzzy Hash: 39B15E62908A81C1E7399F38D08026CB771FB15B58FE54635C65E432F4EFB8D8A6C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                    • API String ID: 1169197092-2292467869
                                                    • Opcode ID: 8cc22d32718874c21a7d418b4ad9da824bd132e612db29a526d222bbaa5b249c
                                                    • Instruction ID: 1175c7b50ca83b5469b3fb6d8a499dc2a44c0b71e645a27a34094f42e29d8683
                                                    • Opcode Fuzzy Hash: 8cc22d32718874c21a7d418b4ad9da824bd132e612db29a526d222bbaa5b249c
                                                    • Instruction Fuzzy Hash: FB91742190D78285FF71A73290453B9F7E0AF49744FA64035CA8E026F5DEBCE464C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup
                                                    • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                                    • API String ID: 1169197092-907567932
                                                    • Opcode ID: dba1c758155741f3a2c88d7f8b7215087e224d077ced5c74a72c254be93440b6
                                                    • Instruction ID: df6883ed89092a9a51187bd2351dee95a7b0feba8e2f2d555735536aca3c9460
                                                    • Opcode Fuzzy Hash: dba1c758155741f3a2c88d7f8b7215087e224d077ced5c74a72c254be93440b6
                                                    • Instruction Fuzzy Hash: 1871F77190C68286FB35AA3295502BAFAD1AF417C4FC68034DE4A4B6E1DFBCE534C761
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                                    • API String ID: 1169197092-978722393
                                                    • Opcode ID: a9478a25be66726728ea2433b1dd63cef6bfb16a974eec38186dccfc39064001
                                                    • Instruction ID: 2d17632abc11dfaedd01fb143306aa283725108fb8e726327379debfb0f03de0
                                                    • Opcode Fuzzy Hash: a9478a25be66726728ea2433b1dd63cef6bfb16a974eec38186dccfc39064001
                                                    • Instruction Fuzzy Hash: 98716421A0878245FF71A732D0453B9E7A1AF49754FA64035DA8D026F9EFBCE464C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfreestrpbrk
                                                    • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                                    • API String ID: 1812939018-2300960079
                                                    • Opcode ID: 74c95ef7909cc5841fbc3fa6afd5fb9e3b9a205694a213baf88eed23ca3261a1
                                                    • Instruction ID: 25d4e2530bb61c4fdfae2eeef3d18d9df270d9e13cafd159fbb3677096ce621a
                                                    • Opcode Fuzzy Hash: 74c95ef7909cc5841fbc3fa6afd5fb9e3b9a205694a213baf88eed23ca3261a1
                                                    • Instruction Fuzzy Hash: 2B51B322E0CB8182EF21EB31E4507B9E7A0EB46B84FC64131DA4D037A5DFACE565C751
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$callocfreestrrchr
                                                    • String ID: Wildcard - Parsing started
                                                    • API String ID: 2641349667-2274641867
                                                    • Opcode ID: 508b81d76580ef62e4baf86a27f13d83f9d73a20277ae6bf7d054a26362ad4b1
                                                    • Instruction ID: e5cf1180959dac9807e89c30edb3f773b350faf1528d3ac3b551363210dc9782
                                                    • Opcode Fuzzy Hash: 508b81d76580ef62e4baf86a27f13d83f9d73a20277ae6bf7d054a26362ad4b1
                                                    • Instruction Fuzzy Hash: 5A517E32A09B42C5FB25EF21E4411B8B7A5FB84B40FCA4035CA4E4B364EFB8E565D320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                                    • API String ID: 2653869212-3672398475
                                                    • Opcode ID: 9e8c7cb284f0028178b84ab1b6bc8ef46dedb1954ce2fc9b2faa65e2c34104c4
                                                    • Instruction ID: 9cdce4938bcff0df3a0259f97f2cc3b12859e3c4c1c5acd5f3ce8744103b864a
                                                    • Opcode Fuzzy Hash: 9e8c7cb284f0028178b84ab1b6bc8ef46dedb1954ce2fc9b2faa65e2c34104c4
                                                    • Instruction Fuzzy Hash: 81419F65B0878285EB31AB71D8542BAA761BB05788FC90475DE0D17B75DFBCE0648320
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154971D
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549747
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549751
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154975B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549765
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154976F
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549779
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549783
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF79154978D
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF791549796
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF791551109,?,?,00000000,00007FF791551645), ref: 00007FF7915497B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 85a0ece5a1cb627e6c5854e9dd059bec88cd1f9df4bd14cbe80c763bb3444665
                                                    • Instruction ID: b6290199130611a1196ccdfd8a39199517026c21b132cdd5a91943711ec9cf8a
                                                    • Opcode Fuzzy Hash: 85a0ece5a1cb627e6c5854e9dd059bec88cd1f9df4bd14cbe80c763bb3444665
                                                    • Instruction Fuzzy Hash: 1521BE36694A4182DB64AF22E854139A370FB89F95F951031DE8E43B78DF7CD4A9C710
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F54C
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F556
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F560
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F56A
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F574
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F57E
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F588
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F592
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F59C
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F5A6
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79157E572,?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157F5B0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 9a343c8d7024df49f697057c0738095d55ab41f5ed69fe6863ea838b53293162
                                                    • Instruction ID: f04308097a2a2171f7b5bcc148950215442680a1daaca81e97db54eb2e6a5eea
                                                    • Opcode Fuzzy Hash: 9a343c8d7024df49f697057c0738095d55ab41f5ed69fe6863ea838b53293162
                                                    • Instruction Fuzzy Hash: 7201B526A94901C2D724AF36EC540396330FF88F5AB951031CE4E46634EE78D8B9C350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: mallocmemcpy
                                                    • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                                    • API String ID: 4276657696-1832275178
                                                    • Opcode ID: b655ed286801db7dc1d0c06a4f80f13fc68f7bfd8fd7af095c0a61b3f8b1c9e0
                                                    • Instruction ID: f6c4108c7d2d5224db2b27469bfca7a77ea02a6b89dbc933e7b1d16b3d5fec88
                                                    • Opcode Fuzzy Hash: b655ed286801db7dc1d0c06a4f80f13fc68f7bfd8fd7af095c0a61b3f8b1c9e0
                                                    • Instruction Fuzzy Hash: 12A17362A09B8285EB75AF21E5013B9B7A4FF44B84F858135DE4D037A4DFBCE560C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$freemalloc
                                                    • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                                    • API String ID: 3313557100-1003742340
                                                    • Opcode ID: 38e50bf829b32b88b1b7dd66f86ae9a29274d4b73ef7732c7255e475e1a306da
                                                    • Instruction ID: 834e1a7bd2e073f2553d9d0dbd7851f65004b2a2bc2dc9ea319e5692a87956ea
                                                    • Opcode Fuzzy Hash: 38e50bf829b32b88b1b7dd66f86ae9a29274d4b73ef7732c7255e475e1a306da
                                                    • Instruction Fuzzy Hash: 2181B222A18B8181EB64BB36D0443A9A3A0FB45B84FC65475DF4E47B51EFBCE4B1C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$mallocmemcpy
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 3401966785-2901970132
                                                    • Opcode ID: eddf96903877b2e5322b609f5b0ca4e83f8c568e716df63a8e25b4df7966a020
                                                    • Instruction ID: b92ee1538bff1a0dac6e83c78a8d5d8cbc4638a77d5c5297b3e0be2008d4431e
                                                    • Opcode Fuzzy Hash: eddf96903877b2e5322b609f5b0ca4e83f8c568e716df63a8e25b4df7966a020
                                                    • Instruction Fuzzy Hash: 11613461A0838245EB38AB7184142B9EB92FB05794FC54575CE1F0BBF5EEBCE1648320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                                    • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                                    • API String ID: 1392894463-1168109407
                                                    • Opcode ID: c47aee06e4013a834c931363b7a2c703749fb8a99fefb27afd7b3cb79d891225
                                                    • Instruction ID: 7b18e2cedfa5c3a031c076ff734497981eb641d6a48a9b66b35e589ec6b8f3ac
                                                    • Opcode Fuzzy Hash: c47aee06e4013a834c931363b7a2c703749fb8a99fefb27afd7b3cb79d891225
                                                    • Instruction Fuzzy Hash: 3341C761A0868282FB30AB35E4452B9A7E0EF49B84FC64131EA5E473F5DF6CE521C370
                                                    APIs
                                                    • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF791576667
                                                      • Part of subcall function 00007FF791576C10: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576C46
                                                      • Part of subcall function 00007FF791576C10: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576C9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _fstat64_openstrchr
                                                    • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                                    • API String ID: 3410096895-1509146019
                                                    • Opcode ID: 7378ed73dcb21346ded22b2d9b556c6f081946663b416f6b4ef74019bbd210c1
                                                    • Instruction ID: c78b00d57a33c0de404e687379d6f2806bb10a2dc7483abef3631f76a99f9c20
                                                    • Opcode Fuzzy Hash: 7378ed73dcb21346ded22b2d9b556c6f081946663b416f6b4ef74019bbd210c1
                                                    • Instruction Fuzzy Hash: C5B19172A08A8286FB31AB3195513FAA391FB847C8FD54035DE4D87765EF7CE5208760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$mallocrealloc
                                                    • String ID: 0123456789-$<DIR>$APM0123456789:
                                                    • API String ID: 359134164-4291660576
                                                    • Opcode ID: 18443deb897c80c836ead0c27180152972d5a4da435ae98ade4956657e2cbdb4
                                                    • Instruction ID: f16052b1c6956a84f1e6866691ef5055387ab7fd15ce05f194ffbd487eef23fb
                                                    • Opcode Fuzzy Hash: 18443deb897c80c836ead0c27180152972d5a4da435ae98ade4956657e2cbdb4
                                                    • Instruction Fuzzy Hash: 23B18036A087468AEB34AF35D050379A7A4FB04B48F964079CB5E47BB4CFB8E461C761
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: malloc$Ioctlsetsockopt
                                                    • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                                    • API String ID: 3352517165-607151321
                                                    • Opcode ID: 7275afcc4e03cfce6516acd4f452592d5d0be564c78c03bc4de6e5775ede35c3
                                                    • Instruction ID: 7589802e62e3a6f7ec7ec40fb6cadfc1277375022fa86e3c4203e4f399262927
                                                    • Opcode Fuzzy Hash: 7275afcc4e03cfce6516acd4f452592d5d0be564c78c03bc4de6e5775ede35c3
                                                    • Instruction Fuzzy Hash: 0BB16133A18AC685EB75AF34D0543F9A790EB44B9CF890135DE4D0A7A9DFBC94A5C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                                    • String ID: value
                                                    • API String ID: 1346393832-494360628
                                                    • Opcode ID: b0962a8400d41584cdb4da4ec1ab0a5144be87e245b3d2cfdff2005283219c4b
                                                    • Instruction ID: 34d9862b05b40b0f04a5e0f6bab781201ba5272c3e0574a400418e6fa75e55a8
                                                    • Opcode Fuzzy Hash: b0962a8400d41584cdb4da4ec1ab0a5144be87e245b3d2cfdff2005283219c4b
                                                    • Instruction Fuzzy Hash: 2461A432A18A8585EB20EB74D8453EDB361EB457A4F914331DAAD47AE9DFBCD092C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freeisupper$mallocmemcpy
                                                    • String ID: TRUE
                                                    • API String ID: 3511497317-3412697401
                                                    • Opcode ID: dfec693e745822342e9c6ab3755d1cb7e16c56c66eb0dcf3ac3e4d9c68e03cf8
                                                    • Instruction ID: c7c5d2097c5bca04b377119885aec00774795ef7c1a15d315b71834ee1347fef
                                                    • Opcode Fuzzy Hash: dfec693e745822342e9c6ab3755d1cb7e16c56c66eb0dcf3ac3e4d9c68e03cf8
                                                    • Instruction Fuzzy Hash: 55515A11E0D29345FB3AA6358554338FB91EB81790F8642B5C79F42EE9DFAC9065C321
                                                    APIs
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576C46
                                                    • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576C9B
                                                    • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576D0C
                                                    • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576D19
                                                    • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF791576E2B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _close$_fstat64_openstrchr
                                                    • String ID: Can't get the size of %s$Can't open %s for writing
                                                    • API String ID: 423814720-3544860555
                                                    • Opcode ID: 3abd29cad80e39f2595736619c7c174b79c0ef8f974aed0c264f30db40406598
                                                    • Instruction ID: f9a9a720765da7a4d4240e598a21d3fce25df6afd480215f12476b84b4bb8413
                                                    • Opcode Fuzzy Hash: 3abd29cad80e39f2595736619c7c174b79c0ef8f974aed0c264f30db40406598
                                                    • Instruction Fuzzy Hash: 9951E962B08A4285FB34AB35E4113BAA391FF84BD4FC64435DE4E873A4DEBCE5518320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLasthtonssend
                                                    • String ID: Sending data failed (%d)
                                                    • API String ID: 2027122571-2319402659
                                                    • Opcode ID: 8f5b853d9e29d315e642986a5f4e4137993beea80c1a90e7413e487de17ad2a7
                                                    • Instruction ID: b9cc6e3bcc2544be3d9d9a58cfec259e0ee597173f33bfde468b2f51d8f1c471
                                                    • Opcode Fuzzy Hash: 8f5b853d9e29d315e642986a5f4e4137993beea80c1a90e7413e487de17ad2a7
                                                    • Instruction Fuzzy Hash: 4641CE36608A8681EB246F75D450AACB730F754F99FC94532EB8A43764DFBCE126C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdupmalloc
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 111713529-2901970132
                                                    • Opcode ID: cf7cdcf1af8fc5f3891e0b4e9c3aedad7954b003f935ee06fde832c409d8492d
                                                    • Instruction ID: a1b7ceed556b4cbc0132e3b93d3e5a299dbe627fe82f8169aaeaf3c5c20bc0f7
                                                    • Opcode Fuzzy Hash: cf7cdcf1af8fc5f3891e0b4e9c3aedad7954b003f935ee06fde832c409d8492d
                                                    • Instruction Fuzzy Hash: 7B31A261A0878245FB71AB71D8141F9A7A2BF05788FC60875DE4E1BB75EFBCE1248320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                                    • API String ID: 1294909896-3805148269
                                                    • Opcode ID: 8d42fae184b4440de9f01b9aff8907addfd4940576fcc8e34f609a7710b1076c
                                                    • Instruction ID: 535afe482e89e030d6b954e8085574ab548de48ce0704385a93970fb8aaca56d
                                                    • Opcode Fuzzy Hash: 8d42fae184b4440de9f01b9aff8907addfd4940576fcc8e34f609a7710b1076c
                                                    • Instruction Fuzzy Hash: 0E71CD61A1879284EB30EB3199041B9EBA1FB05784FC644B6CA8D07BB5DFBCE164C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                                    • API String ID: 1294909896-599393795
                                                    • Opcode ID: 03c7f5d1ef15c74faf8be90d268e7b7bd3b3d9348250c60332d7fe915484ba69
                                                    • Instruction ID: 548875d873c359b66449d3b4c02d934499778d145a439a2565ba5c45a5ad09b1
                                                    • Opcode Fuzzy Hash: 03c7f5d1ef15c74faf8be90d268e7b7bd3b3d9348250c60332d7fe915484ba69
                                                    • Instruction Fuzzy Hash: AB61EE61A097D284EB30AB31D9041B9EBA1FB01784FC64476DA4D07BB9DFBCE5A5C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                                    • API String ID: 1294909896-1642401773
                                                    • Opcode ID: 986c12c6eaa79313bafa2d781029450541fb2713f2c0ab419600bd736bf16b40
                                                    • Instruction ID: 9405948bba7433a4693d9f552b517d2a063081a94e910455bdbee5ef0e45a984
                                                    • Opcode Fuzzy Hash: 986c12c6eaa79313bafa2d781029450541fb2713f2c0ab419600bd736bf16b40
                                                    • Instruction Fuzzy Hash: A8518E61A08B8285EB30EB71D4001E9E7A2FB45784FCA4475DA4D1BB75DFBCE564C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$mallocmemcpy
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 3401966785-2901970132
                                                    • Opcode ID: 4c2a392396a60d41c2b9f77c6155b2e078ba7430b296a8fdd3334a55da7192e8
                                                    • Instruction ID: fa45dbfdb76d2f8092db563241507a54d030df8d8e5b7cb1ee944595c8345ed5
                                                    • Opcode Fuzzy Hash: 4c2a392396a60d41c2b9f77c6155b2e078ba7430b296a8fdd3334a55da7192e8
                                                    • Instruction Fuzzy Hash: 3441C161A0878245EB35EB7199141F9A7A2BF05794FC64875CE0D0BBB5EEBCE1248320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                                    • API String ID: 2190258309-1780565354
                                                    • Opcode ID: b56b0fb31ca6b249a82b89f34ca90b65510ceb9ac7bc31f538290324307e5f9e
                                                    • Instruction ID: 4ea5a657a65b15bf54b1d547a298becebca3444e8ee7d166f2e9cb866f33d09b
                                                    • Opcode Fuzzy Hash: b56b0fb31ca6b249a82b89f34ca90b65510ceb9ac7bc31f538290324307e5f9e
                                                    • Instruction Fuzzy Hash: CD41A2B1A186C282EB31AB35E4153B8A7A0FB45794FD64031CA8D077B5DFBCE566C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 44ba6ddfbc606770554a1c70159e410cc495aabf77cc1ebcfa696ffefd9f368c
                                                    • Instruction ID: 2a5b7bd9fe03149088a18437f55f05f7f8c36175ae4d0abd02d4b315d12fe809
                                                    • Opcode Fuzzy Hash: 44ba6ddfbc606770554a1c70159e410cc495aabf77cc1ebcfa696ffefd9f368c
                                                    • Instruction Fuzzy Hash: 90412D32948B4282E771EF31E44023DB7A4FB48B94F868135DA8D53764DFB9D8A0C3A0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: f3c88d784ce6539cd34ea569bb48ec2ebc8462fd64a563aa0832e8aac031a015
                                                    • Instruction ID: 67767662b3daf5e7b7468ef623f0f75a77a27c328a8064615924856519462ac5
                                                    • Opcode Fuzzy Hash: f3c88d784ce6539cd34ea569bb48ec2ebc8462fd64a563aa0832e8aac031a015
                                                    • Instruction Fuzzy Hash: 1F312D36648A52C6E720AF22E844229B774FB88FD5F990031DE8D07B68DFBCD465C710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: d20b14bb01e48b098ba3e8aa61b539b3530b32810483289b6e3ad828a8c2d138
                                                    • Instruction ID: aef28772ee8b74b43680c69a337c02d56e8119f584078ee69ba9bde103ef68a9
                                                    • Opcode Fuzzy Hash: d20b14bb01e48b098ba3e8aa61b539b3530b32810483289b6e3ad828a8c2d138
                                                    • Instruction Fuzzy Hash: C221A936A48A41C2E720AF22E85402AB374FB88F95F950531DE8D43B78DF7CD8A9C750
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 45cfdc64d72271e08c4956cc3b07651a9a339b54b6f225ebb05eccb4156cdd5a
                                                    • Instruction ID: 199e67643a4fba59ebdbd2e2f0c1d506827cc33ac5c90b487b975e9ffcda36d4
                                                    • Opcode Fuzzy Hash: 45cfdc64d72271e08c4956cc3b07651a9a339b54b6f225ebb05eccb4156cdd5a
                                                    • Instruction Fuzzy Hash: 1F017526694A4182DB24AF32ED54029A330FF88F96B851031CD8E43B78DF7CD8B9C350
                                                    APIs
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF791582B03), ref: 00007FF791583798
                                                    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF791582B03), ref: 00007FF7915837DA
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF791582B03), ref: 00007FF79158387F
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF791582B03), ref: 00007FF791583892
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791583D77
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$memcpystrchr
                                                    • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                                    • API String ID: 1438451818-3030351490
                                                    • Opcode ID: 30231bb317e84fc7e98d8613c5ac5a13d7cb8ad3d65f3fcd1963505e3dc6deca
                                                    • Instruction ID: bfa1758c9fddfd1809065aba021d812aa1b24ab5fe2461b4090648647784ecdc
                                                    • Opcode Fuzzy Hash: 30231bb317e84fc7e98d8613c5ac5a13d7cb8ad3d65f3fcd1963505e3dc6deca
                                                    • Instruction Fuzzy Hash: AA020661B187C346F7B1BAB2A8403B9A795EF41798F820075DE0C87BE6DEF8D4148360
                                                    APIs
                                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF79154A97A,?,?,?,?,?,?,?,00007FF79154A747), ref: 00007FF791567961
                                                    • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF791567B03
                                                    • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF791567B20
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$_errno
                                                    • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                                    • API String ID: 2644425738-1191287149
                                                    • Opcode ID: e17fdedd08ec8e3fcf0c3857282685dbc0d08f1091a9028c2ad4d52edea48d86
                                                    • Instruction ID: 5c30fd60b6f70a0c2dc4724878d49b91542061802efc5ec2096ad406f563720d
                                                    • Opcode Fuzzy Hash: e17fdedd08ec8e3fcf0c3857282685dbc0d08f1091a9028c2ad4d52edea48d86
                                                    • Instruction Fuzzy Hash: 15512612A0DB8A41FF35AB35D00017AE390EB55BC4FDA4131DA4D067B8EEBCE561C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                    • API String ID: 1169197092-2292467869
                                                    • Opcode ID: b110449c8ed7c2403f8f5feb9aa6ba8bb36de53f222672ca70420cff21918a71
                                                    • Instruction ID: fdb05aad8fdd91fdcd53128a7e57886770ea470e2eb21b3106d2cd9c3cdeb0d2
                                                    • Opcode Fuzzy Hash: b110449c8ed7c2403f8f5feb9aa6ba8bb36de53f222672ca70420cff21918a71
                                                    • Instruction Fuzzy Hash: 0A616461A0978245FF71AB32E0463B9E7A1EF48754FA64035DA8D026F9DFBCE464C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$free
                                                    • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                                    • API String ID: 573759493-910067264
                                                    • Opcode ID: c05426ea74762394f10fd7bd49ed2c18a541350ece3eb43416b99f882381862d
                                                    • Instruction ID: 72cc150c40d8a95986691e2d563a678df79ec6f8aa6fbc6fcd0bfb0e102e13e0
                                                    • Opcode Fuzzy Hash: c05426ea74762394f10fd7bd49ed2c18a541350ece3eb43416b99f882381862d
                                                    • Instruction Fuzzy Hash: 7C61D261A0C6E784FB31AB359544279FBA5EB81784FD64071C78E42EA8CFBCD561C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdup$strchr
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                    • API String ID: 3404610657-2292467869
                                                    • Opcode ID: 36c86af3f712c25ff24da92b8d3b12df536c6fe54e2b2f43b45ef366ad41ed6e
                                                    • Instruction ID: 22f86d4d5c2b41da76e5f13510bf526774785bb9c6a3fc18b22ed4da5855af45
                                                    • Opcode Fuzzy Hash: 36c86af3f712c25ff24da92b8d3b12df536c6fe54e2b2f43b45ef366ad41ed6e
                                                    • Instruction Fuzzy Hash: 8D616361A0878245FF71AB32E0453B9E7A1AF48754FA64035DA8E026F9DEBCE464C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freememcpy$malloc
                                                    • String ID: Failed to alloc scratch buffer!
                                                    • API String ID: 169112436-1446904845
                                                    • Opcode ID: 59b1506d615432053a037ba251dde9c0fbf304f3513c922dd98c30b466a838e1
                                                    • Instruction ID: 1eb05167f8d5458ba0727d39fada45af3ec6ecc8a1ccdf9b7f04f19ef977b12a
                                                    • Opcode Fuzzy Hash: 59b1506d615432053a037ba251dde9c0fbf304f3513c922dd98c30b466a838e1
                                                    • Instruction Fuzzy Hash: 83516A62A187C19BEB35AB75E1006AAB7A4FB09784F850535DF8D07761DF7CE264C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strstr
                                                    • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                                    • API String ID: 1392478783-2096918210
                                                    • Opcode ID: c7f62addd4e627b32525035210bd5a455ee2eb4cd31bec68a1edccb778b7b010
                                                    • Instruction ID: ad3a973e9611c2562f58698e4f80b91d6724366b419d0184cb7fff37b272f1bb
                                                    • Opcode Fuzzy Hash: c7f62addd4e627b32525035210bd5a455ee2eb4cd31bec68a1edccb778b7b010
                                                    • Instruction Fuzzy Hash: 8551C762B0878581EB75AB34A4452B8F791AB45774FC60231DA5C067E1DFFCE7A28720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastfreememcpy
                                                    • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                                    • API String ID: 1248052217-2335292235
                                                    • Opcode ID: 8773dfc368e1a268cab936aa2f053949687facc79998b17a9464761e5d5552a8
                                                    • Instruction ID: a1835ff5365ea058e75ee4783546b616c65ef6cffe6a9c95d726ed57c7ca4b29
                                                    • Opcode Fuzzy Hash: 8773dfc368e1a268cab936aa2f053949687facc79998b17a9464761e5d5552a8
                                                    • Instruction Fuzzy Hash: 3151F361B0C68281FBB4BA3598017B9A390AF457A4FC64135DE4D877E1EFBCE665C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Digest$stale$true
                                                    • API String ID: 1294909896-2487968700
                                                    • Opcode ID: 4b57f2dbe0b2fd15b0ccd8f458f750311f8e2330ed38b68e37d5f47516fc7e9e
                                                    • Instruction ID: 8ac1eeff0b71fe50098d40d6fc1e6341a0392b295b8efa329c6fb0e462f26e4e
                                                    • Opcode Fuzzy Hash: 4b57f2dbe0b2fd15b0ccd8f458f750311f8e2330ed38b68e37d5f47516fc7e9e
                                                    • Instruction Fuzzy Hash: 2E518221A08A4282EB30AB35E9503B9B7A0FF44B84FD54171EA9D47AE1DF7CE575C720
                                                    APIs
                                                      • Part of subcall function 00007FF791536E20: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79153241B), ref: 00007FF791536E9E
                                                      • Part of subcall function 00007FF791536E20: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79153241B), ref: 00007FF791536EAC
                                                      • Part of subcall function 00007FF791536E20: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79153241B), ref: 00007FF791536EC2
                                                      • Part of subcall function 00007FF791533C00: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF791531DDB), ref: 00007FF791533C46
                                                      • Part of subcall function 00007FF791535E20: memcpy.VCRUNTIME140(?,?,?,00007FF791531E0A), ref: 00007FF791535EB1
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915324B9
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7915324F8
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532546
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532594
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                                    • String ID: at line $, column
                                                    • API String ID: 2665656946-191570568
                                                    • Opcode ID: 40e2edd129a8d3e628dd87717cc78c744957ab28e274330f9d88c642cb273730
                                                    • Instruction ID: 9bbb98c14e35b4be6204dd2b15595596b67822f10ff65203db2738ee2674835d
                                                    • Opcode Fuzzy Hash: 40e2edd129a8d3e628dd87717cc78c744957ab28e274330f9d88c642cb273730
                                                    • Instruction Fuzzy Hash: 2551B262F08B4185FB20EB78D4443AC7322EB447E8F815235DA6D13BE9DE78D5A6D350
                                                    APIs
                                                    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534AE3
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534B37
                                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534B5E
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534B86
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534BCC
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534BD3
                                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF79153319B,?,?,?,00007FF791533154), ref: 00007FF791534BE0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                                    • String ID:
                                                    • API String ID: 1492985063-0
                                                    • Opcode ID: b6cd1e8c01f3bf41d4679c4e09378afca79845054d5d10cb18157a6136c9a573
                                                    • Instruction ID: 859cbba64389f716799883d9118e58af5e2799edbc268778d53477b79a622694
                                                    • Opcode Fuzzy Hash: b6cd1e8c01f3bf41d4679c4e09378afca79845054d5d10cb18157a6136c9a573
                                                    • Instruction Fuzzy Hash: 3D513422608641C1EF359F2AD590238E7A1EB85F95F96C631CA5E437B0CFB9D8578314
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                                    • API String ID: 1294909896-1255959952
                                                    • Opcode ID: 3fcd198ad9f128fee229caa6f2c548f91b56f287f4a465edbd8e14dc108afd23
                                                    • Instruction ID: a8d4d341654563e199e842166838bdb524c4e11055b0896bb3964b8af6b6899e
                                                    • Opcode Fuzzy Hash: 3fcd198ad9f128fee229caa6f2c548f91b56f287f4a465edbd8e14dc108afd23
                                                    • Instruction Fuzzy Hash: D151D122A0868296FB71EF35D4802BDAB90FB40794FC60071DA4D47AA1DFBCE475C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _time64
                                                    • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                                    • API String ID: 1670930206-870032562
                                                    • Opcode ID: d6f4e6cd651ca8ddbfcbb8eebc46c1f789483de65e92877cee023f85f4940ec1
                                                    • Instruction ID: e2008d5f6749ae5c31930d3a84309483e62c594dc5394687013fd31e5f66b347
                                                    • Opcode Fuzzy Hash: d6f4e6cd651ca8ddbfcbb8eebc46c1f789483de65e92877cee023f85f4940ec1
                                                    • Instruction Fuzzy Hash: 0D412A76B2461686DB30DF3AE040568B7A4F788F88FD15032DE1C8B764DE79E661C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: fseek
                                                    • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                                    • API String ID: 623662203-959247533
                                                    • Opcode ID: ba81ea258c733253544232ad77cd54e1544ced2eafcddb05c2e0cd2645770749
                                                    • Instruction ID: a244d7c473cc5d1a5974e218d1edff662217fdc2bc3586aa9d37715ae5cb1c7c
                                                    • Opcode Fuzzy Hash: ba81ea258c733253544232ad77cd54e1544ced2eafcddb05c2e0cd2645770749
                                                    • Instruction Fuzzy Hash: C141C861B1874141EB60AB7994903B86391EF85B98FCD1031ED1E4B7A9DFBDE4A0C724
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                                    • API String ID: 1294909896-3155708153
                                                    • Opcode ID: e1404798ec204a1f08dfa34859130285b854384ee4b2bdf1abffe2b319845c46
                                                    • Instruction ID: 97b9dc98c55f3d0224193284ef215fc558607fcf00773046483eab500991ad95
                                                    • Opcode Fuzzy Hash: e1404798ec204a1f08dfa34859130285b854384ee4b2bdf1abffe2b319845c46
                                                    • Instruction Fuzzy Hash: 7A418261B0878245EB31AB75D8141F9A762BF05788FC64875DE4E0BB76EEBCE1248321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                                    • API String ID: 1294909896-659367561
                                                    • Opcode ID: f937b6e53e7feb29d18646a697fe84cabf20e4f5067821ed2ed3503b14201dde
                                                    • Instruction ID: c59ca093728c9a057db1a6fa58a3961f86dfa133e1d828d6cf675cee30e316f2
                                                    • Opcode Fuzzy Hash: f937b6e53e7feb29d18646a697fe84cabf20e4f5067821ed2ed3503b14201dde
                                                    • Instruction Fuzzy Hash: 0041B351B0978285FF30B77195141B9A7A1AF05784FC648B5DD0E0BB76DEBDE0648320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$freemallocmemcpy
                                                    • String ID: TRUE
                                                    • API String ID: 2172629687-3412697401
                                                    • Opcode ID: 797108affdb01d4f9068d586920d5b79b2544d3eb3f582b93815dfb2d58ee6ff
                                                    • Instruction ID: 9774c86b64e96d4af3ee3d2f08d1dc666c1fb3fbfcc9efed368150bfb363cf27
                                                    • Opcode Fuzzy Hash: 797108affdb01d4f9068d586920d5b79b2544d3eb3f582b93815dfb2d58ee6ff
                                                    • Instruction Fuzzy Hash: F031E611E0D69345FB36EB358544338FB919B91B90FC606B1CA9E42EE9DFACA461C321
                                                    APIs
                                                      • Part of subcall function 00007FF79156BF90: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791550509,?,?,?,?,00007FF79154F8AB), ref: 00007FF79156BFB8
                                                      • Part of subcall function 00007FF79156BF90: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF791550509,?,?,?,?,00007FF79154F8AB), ref: 00007FF79156BFDE
                                                      • Part of subcall function 00007FF79156BF90: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791550509,?,?,?,?,00007FF79154F8AB), ref: 00007FF79156BFFF
                                                      • Part of subcall function 00007FF79156BF90: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791550509,?,?,?,?,00007FF79154F8AB), ref: 00007FF79156C010
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158051F
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791580568
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791580571
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$realloc$EnvironmentVariable
                                                    • String ID: %s%s.netrc$%s%s_netrc$HOME
                                                    • API String ID: 4174189579-3384076093
                                                    • Opcode ID: 11678300f3a65e2ebe7dd327e7b62063b0fdb97fd59900a9b8865251fc3ba6fc
                                                    • Instruction ID: a2abad9c8ec25b6d1ef7fb5b25b1c74de1e7697b2de06e1e8ce418151027f8ab
                                                    • Opcode Fuzzy Hash: 11678300f3a65e2ebe7dd327e7b62063b0fdb97fd59900a9b8865251fc3ba6fc
                                                    • Instruction Fuzzy Hash: 69316221A09B4186EB30EB36B80016AE2A0BF84BD4FC90531ED9C47B75EE7CE5658730
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: __stdio_common_vsscanf_strdupfree
                                                    • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                                    • API String ID: 860312144-3309259123
                                                    • Opcode ID: 35f01e764a00a63fdd80c7edf4d65bd4adb7ef4f57062dd272d495f881a3f536
                                                    • Instruction ID: e885ad332db4e3584971fdadddf1843aa044ab3e52235909ad48038ca8c85bbb
                                                    • Opcode Fuzzy Hash: 35f01e764a00a63fdd80c7edf4d65bd4adb7ef4f57062dd272d495f881a3f536
                                                    • Instruction Fuzzy Hash: 63311C22A0AA4281EB74FB30D64017EA260FF45BD4FD68431DA0E07675DFBCE86183A1
                                                    APIs
                                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF791552A0C), ref: 00007FF7915556C5
                                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF791552A0C), ref: 00007FF7915556F1
                                                    • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF791552A0C), ref: 00007FF7915556F9
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF791552A0C), ref: 00007FF79155571B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF791552A0C), ref: 00007FF791555732
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_errnostrerrorstrtoul
                                                    • String ID: Invalid zoneid: %s; %s
                                                    • API String ID: 439826447-2159854051
                                                    • Opcode ID: 7d8c82fc3443e1c5fe112937d62e5dbd682e4438b59a71d9c0582465ea641deb
                                                    • Instruction ID: c0264affedf975a3d3d487cbbb0d6ac887e9439921f515708fc7eb5a2a27f851
                                                    • Opcode Fuzzy Hash: 7d8c82fc3443e1c5fe112937d62e5dbd682e4438b59a71d9c0582465ea641deb
                                                    • Instruction Fuzzy Hash: 6B116072A2964282EB20AB71E850279B360EF85B94FD60031DA0D43674DF7CD8A4CB20
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555D4
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555EA
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF7915555FE
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555612
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555626
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79155563A
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79155564E
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF791555662
                                                      • Part of subcall function 00007FF79157E560: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79155567B,?,?,00000000,00007FF7915510C3,?,?,00000000,00007FF791551645), ref: 00007FF79157E575
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 1a30f36b69fe1244b92a04a05d2ee0cb853c9f4f7a991a359fa701792e32e937
                                                    • Instruction ID: caa79ab948a71f96706a0742af414039ee728e52209634139e24be8fdc066010
                                                    • Opcode Fuzzy Hash: 1a30f36b69fe1244b92a04a05d2ee0cb853c9f4f7a991a359fa701792e32e937
                                                    • Instruction Fuzzy Hash: DB115636548F81C1D7109F31ED940ED73B4FBC9F9AB990135DE4E4F664AF7490A58220
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: ae8141b37bd11375d94014df823949d19714f6fedba8869df557bea043aa866b
                                                    • Instruction ID: 3f2200af0f36213b30294761ff4b8fc0bc894b3088bac4e30716c8418ea3c213
                                                    • Opcode Fuzzy Hash: ae8141b37bd11375d94014df823949d19714f6fedba8869df557bea043aa866b
                                                    • Instruction Fuzzy Hash: 93F0F926AD4901C2D724AF32EC540396330FB88F56B951031CD4E46734DE7CD8B9C350
                                                    APIs
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7915529EB), ref: 00007FF791552187
                                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7915529EB), ref: 00007FF7915521B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc
                                                    • String ID:
                                                    • API String ID: 2635317215-0
                                                    • Opcode ID: db86a635e11080c5c1ab062bf3df706a8b265d8341c3dd92645d930b89413c27
                                                    • Instruction ID: 97f079e21e24de1857d32155d238f3848554ffd927a22d9c54b22bf51cfba883
                                                    • Opcode Fuzzy Hash: db86a635e11080c5c1ab062bf3df706a8b265d8341c3dd92645d930b89413c27
                                                    • Instruction Fuzzy Hash: 0E919C26609BC1C9E7259F3494503E97BA0FB55B28F480235DFAC0B3E6DF79A1A4C721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$mallocmemcpy
                                                    • String ID: Start Date: %s$Start Date
                                                    • API String ID: 3401966785-2389359183
                                                    • Opcode ID: e1f34b3e4c8775197c01e2e21828fdb8f5951c05569b637eae09db5797127e21
                                                    • Instruction ID: 0e9833eb3a2435f53d94ed63a43a7ca88846a1f6c1783f2163b9e9f6956ef555
                                                    • Opcode Fuzzy Hash: e1f34b3e4c8775197c01e2e21828fdb8f5951c05569b637eae09db5797127e21
                                                    • Instruction Fuzzy Hash: 54415851A092C206FF38E63585142B9AB92FB067A0FC94275CA1F07FF1DEACE1658331
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 1775671525-0
                                                    • Opcode ID: f4946f941e4c17ddfb1f100160175e899db4a10eb8282197510e30b0fdd30d9f
                                                    • Instruction ID: 5c90d19308fc7544f17bc288c900ffdf10c1215025572c199dd000cc39605b28
                                                    • Opcode Fuzzy Hash: f4946f941e4c17ddfb1f100160175e899db4a10eb8282197510e30b0fdd30d9f
                                                    • Instruction Fuzzy Hash: A831B32271864585EF25AB36A5041A9E355AB04BE0FC50636DE7E07BE5DFBCE062C350
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ConditionMask$InfoVerifyVersion
                                                    • String ID:
                                                    • API String ID: 2793162063-0
                                                    • Opcode ID: f69341c057864ed04e6336271137f050eaba8f7dd1844b03facb8b24132df4dc
                                                    • Instruction ID: 12b3f92857cfbeef9d70633cd8505dc9e3222e43afee869ffbb45090644aaf54
                                                    • Opcode Fuzzy Hash: f69341c057864ed04e6336271137f050eaba8f7dd1844b03facb8b24132df4dc
                                                    • Instruction Fuzzy Hash: 4C41D932E1C69186F3709B22B4247BAF360FBD5300F465235E9C902B64DF7DE4959B10
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 1294909896-2901970132
                                                    • Opcode ID: d1c7aa22a3ebaa90cfb47ca1aed17a22c6573e906b6e029a11cb94b8002c73e6
                                                    • Instruction ID: 26a7e397e0dd97dc7571eee216916ed34bc519409c99640d01486317c33bc63a
                                                    • Opcode Fuzzy Hash: d1c7aa22a3ebaa90cfb47ca1aed17a22c6573e906b6e029a11cb94b8002c73e6
                                                    • Instruction Fuzzy Hash: 9441B361B087C249EB20AB71D8041F9B762FB05798FC94975DE4D0BBA5EFBCE1648320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupstrchr$mallocstrncpy
                                                    • String ID:
                                                    • API String ID: 2121287944-0
                                                    • Opcode ID: 1677f491da56c31d9bc27dad521c033c8ef2337b3f349c1f4848790553d3eaf1
                                                    • Instruction ID: 2433fb43476d9d4c8ee67449d3f4d5624e5af633b11e2a7437fbf66ba6787cad
                                                    • Opcode Fuzzy Hash: 1677f491da56c31d9bc27dad521c033c8ef2337b3f349c1f4848790553d3eaf1
                                                    • Instruction Fuzzy Hash: 85318631A0978186EB75FF32A550279BAA0EF45B90F8A4674DE4E07BA5DF7CE061C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$freemalloc
                                                    • String ID: PLAIN
                                                    • API String ID: 3313557100-4000620671
                                                    • Opcode ID: d491e20f71187af9eb1b778267a24f4ac6441dc72d2dbbad8917bb7425889afd
                                                    • Instruction ID: d43919ed6077f50f42cabe6daa373d7043dc63f6eae086b51cc97ba249d7ea37
                                                    • Opcode Fuzzy Hash: d491e20f71187af9eb1b778267a24f4ac6441dc72d2dbbad8917bb7425889afd
                                                    • Instruction Fuzzy Hash: 7431F466A08B8182EB20AF25E4402BAE790FB45BE4FC58631DE9D47BE6DF7CD055C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 1294909896-2901970132
                                                    • Opcode ID: a47490ab04a1024b6540fdcf0903e2dd3ce6b307e849c0c07af588718565efd8
                                                    • Instruction ID: 8e4a2fae97aa46037d6b57d547cf485b3079347a374ac5e6ce41f534305137f8
                                                    • Opcode Fuzzy Hash: a47490ab04a1024b6540fdcf0903e2dd3ce6b307e849c0c07af588718565efd8
                                                    • Instruction Fuzzy Hash: E6318261A0878245EB71BB71D8101F9A762BF45788FC64875DE4E1BB76EFBCE1248320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: callocfreememcpystrchr
                                                    • String ID: CAPA$Got unexpected pop3-server response
                                                    • API String ID: 2887963327-1591402739
                                                    • Opcode ID: a0ae662054a5e8a79fe7307aa7c92a9a5a8539b4314879c13f6d2ffa87668e3c
                                                    • Instruction ID: a1d353031e2a811fbb7473f2e88ce26e1d071876c81464f5bb7ea9fe91804ef3
                                                    • Opcode Fuzzy Hash: a0ae662054a5e8a79fe7307aa7c92a9a5a8539b4314879c13f6d2ffa87668e3c
                                                    • Instruction Fuzzy Hash: 45319162F0DB8292FB25AB31D020279A690BB01794FC64536CA1E037A5DFBCE5B5C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemalloc
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 3061335427-2901970132
                                                    • Opcode ID: 6db36f68a94632dfa6742778fc218651626241952eba7d484c6fb128a2df3631
                                                    • Instruction ID: 6ac49daba81f4e8228b473b23c06042214643518c6beb1db8d37e945b5c8db11
                                                    • Opcode Fuzzy Hash: 6db36f68a94632dfa6742778fc218651626241952eba7d484c6fb128a2df3631
                                                    • Instruction Fuzzy Hash: 6931B361A0878245EB70AB71D8101F9A762FF05788FC64875DE4D1BB76EFBCE1248320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemalloc
                                                    • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                    • API String ID: 3061335427-2901970132
                                                    • Opcode ID: 5b7011ea32cdbfdc32a94f7bcf5d0a16212c0ea1e64ccec39d49c5aeaf9aef24
                                                    • Instruction ID: 3af2c29e66847972bf2c29db510aaa7a7ae564b2cfb12976ee0a8ed465ca743f
                                                    • Opcode Fuzzy Hash: 5b7011ea32cdbfdc32a94f7bcf5d0a16212c0ea1e64ccec39d49c5aeaf9aef24
                                                    • Instruction Fuzzy Hash: 0631A361A0878245EB70AB71D8101F9A762BF45788FC54875DE4D1BB75EFBCE1248320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: Signature: %s$%s%lx$Signature
                                                    • API String ID: 2190258309-1406629954
                                                    • Opcode ID: 5a10c59e12b139048f74a5d902ad0d20fb8b764092e03cdd59b3bb008492b819
                                                    • Instruction ID: bcafce561a27f562d2b0bc2f1e83c151b8fdb6f2a154b106dc5d7a600c56d56d
                                                    • Opcode Fuzzy Hash: 5a10c59e12b139048f74a5d902ad0d20fb8b764092e03cdd59b3bb008492b819
                                                    • Instruction Fuzzy Hash: CE31A562B0868286EF30AB35E8442B9A3A1FB85BC4FD50472DE4D07B75EE7CE0118750
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                    • API String ID: 1294909896-517259162
                                                    • Opcode ID: 03e8a4887868519fec95eb8e985398e0d92366e3d37bd73ee15f631fe437f075
                                                    • Instruction ID: fb0993461a330ece2937a3e22b2001518c4ede049f6717f373eae1c877362504
                                                    • Opcode Fuzzy Hash: 03e8a4887868519fec95eb8e985398e0d92366e3d37bd73ee15f631fe437f075
                                                    • Instruction Fuzzy Hash: 61319051A0978285FB30BB71D8141F9A7A1AF05788FCA48B5DD0E0BB76DEBCE0648320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemalloc
                                                    • String ID: OS/400$SITE NAMEFMT 1
                                                    • API String ID: 3061335427-2049154998
                                                    • Opcode ID: 339976b47e4f5bd8a11752ac04a3e2dbe4015902d4f9326f450148596bcc9325
                                                    • Instruction ID: 6e5b7fc0f81afe81246004fe05c0a75fe8c4ac2520641794f85f55b6f36cd6ed
                                                    • Opcode Fuzzy Hash: 339976b47e4f5bd8a11752ac04a3e2dbe4015902d4f9326f450148596bcc9325
                                                    • Instruction Fuzzy Hash: AB31F461A1C6C385F771AB3594513B9A3A0BB45794FC10031CE8D53BA5EFBCE6A6C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _errno_strdup
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                    • API String ID: 2151398962-2292467869
                                                    • Opcode ID: 16d92533ed94cc6be2cfafb21bf420aefde2c13394e1be7ca7b1b029f3acb6e1
                                                    • Instruction ID: 74d0cdb965d4e14369ef08442ab812c007ae1cc143e0fda16f253311f7adb778
                                                    • Opcode Fuzzy Hash: 16d92533ed94cc6be2cfafb21bf420aefde2c13394e1be7ca7b1b029f3acb6e1
                                                    • Instruction Fuzzy Hash: 9B616461A0878645FF71AB32D0463B9E7A1EF48754FAA4035DB8D026F9DEBCE854C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupstrchr
                                                    • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                    • API String ID: 3727083984-2292467869
                                                    • Opcode ID: 7f613c9187ffd283597d18c173bc281dc25db3830c38ef076151ae38b9b06164
                                                    • Instruction ID: d56928e920ecdfa60ebe1a8fe312baf9b0447c34680ced7e274ca47465574f81
                                                    • Opcode Fuzzy Hash: 7f613c9187ffd283597d18c173bc281dc25db3830c38ef076151ae38b9b06164
                                                    • Instruction Fuzzy Hash: B5617461A0878245FF71AB32D0463B9E7A1AF48754FA64035DB8D026F9DFBCE454C361
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                                    • API String ID: 1865132094-1204028548
                                                    • Opcode ID: f96d8a384c648aa43f7340c33562d14107f509cc3114149196f2db844e24ed54
                                                    • Instruction ID: a27d90efd0c113faac3698256fe9d3ddbc2aa291f945ae073a9ffa1292312e33
                                                    • Opcode Fuzzy Hash: f96d8a384c648aa43f7340c33562d14107f509cc3114149196f2db844e24ed54
                                                    • Instruction Fuzzy Hash: FA51A232B0CA8381FB75AA3490402BDB791EB517D4FD90135DA4D8A6A5CFACE470C7B0
                                                    APIs
                                                      • Part of subcall function 00007FF791534360: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                      • Part of subcall function 00007FF791533C80: memcpy.VCRUNTIME140 ref: 00007FF791533CD3
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532732
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791532780
                                                    • __std_exception_copy.VCRUNTIME140 ref: 00007FF7915327D0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79153281D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                                    • String ID: out_of_range
                                                    • API String ID: 2484256320-3053435996
                                                    • Opcode ID: cf0025d20a196b533ec9758bf7b5687e1eaeaacf6ec75d2422ac06fe393b2d3a
                                                    • Instruction ID: 1d0387b500d212b4c8ea066d096e38298e8864a91d391fa7f5d26532b9f19ae1
                                                    • Opcode Fuzzy Hash: cf0025d20a196b533ec9758bf7b5687e1eaeaacf6ec75d2422ac06fe393b2d3a
                                                    • Instruction Fuzzy Hash: F5517D22A18B42D9FB10EF74D4803AC7365FB487A8F814235EA5D43AE9DFB8D1A5C350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _errno_strdupstrcspnstrncmpstrspn
                                                    • String ID: 0123456789abcdefABCDEF:.
                                                    • API String ID: 2191890455-446397347
                                                    • Opcode ID: 29ea01a4979f949b750ea44df9b1ca1ae3a8a8fb8b9e2afb513441852c786f98
                                                    • Instruction ID: 7896de884b793247fb7203146efe3a18f9ba8048fb4dd5313522f7889e6fdd00
                                                    • Opcode Fuzzy Hash: 29ea01a4979f949b750ea44df9b1ca1ae3a8a8fb8b9e2afb513441852c786f98
                                                    • Instruction Fuzzy Hash: 1841E112A0CA8645FB31EB3498013B9FB90EB05754FCA0136CAAD877A1CFACE565C721
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$free
                                                    • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                                    • API String ID: 573759493-632690687
                                                    • Opcode ID: 899afc9ec5bf0135a55d34022ee5cb3ddc18d012a7ebd8148d52db109e92a3be
                                                    • Instruction ID: 16603a16786b21ecfad0b2ecddcdeac80e61206aa4a03b9d9052ac9c135da594
                                                    • Opcode Fuzzy Hash: 899afc9ec5bf0135a55d34022ee5cb3ddc18d012a7ebd8148d52db109e92a3be
                                                    • Instruction Fuzzy Hash: C941D321A0CAD685F7319B35914427CFB91EB81780FDA41B1C78E12EA9DFACE561C321
                                                    APIs
                                                    • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534391
                                                    • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF791534456
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF7915344AA
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7915344B1
                                                      • Part of subcall function 00007FF79158F240: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79153443E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF79158F25A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID: https://keyauth.win/api/1.2/
                                                    • API String ID: 1155477157-3933380396
                                                    • Opcode ID: c9098aa0f132876052a05daecb5826b5a126c3d849c815ea43358e726910f6a4
                                                    • Instruction ID: 4b3afa04d48ce6877ecd34fbc58e648fd05a0e24018afcf67bbc3cd69513bae1
                                                    • Opcode Fuzzy Hash: c9098aa0f132876052a05daecb5826b5a126c3d849c815ea43358e726910f6a4
                                                    • Instruction Fuzzy Hash: AE31F522B0568584FF2AEA7595442789245DB04FF4F860631CE2D07BE9DEBCE8E38350
                                                    APIs
                                                    • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF791531205), ref: 00007FF7915407AF
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF791531205), ref: 00007FF7915407EC
                                                    • memcpy.VCRUNTIME140(?,?,?,?,?,?,0000006E00000006,?,FFFFFFFF,00007FF791531205), ref: 00007FF7915407F6
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF791540829
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID: https://keyauth.win/api/1.2/
                                                    • API String ID: 1775671525-3933380396
                                                    • Opcode ID: a92a7fdf1f37a9b18442440697b212602e5573c353e28f5fc24c134ffdd46036
                                                    • Instruction ID: 03a737ae0acba9e5d7a1ca9a40d0e204b600aacdd47ecfd2146b8b174787ceb2
                                                    • Opcode Fuzzy Hash: a92a7fdf1f37a9b18442440697b212602e5573c353e28f5fc24c134ffdd46036
                                                    • Instruction Fuzzy Hash: AA312721B0974186FF24EB31E5403B9E355AB04BD0FA50635DE5E07BE5DEBCE0618351
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_close_openmalloc
                                                    • String ID: Couldn't open file %s
                                                    • API String ID: 3412525164-447283422
                                                    • Opcode ID: 70df7cfdb300e0ef419b1c4a81927150578117380e0dca2887bdbdf90ba0c024
                                                    • Instruction ID: fe0f9a76445439f4a8f42acdee240eb10c9079a491080cbe5e71687aeb131276
                                                    • Opcode Fuzzy Hash: 70df7cfdb300e0ef419b1c4a81927150578117380e0dca2887bdbdf90ba0c024
                                                    • Instruction Fuzzy Hash: A6418131608A8181EB24AF35E40127AF7A1FB45BD4FC98131DA9D877A4DFBCE561C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfreemalloc
                                                    • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                                    • API String ID: 3985033223-1703240927
                                                    • Opcode ID: e8e9e23f53167017a8f6870da19c5f8ffb6a538d0ab06303ae6017882bfb1956
                                                    • Instruction ID: b8907cdebaadce75294f42764826756381fa921dc592da415b2f5c8426d5c4b0
                                                    • Opcode Fuzzy Hash: e8e9e23f53167017a8f6870da19c5f8ffb6a538d0ab06303ae6017882bfb1956
                                                    • Instruction Fuzzy Hash: 1741A161E09A4281EF21AF21D510278E7A0EF85FE4FC64231DE5D077A4EFBCE4628320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                                    • API String ID: 1865132094-195851662
                                                    • Opcode ID: fcc544f16851bc73d858e57f6f7ba6db9c671d4a8a1d05bd96e88d17b5b17faa
                                                    • Instruction ID: e1bdf3292b485e241b5f8154ec52281cba5cfdf0338f242f16f8b8040b9764a8
                                                    • Opcode Fuzzy Hash: fcc544f16851bc73d858e57f6f7ba6db9c671d4a8a1d05bd96e88d17b5b17faa
                                                    • Instruction Fuzzy Hash: 3341A432B0868681E7659B35E0603B9A7A4EB44B88F894031EB5D07765CFBDE4B0C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$_strdupfree
                                                    • String ID: FALSE
                                                    • API String ID: 3359907120-3701058176
                                                    • Opcode ID: a04c7c05110be40352b00791634eea04e9bb9383216d3d638ec084eafd063cd1
                                                    • Instruction ID: ea2587d102114797b2c19020400eadb5918f47c7866f256dcc7a2ef4952180e7
                                                    • Opcode Fuzzy Hash: a04c7c05110be40352b00791634eea04e9bb9383216d3d638ec084eafd063cd1
                                                    • Instruction Fuzzy Hash: CD31C422E0D59745FB32DB39944433CFB909B81764FC606B1C69E41DE9CFAC94A1C321
                                                    APIs
                                                      • Part of subcall function 00007FF791533DC0: memcpy.VCRUNTIME140(?,?,0000000100000000,00007FF79154088D), ref: 00007FF791533E72
                                                      • Part of subcall function 00007FF791533DC0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF791533E97
                                                      • Part of subcall function 00007FF791533DC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,0000000100000000,00007FF79154088D), ref: 00007FF791533E54
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791540AA0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791540AA7
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791540AAE
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791540AB5
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF791540ABC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                                    • String ID:
                                                    • API String ID: 2318677668-0
                                                    • Opcode ID: c7b33724828ad5913de813b61021c837115092824466ceea439c2b3ebe092784
                                                    • Instruction ID: 3a17b60493cc359e437a902f82d5987b380bc931c35cfaada9cc19ef38540407
                                                    • Opcode Fuzzy Hash: c7b33724828ad5913de813b61021c837115092824466ceea439c2b3ebe092784
                                                    • Instruction Fuzzy Hash: 87619372A0478186EB20EF35E4987BDB361EB55BC4FA24035DA8D07AA5DFBCD4A0C350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
                                                    • API String ID: 2221118986-3012371547
                                                    • Opcode ID: e1ef38b987f7c886a3e5d23ef69143fd2acd9eaf80384948b99344f75d2025ee
                                                    • Instruction ID: 1962347ea26511acfca1bc03f99d59a1cbc57f901f2cc3a104994ac8c875285e
                                                    • Opcode Fuzzy Hash: e1ef38b987f7c886a3e5d23ef69143fd2acd9eaf80384948b99344f75d2025ee
                                                    • Instruction Fuzzy Hash: 8E61C273A08A818BEB21DB34E4413ADBBA0F791B98FC48535DA59877A5DF7CE051CB10
                                                    APIs
                                                      • Part of subcall function 00007FF7915842E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584306
                                                      • Part of subcall function 00007FF7915842E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584327
                                                      • Part of subcall function 00007FF7915842E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584342
                                                      • Part of subcall function 00007FF7915842E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584350
                                                      • Part of subcall function 00007FF7915842E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584362
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791584406
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: HTTP$NTLM
                                                    • API String ID: 2190258309-4188377180
                                                    • Opcode ID: f13010c06005385fa2c38c8bc62cac4d61d4add9b92614968997d4a39fb32610
                                                    • Instruction ID: 5b77b7ab00a2c4589d118b32555fe8eb1fa3d42dfcb03f2923a1b892805c7213
                                                    • Opcode Fuzzy Hash: f13010c06005385fa2c38c8bc62cac4d61d4add9b92614968997d4a39fb32610
                                                    • Instruction Fuzzy Hash: 2F613B36609B8582EB709F25E44076EB7A4FB88B84F954035DE8D43B68EF7CD864CB50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                                    • API String ID: 1294909896-1891748601
                                                    • Opcode ID: d7144038f99b8f4fdb663460d3a916383155e9212e71fab8f310bfecfc70b84e
                                                    • Instruction ID: 4e5f96abf29288f33054f1401b41a2ad7b414400abdc1b0ce6d870ba41f3b7fa
                                                    • Opcode Fuzzy Hash: d7144038f99b8f4fdb663460d3a916383155e9212e71fab8f310bfecfc70b84e
                                                    • Instruction Fuzzy Hash: D951D66190C68241EB74F77090923B9E794EB413A4FC20235DA6E477E2DFFCE5658361
                                                    APIs
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF79158D5F0), ref: 00007FF79158D69F
                                                      • Part of subcall function 00007FF791567950: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF79154A97A,?,?,?,?,?,?,?,00007FF79154A747), ref: 00007FF791567961
                                                      • Part of subcall function 00007FF791567950: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF791567B03
                                                      • Part of subcall function 00007FF791567950: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF791567B20
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF79158D5F0), ref: 00007FF79158D70E
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF79158D5F0), ref: 00007FF79158D728
                                                    • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF79158D5F0), ref: 00007FF79158D75E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strchr$_errno
                                                    • String ID: xn--
                                                    • API String ID: 2644425738-2826155999
                                                    • Opcode ID: ba45f873b2e2cea54c9e497a3bdb6003d2559a391a5387adfe09830db2b5c053
                                                    • Instruction ID: 66c1782bcfc8c232984cb09f7047ef80ba33fd116fb2756fb69776a5849946d7
                                                    • Opcode Fuzzy Hash: ba45f873b2e2cea54c9e497a3bdb6003d2559a391a5387adfe09830db2b5c053
                                                    • Instruction Fuzzy Hash: 5F41A151B0D6C206FB74BA31951537996C19F45FC0FCA8174DE4E87BE2EEADE4618320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: callocfreememset
                                                    • String ID: CONNECT phase completed!$allocate connect buffer!
                                                    • API String ID: 3505321882-591125384
                                                    • Opcode ID: 4b69e7b74066c9d373d9dcad0cdaa0325d0bbb9eff9b2c6c5768e42057e4fdf3
                                                    • Instruction ID: 85c4da2d4b067663c75487764f7f976d99c52c4e4a52d6428655151a05dd38c7
                                                    • Opcode Fuzzy Hash: 4b69e7b74066c9d373d9dcad0cdaa0325d0bbb9eff9b2c6c5768e42057e4fdf3
                                                    • Instruction Fuzzy Hash: A3519232F0868686E739AB35D5583B9B3A1FB44748F894035EB5C072A1DFB8E575C310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                                    • API String ID: 1294909896-619256714
                                                    • Opcode ID: 4ae200d608718c9141bd5620d1ebce739c46edf00a8121cf181d00ffb641913f
                                                    • Instruction ID: 4a4c8c966722d03ac0f28dfa92ea675ed4b229dcd2300f5d528134fba9a1b426
                                                    • Opcode Fuzzy Hash: 4ae200d608718c9141bd5620d1ebce739c46edf00a8121cf181d00ffb641913f
                                                    • Instruction Fuzzy Hash: 9251D361A0C6D285EB30EB3499041B9FBA5FB01780FD684B1DA8D06A74CFBCE665C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _errnofreememcpy
                                                    • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                                    • API String ID: 738009125-4268564757
                                                    • Opcode ID: 637d9d91b84d883651ba78f8bd67d6fc13e0c300ea87d372d29132a2da1077df
                                                    • Instruction ID: c6eab7b014392e8a51c02d92f25fd77365bf90d47789c676fa70b32ea52dd20d
                                                    • Opcode Fuzzy Hash: 637d9d91b84d883651ba78f8bd67d6fc13e0c300ea87d372d29132a2da1077df
                                                    • Instruction Fuzzy Hash: D5519122A0CB8682EB34EA75D5102EDE360FB45BD4F858031EA9D036A5EFBCE4658751
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                                    • API String ID: 1294909896-2752585153
                                                    • Opcode ID: 683ee78d1b68b9e223be132289566ca981066a74fe3e5bff9baaf7a65c0b56bd
                                                    • Instruction ID: 93badde92f1404682290f796d84d35f616c32263f28a112d281eed306623c3ec
                                                    • Opcode Fuzzy Hash: 683ee78d1b68b9e223be132289566ca981066a74fe3e5bff9baaf7a65c0b56bd
                                                    • Instruction Fuzzy Hash: E9317E61A0CB8285EB30EB30A5401F9E791FB05B84FDA4471D64E1BAB5DFBCE565C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemallocmemcpy
                                                    • String ID: Start Date: %s$Start Date
                                                    • API String ID: 3056473165-2389359183
                                                    • Opcode ID: d217930c3833a622d26a54e2cb1d6b45b8cef9a0b45b0d452578392151e7ea81
                                                    • Instruction ID: f3e5bad82a0160ca2b63e9b79c0fa05d76fa8a14b5f6c052aec8b2645b02adeb
                                                    • Opcode Fuzzy Hash: d217930c3833a622d26a54e2cb1d6b45b8cef9a0b45b0d452578392151e7ea81
                                                    • Instruction Fuzzy Hash: 6821AC50A093C242EF35EB3699042B9A752BF15BE4FCA4571C90E07BF1EEBCA1648321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc
                                                    • String ID: Signature: %s$Signature
                                                    • API String ID: 2190258309-1663925961
                                                    • Opcode ID: 669e0853c614df204427bf6a0c54b858da688f40652f90c3cf2fe78feb91b896
                                                    • Instruction ID: 61f964c92bc2c9c388d37140295d770c9878c8d9b66de8ea5b8ea6967ed0545b
                                                    • Opcode Fuzzy Hash: 669e0853c614df204427bf6a0c54b858da688f40652f90c3cf2fe78feb91b896
                                                    • Instruction Fuzzy Hash: F5216262A08A8686EB70AB75E8442BAA360FF857C4FC50432DE4E17B65EE7CD0618750
                                                    APIs
                                                    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7915425C9), ref: 00007FF791542F2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strncpy
                                                    • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                                    • API String ID: 3301158039-3625861382
                                                    • Opcode ID: 8b711adde57631c56a38b82b1329e3b13cead0ff2e0d4e272cc8a1744a76445f
                                                    • Instruction ID: 8bf26629115839f6fa9c80287476d89a90132034666b543f8c676d4a59995e5c
                                                    • Opcode Fuzzy Hash: 8b711adde57631c56a38b82b1329e3b13cead0ff2e0d4e272cc8a1744a76445f
                                                    • Instruction Fuzzy Hash: D9112962E0C24291EB7DA738F994278A290AF05380FEB5071C61E066F5DEFCE4B0D631
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                                    • String ID:
                                                    • API String ID: 469868127-0
                                                    • Opcode ID: 55ef4f75ae426a7d2932eb0e3e79e76d48fe59f16d8dc10ebdd339e272a43add
                                                    • Instruction ID: e05b30cdf29f39179cd6b9155d89cea1e382bdb1e14dcf1f4f8d781a9e9824f3
                                                    • Opcode Fuzzy Hash: 55ef4f75ae426a7d2932eb0e3e79e76d48fe59f16d8dc10ebdd339e272a43add
                                                    • Instruction Fuzzy Hash: C3110076A08B4196E724AF22E544229B370FB49B90F954131DF8E43B64DF79E4758720
                                                    APIs
                                                    Strings
                                                    • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF79156587B
                                                    • ** Resuming transfer from byte position %I64d, xrefs: 00007FF791565868
                                                    • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF791565AC5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: fflush
                                                    • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                                    • API String ID: 497872470-664487449
                                                    • Opcode ID: e35c377f891361ef5da9e041a94235e5a588d00ac08ec145806df9b12a25e4e7
                                                    • Instruction ID: 702c82de9dd980ad54d2c8a28f0efd6de9aaed53c07205a8c5eeb6e4fc3a0839
                                                    • Opcode Fuzzy Hash: e35c377f891361ef5da9e041a94235e5a588d00ac08ec145806df9b12a25e4e7
                                                    • Instruction Fuzzy Hash: 1291AF62716B8685DB30EB26E4487AAB364FB84BC0FC21032DE4D47BA5EF78D015D740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastfreememcpy
                                                    • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                                    • API String ID: 1248052217-2064316097
                                                    • Opcode ID: 4af3f1651e03d74e10e6b9007a6219dba507e4555323ed1e664332546866e9bb
                                                    • Instruction ID: b23a3158907f8f6ea222af481815a91f625b367929624ec43a21d6cec9820e73
                                                    • Opcode Fuzzy Hash: 4af3f1651e03d74e10e6b9007a6219dba507e4555323ed1e664332546866e9bb
                                                    • Instruction Fuzzy Hash: 3041C522A0978285F770AE3694013B9A390BB487D4F8A4131DE9D877E1EFBCE595C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: FALSE$TRUE
                                                    • API String ID: 1865132094-1412513891
                                                    • Opcode ID: 680989814d6a7f606f4f870cf9c673e6e20c909bbbf138a01244968e94ac3bdb
                                                    • Instruction ID: 8cd4d9a0b5b9f0211d1d9f591b757f0efad8af6c7d59fa743d70ee86d46997bc
                                                    • Opcode Fuzzy Hash: 680989814d6a7f606f4f870cf9c673e6e20c909bbbf138a01244968e94ac3bdb
                                                    • Instruction Fuzzy Hash: 66410662B0935584FF359AB6904027CB791AB41794F8A45B6DF9D46FE8DEACE050C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _time64$ErrorLast
                                                    • String ID: TFTP response timeout
                                                    • API String ID: 3339832089-3820788777
                                                    • Opcode ID: 69b331398db41112391a096ce9fca5556a4e3829955a2e49ce8a242d2e2dc4c0
                                                    • Instruction ID: 6a4037637fd7065f50e8989d417b0638eb171cdf51cc264d28bcb9896608b266
                                                    • Opcode Fuzzy Hash: 69b331398db41112391a096ce9fca5556a4e3829955a2e49ce8a242d2e2dc4c0
                                                    • Instruction Fuzzy Hash: EA41B132608A4282EB70AF35D4522B9A760EB48BA4FD64231DE2D477E9DFBCD511C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$free
                                                    • String ID: %s%lx
                                                    • API String ID: 573759493-530121141
                                                    • Opcode ID: 48b358b9a7832e780bd63da4bdcfca21b5e7029b0a50c728bb37141f682c80ea
                                                    • Instruction ID: 97fac5581089c1ef321e6cd535e68c243b1f61f630af5ebb63954c49be40c646
                                                    • Opcode Fuzzy Hash: 48b358b9a7832e780bd63da4bdcfca21b5e7029b0a50c728bb37141f682c80ea
                                                    • Instruction Fuzzy Hash: 5131F311E0D5E785FB32AB34808427CFB919B81B84FD645B1C78E41EA9DFACA061C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$free
                                                    • String ID: TRUE
                                                    • API String ID: 573759493-3412697401
                                                    • Opcode ID: ddb15eb4e4bbacf428898f0f7aa068e1884f7718dbae2cd5ca24ba528def7b40
                                                    • Instruction ID: 84e0162c9d3973790723e9ede5d536c114cb059087669a11d74da4a3fed96b5f
                                                    • Opcode Fuzzy Hash: ddb15eb4e4bbacf428898f0f7aa068e1884f7718dbae2cd5ca24ba528def7b40
                                                    • Instruction Fuzzy Hash: 8231D521A0C69385FB26DB35954437CFB91AB41B94FCA0671C79E42EE9CFACD151C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: fwrite
                                                    • String ID: ...$...
                                                    • API String ID: 3559309478-2253869979
                                                    • Opcode ID: f0d588bf4c62bcbfd88a697f2125b6822b67db133afc161a8effd4e896ad2c1a
                                                    • Instruction ID: 869f573c9a5b5adc492d8c1f7bbad220086713f5080261aaaf19940c44a3685e
                                                    • Opcode Fuzzy Hash: f0d588bf4c62bcbfd88a697f2125b6822b67db133afc161a8effd4e896ad2c1a
                                                    • Instruction Fuzzy Hash: 7B310261A1CA8581EB30EB21E4147F9B391FB84B94FC24231DA5E037A4CFBDE465C791
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: acceptgetsocknameioctlsocket
                                                    • String ID: Connection accepted from server$Error accept()ing server connect
                                                    • API String ID: 36920154-2331703088
                                                    • Opcode ID: 25db17007e4fcc1513bde8dc7f426adc79ef3f95fa1d37740abd9650b46eeb17
                                                    • Instruction ID: 11fce106081440e11946654739b57ed3da5ecacdcc4ffdd603cd4b0a89134e65
                                                    • Opcode Fuzzy Hash: 25db17007e4fcc1513bde8dc7f426adc79ef3f95fa1d37740abd9650b46eeb17
                                                    • Instruction Fuzzy Hash: 52318D6160968186EB64AB32E4043AAB3A0FB48BE4FC50231DA6D477E5CFBDE125C710
                                                    APIs
                                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791563BB9), ref: 00007FF79156420D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: realloc
                                                    • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                                    • API String ID: 471065373-1365219457
                                                    • Opcode ID: 776be89de7e3b97c2c7a29af63bd073ab042ce0f00c1f2414de4247fd7b9e8de
                                                    • Instruction ID: baf8be2c3df25fd55bbb152cdd34cefaa7095cf52799282b52adc1645a2edf82
                                                    • Opcode Fuzzy Hash: 776be89de7e3b97c2c7a29af63bd073ab042ce0f00c1f2414de4247fd7b9e8de
                                                    • Instruction Fuzzy Hash: A3216D32B08A8486DB14AB25E5802ADA7A1FB49FC4F944031EF8D07B69CF7CD4A1C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID: :
                                                    • API String ID: 2653869212-336475711
                                                    • Opcode ID: 175a6e2993857331db5a4524ab3f58ef6685a1c5ee0984c2120de727a9479954
                                                    • Instruction ID: 1bc5389246f7b75e94f3170a9d07e46421fcf34ff3d258f26b0aa497b0dd9e39
                                                    • Opcode Fuzzy Hash: 175a6e2993857331db5a4524ab3f58ef6685a1c5ee0984c2120de727a9479954
                                                    • Instruction Fuzzy Hash: AA219022649B8685EB76AF24E5403A9B3A0FB44B90FD94131DF9D437E4EF7CD8648720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$_strdup
                                                    • String ID: :
                                                    • API String ID: 2653869212-336475711
                                                    • Opcode ID: be32b5014d369bc73295dcf837881aff1f758748a3d96c39236650a8449bdd12
                                                    • Instruction ID: ac083b5a5b03f938a52dc5e9c51a1bc6039d38b262317ecd363fdf460350db53
                                                    • Opcode Fuzzy Hash: be32b5014d369bc73295dcf837881aff1f758748a3d96c39236650a8449bdd12
                                                    • Instruction Fuzzy Hash: 95118122649B8581EF769F24E5003A9B3A0BB44BA0FE54131CF9C437E4EF7CD8658720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastsend
                                                    • String ID: SENT$Sending data failed (%d)
                                                    • API String ID: 1802528911-3459338696
                                                    • Opcode ID: 3c9f7f12b86643e721f4c048074ebf3d72efc8223da87b6a7dd9f586703e095d
                                                    • Instruction ID: 8db961a647838fe646993e9d995f3ab937b60a3d51619319239c089be8043b57
                                                    • Opcode Fuzzy Hash: 3c9f7f12b86643e721f4c048074ebf3d72efc8223da87b6a7dd9f586703e095d
                                                    • Instruction Fuzzy Hash: 5401D222704A9281EB20AB36E841459BB20FB84FD4B8A4131CB4D43721DF7CD511C790
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfreemalloc
                                                    • String ID: Start Date: %s$Start Date
                                                    • API String ID: 3985033223-2389359183
                                                    • Opcode ID: 4db77c46102cf595f7eaa52d45e37b5d4f48110c1cb8f7415c2056f72cb31595
                                                    • Instruction ID: 7c62bd39d3b7dd2a7744d16339f5bd1b043454a272983a8699169696ea8726b1
                                                    • Opcode Fuzzy Hash: 4db77c46102cf595f7eaa52d45e37b5d4f48110c1cb8f7415c2056f72cb31595
                                                    • Instruction Fuzzy Hash: 7801D491A0C3C242FB30AB3199146B9A752BF06784FCA4870D90E0BA71DFBCA1658331
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791561A05), ref: 00007FF791561628
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791561A05), ref: 00007FF791561631
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791561A05), ref: 00007FF7915616AA
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791561A05), ref: 00007FF7915616BB
                                                    • memcpy.VCRUNTIME140(?,?,00000000,00007FF791561A05), ref: 00007FF7915616E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$mallocmemcpy
                                                    • String ID:
                                                    • API String ID: 3401966785-0
                                                    • Opcode ID: 9b337a02fca5ee296b1ac04b059498f48879f76631f86f4956c034c2df049f6d
                                                    • Instruction ID: fa87ce1c379ec957e5f9f6a5d0a0cc26c79e85282e77cf810fc7f8594c77955c
                                                    • Opcode Fuzzy Hash: 9b337a02fca5ee296b1ac04b059498f48879f76631f86f4956c034c2df049f6d
                                                    • Instruction Fuzzy Hash: A0318425A08F4581EB60AF21E58027DA3A5FB45FD4F890631DE6E87BE5DFBCD8608350
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584306
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584327
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584342
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584350
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791580D75), ref: 00007FF791584362
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 6a6a77d98efcada27af8cec906da128cbe951bad8ba45de8207a6caf2487e23b
                                                    • Instruction ID: 97423c3829dbdac9beed670605a105d774dd982a95a984cffda090a456734eee
                                                    • Opcode Fuzzy Hash: 6a6a77d98efcada27af8cec906da128cbe951bad8ba45de8207a6caf2487e23b
                                                    • Instruction Fuzzy Hash: 82118336644B4182DB14AF35E99013DB3B4FB84F897854125CE4E47B78DF78D8A5C350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: calloc$free
                                                    • String ID: chunked
                                                    • API String ID: 171065143-1066005980
                                                    • Opcode ID: 538d7051d2c70fbc938fbb0a2f8250d3f489b72bef55e67d2d570cf30864fa8f
                                                    • Instruction ID: a6a068a14c2965c43c8d4c6443694ef1b47c951381e22e4829e6529110f6b565
                                                    • Opcode Fuzzy Hash: 538d7051d2c70fbc938fbb0a2f8250d3f489b72bef55e67d2d570cf30864fa8f
                                                    • Instruction Fuzzy Hash: 17518821A0969645FB75BB329520379E7A1AF04BC4FCB4031EE5D477A5EFBCE4628320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                                    • API String ID: 1294909896-910067264
                                                    • Opcode ID: 14976289f3b9005e1f5860059425a6beb8717aaac2c186ae0b75cf46d6573ef7
                                                    • Instruction ID: 09544c94273109d1ef58952eb79ddeabc52b340903b623376fcc3725cfae64d4
                                                    • Opcode Fuzzy Hash: 14976289f3b9005e1f5860059425a6beb8717aaac2c186ae0b75cf46d6573ef7
                                                    • Instruction Fuzzy Hash: B351E361B0869684EB219B35E6041B9FBA5EB81784FD64072DB4D03BA8CFBDE461C320
                                                    APIs
                                                    • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79153D1E8), ref: 00007FF79153D5FE
                                                    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79153D1E8), ref: 00007FF79153D62C
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79153D1E8), ref: 00007FF79153D695
                                                      • Part of subcall function 00007FF79158F240: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79153443E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF791531B99), ref: 00007FF79158F25A
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79153D6A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                                    • String ID:
                                                    • API String ID: 2942768764-0
                                                    • Opcode ID: b3988258efe183e24b57d6eecce6c4b788a80eed897667fb314e802d95d40c03
                                                    • Instruction ID: da5db61b30a8bac8e971f6bda35eb30db3902b4af0a5f25483796f973bd4d3e9
                                                    • Opcode Fuzzy Hash: b3988258efe183e24b57d6eecce6c4b788a80eed897667fb314e802d95d40c03
                                                    • Instruction Fuzzy Hash: 2641AC72B05A4186EF24BF35D1442B9A360BB04BA4FD68631CA6D477E4DFBCE0628310
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF79156CA2B), ref: 00007FF79158A8DE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %s
                                                    • API String ID: 1294909896-3043279178
                                                    • Opcode ID: e451349c48c8d08e9e196415945413dea411d57df709bac9ef75b314883bddb0
                                                    • Instruction ID: a4ad3d9bc0161b3f6a2fc581fa0bbb6d30c4a2dcca8fc28e17a6b8a7b6265c94
                                                    • Opcode Fuzzy Hash: e451349c48c8d08e9e196415945413dea411d57df709bac9ef75b314883bddb0
                                                    • Instruction Fuzzy Hash: B8416632A18B4582E761EB25B44016AB3A4FB84BD0F950135DF9E03B75DF7CE5A5C310
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF79156E270,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF79158AD13
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79158AD9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %s
                                                    • API String ID: 1294909896-3043279178
                                                    • Opcode ID: e9b89c39f856a5c8a9ad15eec70c1ff84f22c74bc4c3145f005487050e101875
                                                    • Instruction ID: d74799ecb3b7089cf6cee0f4445a3e23379d363c59492d3ff2d8e7a5ea7109ed
                                                    • Opcode Fuzzy Hash: e9b89c39f856a5c8a9ad15eec70c1ff84f22c74bc4c3145f005487050e101875
                                                    • Instruction Fuzzy Hash: 32416532A18B4582E761AF26F5401AAB3A0FB45B94F854135DF8D47BB5EF7CE0A58310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                                    • API String ID: 1294909896-918878739
                                                    • Opcode ID: 61b507c128d45ded0ed49714172254701308272c932cd60181d082c1e58646fb
                                                    • Instruction ID: a5d88a3d384f4d3426b01ac2ff3c1608ace7f1f8e6026fc9ab06da915320bdb2
                                                    • Opcode Fuzzy Hash: 61b507c128d45ded0ed49714172254701308272c932cd60181d082c1e58646fb
                                                    • Instruction Fuzzy Hash: 8331A062A0DB8588EB219B35D5401A9B762FB847D4FD640B2CB4D17AA8DFBCE561C320
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791576254
                                                      • Part of subcall function 00007FF791555B40: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF791555C65
                                                      • Part of subcall function 00007FF791555B40: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF791555C80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: fwrite$free
                                                    • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                                    • API String ID: 3468156532-1133524294
                                                    • Opcode ID: 1fbc18a41d1a3ed3bd65e18b5aadff381fc65846ca41af88232ca3afd5d8ed55
                                                    • Instruction ID: 476dd4648c94602606a3ac3d6344961a0bf83625c25292bd8fb0e9152deee6c6
                                                    • Opcode Fuzzy Hash: 1fbc18a41d1a3ed3bd65e18b5aadff381fc65846ca41af88232ca3afd5d8ed55
                                                    • Instruction Fuzzy Hash: 33416136A08A42C5FB30EF35D4451ADB7A0EB84B85FCA4036DE4E8B3A5DEB8D555C360
                                                    APIs
                                                    • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF791531205), ref: 00007FF791540608
                                                    • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF791531205), ref: 00007FF7915406A9
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7915406C7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: memcpy$Concurrency::cancel_current_task
                                                    • String ID:
                                                    • API String ID: 326894585-0
                                                    • Opcode ID: e1af6881af5f3e4c00050ae4788b4fe4e8b214fd33d74720cf3c6d1a5e77fedd
                                                    • Instruction ID: a3ce003e24886f47ce18e262106458f907bab4f5c0ab05eaefba869e990c376d
                                                    • Opcode Fuzzy Hash: e1af6881af5f3e4c00050ae4788b4fe4e8b214fd33d74720cf3c6d1a5e77fedd
                                                    • Instruction Fuzzy Hash: 94212E22B0974546FB34BB71A54037952549B44BF4FB60A30DE6E0BBE1DEFCA0A28350
                                                    APIs
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7915502E2
                                                    • memcpy.VCRUNTIME140 ref: 00007FF79155031D
                                                      • Part of subcall function 00007FF791545670: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791545685
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF791550352
                                                      • Part of subcall function 00007FF791545780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79154FD80,?,?,?,?,?,?,?,?,?,?,00000000,00007FF791541BB1), ref: 00007FF7915457A7
                                                      • Part of subcall function 00007FF791545780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79154FD80,?,?,?,?,?,?,?,?,?,?,00000000,00007FF791541BB1), ref: 00007FF7915457B3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$malloc$memcpy
                                                    • String ID: %s:
                                                    • API String ID: 901724546-64597662
                                                    • Opcode ID: 9516adf01490b49f10acba8f7c231fd89690dbff1325a00545b0275a5eff4f36
                                                    • Instruction ID: 6dc5c31fa6bd3c0a23436e7c2190ae6d6c25de27f3541b29ef3427965e0d3370
                                                    • Opcode Fuzzy Hash: 9516adf01490b49f10acba8f7c231fd89690dbff1325a00545b0275a5eff4f36
                                                    • Instruction Fuzzy Hash: 1821E522A08A8592DB20DF22E9501AAB3A4FB84FE4F8A0132EE5D077A5DF7CD455C350
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: isupper$_strdupfree
                                                    • String ID:
                                                    • API String ID: 3359907120-0
                                                    • Opcode ID: d55fb0e371b828d4263d1b692f20da97774bb4adc62638c8f72deefdfae3283b
                                                    • Instruction ID: 5f8c720d35c45a0b7a9bac775e537ac7309ddfc8aabec00a4759f48a6f740cae
                                                    • Opcode Fuzzy Hash: d55fb0e371b828d4263d1b692f20da97774bb4adc62638c8f72deefdfae3283b
                                                    • Instruction Fuzzy Hash: 1421BC21E0D5A785FB32EB34848433CFB908B91B40FDA05B1C6CA41DA9CFACA5A1C321
                                                    APIs
                                                    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF791558FF8), ref: 00007FF791559145
                                                    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF791558FF8), ref: 00007FF79155915F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strncmp
                                                    • String ID: I32$I64
                                                    • API String ID: 1114863663-3980630743
                                                    • Opcode ID: 8e751c8bfe898bb27ff1d697120fc1faf0731f976f8d22b7627950edb40120f3
                                                    • Instruction ID: e56c4d80673b72bc21d195183b3352dbfe7fa71a5b82f9f8fb7a10bc63634378
                                                    • Opcode Fuzzy Hash: 8e751c8bfe898bb27ff1d697120fc1faf0731f976f8d22b7627950edb40120f3
                                                    • Instruction Fuzzy Hash: 5C21D422A0D56382EB306B30D4A02BCBB949B44B88FCB5171DB4A422E9DFBCD524C761
                                                    APIs
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791583EE9,00000000,?,?,00007FF7915834A6), ref: 00007FF7915831A9
                                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791583EE9,00000000,?,?,00007FF7915834A6), ref: 00007FF7915831E0
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF791583EE9,00000000,?,?,00007FF7915834A6), ref: 00007FF7915831F2
                                                    • memcpy.VCRUNTIME140(?,?,?,00007FF791583EE9,00000000,?,?,00007FF7915834A6), ref: 00007FF79158321A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freemallocmemcpyrealloc
                                                    • String ID:
                                                    • API String ID: 3881842442-0
                                                    • Opcode ID: 008602ec6e908811db213d7dbe04a7c6b8817e5f137df226a56a28326b5c719a
                                                    • Instruction ID: 9f772deaee25f796ff65dc2ff49fefe109149fae6779332b123cbe867a6cccd6
                                                    • Opcode Fuzzy Hash: 008602ec6e908811db213d7dbe04a7c6b8817e5f137df226a56a28326b5c719a
                                                    • Instruction Fuzzy Hash: CC215126B09B8182DB54DF65E45022DA3A0FB48FC8B898471DE5E47769EF7CD4A1C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strstr$calloc
                                                    • String ID: ;type=
                                                    • API String ID: 3224321581-3507045495
                                                    • Opcode ID: 811040f233e0a97c3a24d7e3bb3bc3a1351c76e80b528bf1a8aec7d8cf2d614a
                                                    • Instruction ID: 89f9b649cc60f475520bca84c816b65d45141b4b8dffacd89a6a897d88a6fdd7
                                                    • Opcode Fuzzy Hash: 811040f233e0a97c3a24d7e3bb3bc3a1351c76e80b528bf1a8aec7d8cf2d614a
                                                    • Instruction Fuzzy Hash: ED21D6319096C282EB259B35E0513A8B7A0FB58784FC94131DB9E4B7E5DFBCE1A1C360
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$freemalloc
                                                    • String ID:
                                                    • API String ID: 2605342592-0
                                                    • Opcode ID: c10528ef4c738abbc8077291e4c9fdcefbb0b388c6087abf3c9d595c73769fbd
                                                    • Instruction ID: d569a3823515638c5a057283eff3f705fa7a6b8e7a41514424677635c6071d64
                                                    • Opcode Fuzzy Hash: c10528ef4c738abbc8077291e4c9fdcefbb0b388c6087abf3c9d595c73769fbd
                                                    • Instruction Fuzzy Hash: 1F118231B09B4187E7609F66B84416DBBA0FB88FD0B894038DB4E43B24DFBCE9218754
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID: Proxy-Connection: Keep-Alive
                                                    • API String ID: 1294909896-2835282938
                                                    • Opcode ID: 479d2bfe2f55f23ed073b86a81743c629f6cf7c7eb30205fa508a36cc4b626fa
                                                    • Instruction ID: a9d54924c9cd88ee39e185e46bbcb36999994c12f6fb94fe70dbf23fc130dbb7
                                                    • Opcode Fuzzy Hash: 479d2bfe2f55f23ed073b86a81743c629f6cf7c7eb30205fa508a36cc4b626fa
                                                    • Instruction Fuzzy Hash: 3001FE21B04B4142FB256B65B9403BDE290AF84BF1F494230DEAE477E4DFBCD8A58390
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree$strchr
                                                    • String ID:
                                                    • API String ID: 1739957132-0
                                                    • Opcode ID: 74dcc107a4db5e5eacd702fc4e5117abfa6dcb817347b636e833a125e261670b
                                                    • Instruction ID: 766856a1608cb9ef7c034f60289d79049e12c946388b1b10c8d85afefea1572b
                                                    • Opcode Fuzzy Hash: 74dcc107a4db5e5eacd702fc4e5117abfa6dcb817347b636e833a125e261670b
                                                    • Instruction Fuzzy Hash: 7C019251F0D68542EF79BB276550039D2D0AF48BC4FC90075DD4E03F65DE6CD8A58320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$CriticalDeleteSectionclosesocket
                                                    • String ID:
                                                    • API String ID: 3086658127-0
                                                    • Opcode ID: 9eb0b8f88539e4023edf3225b4eebe3bc86ae2d2a30f915f43d34615c8db5f94
                                                    • Instruction ID: 2b03cd4efdc2bcde3d71c4f7ec107220bc73f604e67c30f67e75f634aae6b8f8
                                                    • Opcode Fuzzy Hash: 9eb0b8f88539e4023edf3225b4eebe3bc86ae2d2a30f915f43d34615c8db5f94
                                                    • Instruction Fuzzy Hash: BB011212D18B8183EB24EF71C9601786320FFE9F68F566325DD5D411B5AFB8A5E48210
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strncmp
                                                    • String ID: I32$I64
                                                    • API String ID: 1114863663-3980630743
                                                    • Opcode ID: de67e7e0a2a649706839e3d7781dc7386b0f4e61f50036b717385dd3c57d0e3a
                                                    • Instruction ID: 6f97403fb078e912dfbb9048ec3ed185af3326e39412e2413e1a880bb6a7774d
                                                    • Opcode Fuzzy Hash: de67e7e0a2a649706839e3d7781dc7386b0f4e61f50036b717385dd3c57d0e3a
                                                    • Instruction Fuzzy Hash: 17F05E21B2D51341EB205B3598A4679A798AF45B94FCA4136DA1F862A8CEBCD224C321
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: strncmp
                                                    • String ID: I32$I64
                                                    • API String ID: 1114863663-3980630743
                                                    • Opcode ID: 8e2efbe2dc36c2f304f4daf226fac6a456fa9e2aa0e22ef4985db8c7c8934ee2
                                                    • Instruction ID: ecbc2f078289aa028458e67839cd89f094c19eb9768ca2ed4a01917dc787db2a
                                                    • Opcode Fuzzy Hash: 8e2efbe2dc36c2f304f4daf226fac6a456fa9e2aa0e22ef4985db8c7c8934ee2
                                                    • Instruction Fuzzy Hash: 61F05E21B2951381EB305B3598A4679A798AF45B94FCA4136DA1F862A8CEBCD224C321
                                                    APIs
                                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7915565C6), ref: 00007FF791581224
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _errno
                                                    • String ID: %lx
                                                    • API String ID: 2918714741-1448181948
                                                    • Opcode ID: c5f9ad7cbecb279396b20793d6ff8f3a0ad16f17c928caf43dceee749b8ae422
                                                    • Instruction ID: 6782a438b2799cb8315f2f53f245a012cd247cc5a8ff95d1b56fa4098dff1381
                                                    • Opcode Fuzzy Hash: c5f9ad7cbecb279396b20793d6ff8f3a0ad16f17c928caf43dceee749b8ae422
                                                    • Instruction Fuzzy Hash: D881B062A1C1D149E7789B39949023DBBD0F785790F4A4275EA9FC2AF0DEBCD451CB20
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: %ld
                                                    • API String ID: 1865132094-1112595699
                                                    • Opcode ID: 9cab93023acf38a75293a06d8281f40a99b56ac28cab9c4c3c04a1f662d08d3a
                                                    • Instruction ID: 6d0cd28e6f90ca20544251fbb8eaa6ea85f6033d5d1bd494968e9b3a3d607a68
                                                    • Opcode Fuzzy Hash: 9cab93023acf38a75293a06d8281f40a99b56ac28cab9c4c3c04a1f662d08d3a
                                                    • Instruction Fuzzy Hash: 3831A522A09B4281FB75EB71926237AA390EF44754FCA8031DE4D137A5EFBCE564C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupmalloc
                                                    • String ID: identity
                                                    • API String ID: 3515966317-1788209604
                                                    • Opcode ID: 8336b4210b4004b155cbc089c43f1e53d3414ade01267eb7b6197acee1bc4750
                                                    • Instruction ID: ef476d6eda5e8a388f929839058462bacc33fcb5db66579156c5fb4e0bf307d1
                                                    • Opcode Fuzzy Hash: 8336b4210b4004b155cbc089c43f1e53d3414ade01267eb7b6197acee1bc4750
                                                    • Instruction Fuzzy Hash: DC31C961E19A4681EB21AF25D550379E7A0EF44FE4F8A4231DE2E037E4EFBCD4618310
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: %I64d-
                                                    • API String ID: 1865132094-19666937
                                                    • Opcode ID: 4d3daeb6377bbac071d955606a3681fb7a5c368577e255ec3f27eeb489a10530
                                                    • Instruction ID: 6e6bd2605114de63e2a1df3861d2981e665fd9c33f16bca3b35450cfcf180e52
                                                    • Opcode Fuzzy Hash: 4d3daeb6377bbac071d955606a3681fb7a5c368577e255ec3f27eeb489a10530
                                                    • Instruction Fuzzy Hash: 0F11E1B2A1AA82C1EB21AB7484153F963E2FB54B4DF9D4035C90C8E275DF7D94A68330
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: _strdupfree
                                                    • String ID: TRUE
                                                    • API String ID: 1865132094-3412697401
                                                    • Opcode ID: 3ea0fbb5b320cd8986fd5c62dbaf42462ff963e792932f504dad5627c0e15222
                                                    • Instruction ID: 7b04b4a39fd9a11330849238e6f6d5b3dc22f25505d442392aaf76b6613e9483
                                                    • Opcode Fuzzy Hash: 3ea0fbb5b320cd8986fd5c62dbaf42462ff963e792932f504dad5627c0e15222
                                                    • Instruction Fuzzy Hash: F0019666B0965584EB229B35D500278B761BB44BE4FC64472DF4E07BA8DEBCD0918320
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79154883A
                                                    • memcpy.VCRUNTIME140 ref: 00007FF79154896C
                                                    • memcpy.VCRUNTIME140 ref: 00007FF791548988
                                                      • Part of subcall function 00007FF79155DE20: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791546743,?,?,00000000,00007FF791551012,?,?,00000000,00007FF791551645), ref: 00007FF79155DE5C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: freememcpy
                                                    • String ID:
                                                    • API String ID: 3223336191-0
                                                    • Opcode ID: 30c99f82218bf2dd412b0626ce0fe34ede466061719036dbfe30e355c3ff1c85
                                                    • Instruction ID: e8130a4714d4aa4b6316bbf676b4984262fc8d79ce8a643ed3223c746c43be20
                                                    • Opcode Fuzzy Hash: 30c99f82218bf2dd412b0626ce0fe34ede466061719036dbfe30e355c3ff1c85
                                                    • Instruction Fuzzy Hash: 35C18032B04B0286EB64EBB5D4003AD73A1BB44BA8F964635CE2D177E8DF78D466C750
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7915803F8), ref: 00007FF79158D2F1
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7915803F8), ref: 00007FF79158D304
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7915803F8), ref: 00007FF79158D32B
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7915803F8), ref: 00007FF79158D338
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$freemalloc
                                                    • String ID:
                                                    • API String ID: 2605342592-0
                                                    • Opcode ID: f1a5407237db9153808d918461231376cc166afeba206ffd9ba44e21888b6f4d
                                                    • Instruction ID: 16b5d7bf7fcb8ed2dda04b7d9efd7845b052b00199aebc9272c0db5712cd058f
                                                    • Opcode Fuzzy Hash: f1a5407237db9153808d918461231376cc166afeba206ffd9ba44e21888b6f4d
                                                    • Instruction Fuzzy Hash: 59117031B08B4282E720AB2AF44002AE6A0FF88BD5B890535DB5D47B68EF7CD4508710
                                                    APIs
                                                      • Part of subcall function 00007FF791545780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79154FD80,?,?,?,?,?,?,?,?,?,?,00000000,00007FF791541BB1), ref: 00007FF7915457A7
                                                      • Part of subcall function 00007FF791545780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79154FD80,?,?,?,?,?,?,?,?,?,?,00000000,00007FF791541BB1), ref: 00007FF7915457B3
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79154BC86
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79154BC96
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79154BCA4
                                                    • memset.VCRUNTIME140 ref: 00007FF79154BCDF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free$memset
                                                    • String ID:
                                                    • API String ID: 2717317152-0
                                                    • Opcode ID: 195ff57605982ef926e7049359a2d90fe74d1c56ba92557821cb0204ba2d8eb5
                                                    • Instruction ID: e40e62ff4f18ab5ea388e0a78fda740e673c63bc4d319db8434860e860fc5b87
                                                    • Opcode Fuzzy Hash: 195ff57605982ef926e7049359a2d90fe74d1c56ba92557821cb0204ba2d8eb5
                                                    • Instruction Fuzzy Hash: EF211D32E14B81A3E714DB32D6802A9B360F799744F559225EB8C43A61DF74F1F1C300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 6aeb9b4ee373119086df89d849c003284edb578b2afdea0e21a0ea61ebf53732
                                                    • Instruction ID: 6a4f84cd83fa79c9faf840f7a93c8ca74bac642dbca4889203cddee562a55bde
                                                    • Opcode Fuzzy Hash: 6aeb9b4ee373119086df89d849c003284edb578b2afdea0e21a0ea61ebf53732
                                                    • Instruction Fuzzy Hash: 82112536614B81C6D7509F75E580269B3A4F784F84F884036DE8E57728CF38E8A9C760
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79158098E), ref: 00007FF7915848B6
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79158098E), ref: 00007FF7915848D7
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79158098E), ref: 00007FF7915848F2
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79158098E), ref: 00007FF791584900
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 846d7ab3ed71c38c6c2539536b014053c6e70e2da4ef8ea2d8c4f2e83be237c1
                                                    • Instruction ID: 08f7cf56fe1b6ed74057cf7253328ab06bd129b4c8b0f52d428d947b8a1c4a4d
                                                    • Opcode Fuzzy Hash: 846d7ab3ed71c38c6c2539536b014053c6e70e2da4ef8ea2d8c4f2e83be237c1
                                                    • Instruction Fuzzy Hash: C511A536A54B4182DB14AF36E99012DB7B4FF94F897914026CE4E43B78CF78D8A5C790
                                                    APIs
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791558455,?,?,00000000,00007FF791551111,?,?,00000000,00007FF791551645), ref: 00007FF791582240
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791558455,?,?,00000000,00007FF791551111,?,?,00000000,00007FF791551645), ref: 00007FF791582266
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791558455,?,?,00000000,00007FF791551111,?,?,00000000,00007FF791551645), ref: 00007FF791582274
                                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF791558455,?,?,00000000,00007FF791551111,?,?,00000000,00007FF791551645), ref: 00007FF791582282
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2311676086.00007FF791531000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF791530000, based on PE: true
                                                    • Associated: 00000000.00000002.2311663171.00007FF791530000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311715531.00007FF791591000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311733905.00007FF7915A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2311747549.00007FF7915A9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7ff791530000_flX5YA1C09.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 8559a7478e8577689d50fb75d693bd9ac3cfe55f82774f29ec76e8cfb518f45c
                                                    • Instruction ID: d01bd5fc6060cc99de5be22845dc88cfd5e7c7b95fc199c0b079202f4f4cb01f
                                                    • Opcode Fuzzy Hash: 8559a7478e8577689d50fb75d693bd9ac3cfe55f82774f29ec76e8cfb518f45c
                                                    • Instruction Fuzzy Hash: BBF0C936644B0182DB149F31E994029B3B4FB98F997924121CE9E43B74CF78C8B8C350